SHARE
Facebook X Pinterest WhatsApp

Systems and Security Management Finally Converge

For more years than most IT folks care to remember, there’s been an expectation that systems and security management would one day converge. That convergence, unfortunately, never really happened in large scale enterprises. But a new survey of 223 IT organizations with less than 2,000 employees that was conducted by The SANS Institute on behalf […]

Written By
thumbnail
ITBE Staff
ITBE Staff
Jun 2, 2010

For more years than most IT folks care to remember, there’s been an expectation that systems and security management would one day converge. That convergence, unfortunately, never really happened in large scale enterprises.

But a new survey of 223 IT organizations with less than 2,000 employees that was conducted by The SANS Institute on behalf of RSA, the security division of EMC, finds that the convergence of security and systems management may finally be happening among small-to-medium businesses.

SMB organizations are always hard pressed when it comes to IT staffing, so they can’t really afford dedicated security specialist. The RSA survey found that detecting and preventing unauthorized access and insider abuse was by far and away the most critical reason that IT organizations analyze logs. But in terms of actual usefulness, detection of unauthorized access was edged out by forensic analysis and correlation. That indicates that while log management plays an important role in security, systems management functions are also a primary reason that IT organizations rely on log analyzers.

Unfortunately, the study also finds that searching through log data and analyzing it are the top two challenges IT organizations face when it comes to analyzing log data.

Sam Curry, chief technology officer for marketing at RSA, said increases awareness of compliance issues was driving more SMB customers to embrace log management tools. In addition, customers were looking to do a lot more in terms of root cause analysis to discover potential security threats.

But while EMC is working to automate many of these functions, Curry did not that too many IT professionals distrust any IT automation because they feel they then lack real visibility into their system processes. But at log analyzer tools become more sophisticated and IT professionals becomes more pressed for time, Curry said more IT organizations will embrace these tools despite any perceived trade offs in terms of visibility.

In the meantime, Curry said IT organizations serving SMB companies may actually be more comprehensive in their approach to systems and security information event management (SIEM) because they are relying on log analyzers to perform both functions. In contrast, large scale IT organizations are more likely to have separate systems and security management staffs that rely on different sets of tools. But as Curry notes, the IT organization that shares a common set of tools is more likely to more efficient in terms of the convergence of security and systems management.

Systems and Security Management Finally Converge - slide 1

Click through for results of a recent survey by RSA.

Systems and Security Management Finally Converge - slide 2

Logs are the front lines of IT defense.

Systems and Security Management Finally Converge - slide 3

Logs are key to determining whether IT organizations have been compromised.

Systems and Security Management Finally Converge - slide 4

Looking through logs is equivalent to searching the proverbial haystack.

Recommended for you...

Unifying Data Management with Data Fabrics
Litton Power
Jun 17, 2022
5G and Industrial Automation: Practical Use Cases
Kashyap Vyas
Apr 22, 2022
Understanding the Relationship Between 5G and Edge Computing
Collins Ayuya
Apr 19, 2022
Building a Private 5G Network for Your Business 
Kihara Kimachia
Apr 18, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.