Systems and Security Management Finally Converge

Email     |     Share  
1 | 2 | 3 | 4
Previous Systems and Security Management Finally Converge-1 Next

Click through for results of a recent survey by RSA.

For more years than most IT folks care to remember, there’s been an expectation that systems and security management would one day converge. That convergence, unfortunately, never really happened in large scale enterprises.

But a new survey of 223 IT organizations with less than 2,000 employees that was conducted by The SANS Institute on behalf of RSA, the security division of EMC, finds that the convergence of security and systems management may finally be happening among small-to-medium businesses.

SMB organizations are always hard pressed when it comes to IT staffing, so they can’t really afford dedicated security specialist. The RSA survey found that detecting and preventing unauthorized access and insider abuse was by far and away the most critical reason that IT organizations analyze logs. But in terms of actual usefulness, detection of unauthorized access was edged out by forensic analysis and correlation. That indicates that while log management plays an important role in security, systems management functions are also a primary reason that IT organizations rely on log analyzers.

Unfortunately, the study also finds that searching through log data and analyzing it are the top two challenges IT organizations face when it comes to analyzing log data.

Sam Curry, chief technology officer for marketing at RSA, said increases awareness of compliance issues was driving more SMB customers to embrace log management tools. In addition, customers were looking to do a lot more in terms of root cause analysis to discover potential security threats.

But while EMC is working to automate many of these functions, Curry did not that too many IT professionals distrust any IT automation because they feel they then lack real visibility into their system processes. But at log analyzer tools become more sophisticated and IT professionals becomes more pressed for time, Curry said more IT organizations will embrace these tools despite any perceived trade offs in terms of visibility.

In the meantime, Curry said IT organizations serving SMB companies may actually be more comprehensive in their approach to systems and security information event management (SIEM) because they are relying on log analyzers to perform both functions. In contrast, large scale IT organizations are more likely to have separate systems and security management staffs that rely on different sets of tools. But as Curry notes, the IT organization that shares a common set of tools is more likely to more efficient in terms of the convergence of security and systems management.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

biometrics Biometrics: Moving Far Beyond Fingerprints

Biometrics are changing the way we think about security. Here are some of the more innovative ways biometrics are being used and what we can expect in the future. ...  More >>

Privacy rollback Security Pros Give Their Opinions on ISP Data Privacy Rollback

IT staff, organization leaders, and the average citizen have all expressed levels of concern over the FCC about-face in regard to ISP privacy. Here’s what the security experts say. ...  More >>

IT security skills 7 Top Skills for Security Pros

Executives at several top tech firms outline the skills they need now and in the near future, including IaaS and IoT security expertise. Other skills listed may surprise you. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.