For more years than most IT folks care to remember, there’s been an expectation that systems and security management would one day converge. That convergence, unfortunately, never really happened in large scale enterprises.
But a new survey of 223 IT organizations with less than 2,000 employees that was conducted by The SANS Institute on behalf of RSA, the security division of EMC, finds that the convergence of security and systems management may finally be happening among small-to-medium businesses.
SMB organizations are always hard pressed when it comes to IT staffing, so they can’t really afford dedicated security specialist. The RSA survey found that detecting and preventing unauthorized access and insider abuse was by far and away the most critical reason that IT organizations analyze logs. But in terms of actual usefulness, detection of unauthorized access was edged out by forensic analysis and correlation. That indicates that while log management plays an important role in security, systems management functions are also a primary reason that IT organizations rely on log analyzers.
Unfortunately, the study also finds that searching through log data and analyzing it are the top two challenges IT organizations face when it comes to analyzing log data.
Sam Curry, chief technology officer for marketing at RSA, said increases awareness of compliance issues was driving more SMB customers to embrace log management tools. In addition, customers were looking to do a lot more in terms of root cause analysis to discover potential security threats.
But while EMC is working to automate many of these functions, Curry did not that too many IT professionals distrust any IT automation because they feel they then lack real visibility into their system processes. But at log analyzer tools become more sophisticated and IT professionals becomes more pressed for time, Curry said more IT organizations will embrace these tools despite any perceived trade offs in terms of visibility.
In the meantime, Curry said IT organizations serving SMB companies may actually be more comprehensive in their approach to systems and security information event management (SIEM) because they are relying on log analyzers to perform both functions. In contrast, large scale IT organizations are more likely to have separate systems and security management staffs that rely on different sets of tools. But as Curry notes, the IT organization that shares a common set of tools is more likely to more efficient in terms of the convergence of security and systems management.