What is a SIEM solution? How SIEM works and Architecture?
Vložit
- čas přidán 28. 06. 2024
- What is a SIEM solution? How SIEM works and Architecture?
🔍 Unlock the Secrets of SIEM Solutions:
Join us in this comprehensive journey as we unravel the historical roots of Security Information and Event Management (SIEM) solutions. In this video, we delve into the internal functions that make SIEM a crucial component in modern cybersecurity. Discover the various architectural approaches adopted by security vendors and gain insights into deployment options tailored for both small and large enterprises.
🔒 Internal Functions of SIEM:
Dive deep into the core functions that make SIEM solutions indispensable for security professionals. Understand how they collect, analyze, and correlate data from diverse sources to provide a comprehensive view of an organization's security posture.
🏗️ Architectural Approaches:
Explore the diverse architectural strategies employed by security vendors to meet the unique needs of different organizations. Whether it's on-premises, cloud-based, or hybrid solutions, discover the pros and cons of each approach and how they impact the overall effectiveness of SIEM.
👍 Subscribe for More Insights:
Stay informed about the latest developments in cybersecurity, technology, and beyond. Subscribe to our channel and hit the notification bell to receive updates on our upcoming videos.
💬 Join the Conversation:
Share your thoughts, questions, and experiences in the comments section below. Connect with fellow cybersecurity enthusiasts and professionals.
#SIEM #Cybersecurity #Technology #EnterpriseSecurity #InformationSecurity #TechTalks
#siem #security #architecture #deployment #logrhythm #qradar #alienvault #soc
#cybersecurity
/ @relativesecurity
Other Videos:
What is SOC ( • SOC for Beginners - Wh... ) - Věda a technologie
Thank you so much for this video. So many other videos on SIEM are only about 5 minutes long. This is the perfect amount of depth for a beginner to start their own research.
Glad it was helpful!
Just for discussions sake I think SIEM originated from log management + security events filtering. Things like event correlation between desperate log sources was later on added on top to provide contextual information as needed.
Awesome video, keep it up and let us know once next Video on this topic released
Thanks for this video 🙏
Very good video, thank you
Amazing video. Superb narration. 👍👍
Thanks. Nice Presentation. Informative.
Hi, good effort. Please keep it going.
Thanks buddy really helpful
very nice explanation
Thumbs UP! Very good explanation.
Glad it was helpful!
if possible pls make vidoes abt diff between ibm qradar,azure sential,sentialone,arcsight,logrthym,dnif,splunk,sumologic
Did you got any article or any videos which talks about different capabilities of each solutions which you have mentioned above?
Can you pls make a video of vapt.
Nice Video and Explanation Effort, I was zero in SIEM and was not finding perfect video which can explain SIEM on the higher level..One question I have, how IDS/IPS differ from SIEM then ?
Thank you.
IDS: Detects the malicious behaviour.
IPS: Blocks the malicious behaviour.
SIEM: Correlates the data from different log sources and generates the alert according to the detection rules in place.
Aggregation Screen (Time Frame 8:09) is bit confusing for the beginners as you used parsing term also . I felt this could have been presented in a better way .
Thank you @Sesha, we will incorporate your feedback in upcoming videos.
Nice try to explaining about them. But need more clarification on everything
👍thanks for excellent presentation
Can you pls do on IBM Qradar tool?
Yes, sure
Nice video sir
Thanks
Nice presentation, can u please upload video for SOAR
Yes definitely, we will bring a video for SOAR for you. Stay tuned.
czcams.com/video/9RdZRuY_7-Q/video.html (Video for SOAR :) )
can you do a new vlog on SIEM based on latest processes and technologies, how can we apply AI etc
Can we get the documents for study purpose ?
I am working on it and will try to make them available as soon as possible.
can you perfectly sort out your soc playlist ?
Hello @Kaushalpurani5108,
Thank you for the feedback. It has been sorted. Shall you need further help or assistance, feel free to comment :)
Regards
@@RelativeSecurity I want to do intership in soc so I started learning about soc so can you tell me which topics I should learn to get internship
@@Batmanop17 email us at connect@relativesecurity.com
📻
Log sorce means?
Log source would be any device from where you are getting the logs. For example, it could be your Active Directory, Database or a firewall.
+
What is log
Log is a record of any activity happened on any system. For example, a web server will keep logs (record) of all requests received or a windows server keep logs of all logins and log offs.