The monitoring step of the vulnerability management process can be automated by regular execution of deployed VA and security configuration management technologies and through the use of SIEM technology. SIEM technology provides real-time event management and historical analysis of security data from a wide set of heterogeneous sources. This technology is used to filter incident information into data that can be acted on for the purposes of incident response and forensic analysis. The need to support regulatory compliance has become the new market driver for the SIEM technology providers. They are working on extending their current offerings to include enhanced regulatory compliance data collection, analysis and reporting features. Vendors in this space include providers of SIEM point solutions and providers of broad-scope products that include security management features.

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: