The New Security Management Model
Click here to download now
Overview: Driven by regulatory compliance and security event correlation, most large organizations have deployed a Security Information and Event Management (SIEM) system over the past few years but this does not mean that they are adequately protected. Ominous security threats and a rash of publicly disclosed data breaches certainly place an intense strain on many legacy security management tools and ESG believes this is just the tip of the iceberg. This paper concludes and explains: Security management requirements are in a state of transition; security management needs push technology requirements; server virtualization and cloud computing exacerbate technical requirements; and new requirements mandate a new security management model.