Gartner Blog Network


Requirements For SIEM as a Service

by Augusto Barros  |  August 7, 2015  |  2 Comments

Earlier Today I was discussing with Anton the different requirements for SIEM and MSS, eventually talking about SIEM SaaS too (by the way, he has a very good blog post on that). We noticed an interesting fact on how things are perceived by organizations choosing an acquisition model for their SIEM needs.

First we need to understand the differences between the many services and products out there. In general, we can describe the different options like:

MSS > SIEM SaaS/Managed SIEM > SIEM

While on an MSS model the service provider is responsible for running and operating the tool, the organization deploying its own SIEM will have to do those things by itself. The fun (let’s see if I’ll use “fun” as much as that other GTP analyst…) part is that middle piece covering many different definitions, such as “SIEM in the cloud”, SIEM SaaS, Managed SIEM, “hybrid”, and others. It is fun because adopting one of those options forces the organization to think in a very structured way about the resources and processes involved in using a SIEM.

The requirements that drive an organization towards those models are usually related to cost, resources, skills, culture and strategy. For example, an organization may have as its strategy to leverage service providers for its security capabilities. On that case the MSS model makes sense, as the service provided is the security process itself, not the tool to provide it. That organization, however, should be aware of the differences between the MSS and the other service offers. You can get a tool as a service, but on that case you MUST HAVE people and processes in place to use that tool. Just think about renting a car vs. hiring a taxi. If you don’t know how to drive there’s no point in renting a car, as you will need to hire a driver as well. Some tool as a service vendors will try to sell it to clients looking for the full service, what will often work as some organizations don’t fully understand the difference between the full capability (tech + process + people) and the tool (tech only).

There are also organizations in a very different situation. They may have opted to run their security processes but don’t want to worry about the IT ops aspects of a tool like a SIEM, which is just another piece of IT.  For those organizations it makes a lot of sense to adopt a Managed SIEM / SaaS approach, as long as it is well understood that someone will have to drive that car. Using the same analogy, an organization with a mobile sales force may want to have that team driving to their clients, but without buying and maintaining a vehicle fleet. On that case, getting the services of a car fleet management company, while keeping the ability to drive the cars, is the ideal solution for them.

The key message here is to be careful when considering intermediate solutions between full MSS and your own SIEM; the requirements that would normally suggest outsourcing should be considered from at least two dimensions, running and maintaining SIEM as a piece of IT and the security monitoring capabilities that leverage this class of tools. Different organizations can be in completely different sides of the spectrum for each one of those and that will definitely point them to completely different solutions or vendors.

There is a nice paper from Anton (GTP Access required) that includes this discussion about SIEM sourcing options:

SIEM Technology Assessment and Select Vendor Profiles

 

 

Category: cloud  siem-and-log-management  

Tags: mss  saas  siem  

Augusto Barros
Research Director
1 years at Gartner
19 years IT Industry

Augusto Barros is Research Director in the Gartner for Technical Professionals (GTP) Security and Risk Management group. Read Full Bio


Thoughts on Requirements For SIEM as a Service


  1. Asaf Barkan says:

    I believe cloud monitoring and the monitoring solution location are agnostic.
    However effective cloud monitoring and security analytics should include an intermediate layer between the log data to the SIEM classification one. This layer should understand the log event meanings in each domain as app security and communicate it classification and operation ready to the SIEM layer.

    Disclaimer. SkyFormation provides such unified security events function for any cloud application and communicate to any SIEM log solution or security analytics.

    Best
    Asaf Barkan

  2. […] Requirements For SIEM as a Service […]



Leave a Reply

Your email address will not be published. Required fields are marked *

Comments or opinions expressed on this blog are those of the individual contributors only, and do not necessarily represent the views of Gartner, Inc. or its management. Readers may copy and redistribute blog postings on other blogs, or otherwise for private, non-commercial or journalistic purposes, with attribution to Gartner. This content may not be used for any other purposes in any other formats or media. The content on this blog is provided on an "as-is" basis. Gartner shall not be liable for any damages whatsoever arising out of the content or use of this blog.