{"id":20875,"date":"2022-02-10T20:25:55","date_gmt":"2022-02-10T20:25:55","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=20875"},"modified":"2023-03-22T16:08:49","modified_gmt":"2023-03-22T16:08:49","slug":"siem-explained","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/networks\/siem-explained\/","title":{"rendered":"SIEM Explained: What is SIEM and How Does it Work?"},"content":{"rendered":"<p>Security information and event management (SIEM) technology provides foundational support for threat detection. The high costs of SIEMs once made them feasible only for larger enterprise clients, but they have become more reasonable solutions for smaller organizations over time.<\/p>\n<p>While a properly configured SIEM can provide effective threat protection, misuse of SIEM technology can increase costs and undermine security. To understand if SIEM technology fits your organization\u2019s needs, you should understand what a SIEM is, how to use it, and how to avoid some of its common pitfalls.<\/p>\n<p><a href=\"https:\/\/www.esecurityplanet.com\/products\/siem-tools\/\"><em>See our in-depth look at the top SIEM tools<\/em><\/a><\/p>\n<h2>What is a SIEM?<\/h2>\n<p>Gartner first coined the term SIEM in 2005 to combine the technologies of security event management (SEM) and security information management (SIM). SIEM technology was designed to collect, analyze, and store log files generated by <a href=\"https:\/\/www.esecurityplanet.com\/products\/edr-solutions\/\">endpoints<\/a> (typically PCs). If the SIEM analysis detected <a href=\"https:\/\/www.esecurityplanet.com\/threats\/malware-types\/\">malware<\/a> or malicious activity, it could generate alerts for a security engineer or <a href=\"https:\/\/www.esecurityplanet.com\/networks\/soc-best-practices\/\">security operations center (SOC)<\/a> to investigate.<\/p>\n<p>Modern SIEM technologies have expanded this original scope in many directions. The log files collected will now typically include data center servers, <a href=\"https:\/\/www.esecurityplanet.com\/cloud\/cnap-platforms-the-next-evolution-of-cloud-security\/\">cloud resources<\/a>, networking equipment, and even devices that fit into the <a href=\"https:\/\/www.esecurityplanet.com\/products\/iot-security-solutions\/\">Internet of Things (IoT)<\/a> or <a href=\"https:\/\/www.esecurityplanet.com\/networks\/critical-infrastructure-protection-physical-cybersecurity\/\">operational technology (OT)<\/a> categories.<\/p>\n<p>SIEM tools now also offer features that can automatically respond to threats instead of waiting for a security technician to review the alerts. Advanced SIEM tools also incorporate <a href=\"https:\/\/www.esecurityplanet.com\/trends\/ai-cybersecurity\/\">artificial intelligence (AI)<\/a> and machine learning (ML) algorithms to analyze logs and trends to proactively identify new alerts and new threats.<\/p>\n<p>In an ideal deployment, SIEMs leverage computers to quickly analyze devices; rapidly detect threats; and enable the computers or humans managing security responses to develop or utilize automated security responses, improved investigation resources, or robust reporting capabilities.<\/p>\n<h2>How Can You Use a SIEM Tool?<\/h2>\n<p>SIEM technologies empower an existing security program, so an IT team cannot deploy a SIEM and expect security responses to magically take place.<\/p>\n<p>Even highly automated SIEM tools require intelligent log file collection, proper configuration, and expert review of results. Fortunately, many consultants and outsourcing experts are available to help those without the internal resources for SIEM setup.<\/p>\n<p>However, even for those intending to make use of extensive outsourcing, a basic understanding of the SIEM technology will help to make sure the chosen vendor is doing their job well. The basics apply to all SIEM technology:<\/p>\n<ul>\n<li><strong>Log File Collection:<\/strong> Log files need to be enabled on all devices we intend to monitor and we will need to make sure those log files can be delivered accurately and intact to the SIEM.<\/li>\n<li><strong>SIEM Configuration:<\/strong> The SIEM may be installed on servers in local data centers, in containers, within cloud resources, or delivered as a service. In all cases, the configuration of the SIEM determines if the logs will be ingested, analyzed, and stored correctly.<\/li>\n<li><strong>Expert Review:<\/strong> Even with highly automated SIEM technology, an expert needs to oversee the potentially hundreds and thousands of logs, alerts, and responses generated by servers and endpoints to verify that no malware is being missed and that false alarms do not significantly impact business operations.<\/li>\n<\/ul>\n<p>For a more thorough overview, check out our <a href=\"https:\/\/www.esecurityplanet.com\/networks\/implementing-and-managing-your-siem-securely\/\">SIEM checklist<\/a>.<\/p>\n<h2>Common SIEM Pitfalls and How to Avoid Them<\/h2>\n<p>Our SIEM checklist covers a number of potential issues, but we will highlight the most critical issues here relating to pitfalls that could undermine the most carefully established SIEM deployment.<\/p>\n<p>In deployment, garbage in, garbage out and alert fatigue represent the most critical issues. These issues will undermine powerful AI engines and cause a security team to miss attacks.<\/p>\n<h3>Garbage in, garbage out<\/h3>\n<p>Garbage in, garbage out pertains to the quality of the log files. During implementation, IT teams must investigate the devices generating log files and the log files themselves very carefully to verify their quality. If log files are generated from infected endpoints, there is a risk in establishing a corrupted device as a baseline and future alerts are jeopardized.<\/p>\n<p>However, if the correct or sufficient log files are not collected, the SIEM will not have the data necessary to generate alerts or to properly analyze the health of the IT environment. Sending garbage to a SIEM will only result in more garbage in the form of bad analysis.<\/p>\n<h3>Alert fatigue<\/h3>\n<p>Alert fatigue develops when alerts are triggered too easily by everyday events in the IT environment. Too many false alarms can make a security team unable to see the real problems lost in the noise. The number of devices, the number of alerts, and the type of issues generating alerts may need to be adjusted to avoid alert fatigue.<\/p>\n<p><a href=\"https:\/\/www.esecurityplanet.com\/products\/best-penetration-testing\/\">Penetration testing<\/a> is one way security teams can reduce unnecessary alerts and check for missing alerts. By intentionally performing activity designed to trigger alerts, security teams and SIEM managers can verify that the most likely attacks will be properly alerted and countered.<\/p>\n<p>Beyond the initial setup, it is important to verify that there are sufficient supporting resources for the SIEM. Alert fatigue may be caused by perfectly reasonable alerts delivered to a <a href=\"https:\/\/www.esecurityplanet.com\/trends\/solving-cybersecurity-skills-gap\/\">short-staffed and overworked security team<\/a>. Reducing alert fatigue can be as simple as right-sizing a security team, so legitimate alerts will not be overlooked by exhausted personnel.<\/p>\n<p><span style=\"font-weight: 400;\">Also read: <\/span><a href=\"https:\/\/www.esecurityplanet.com\/products\/rapid7-insightidr-review\/\"><span style=\"font-weight: 400;\">Testing &amp; Evaluating SIEM Systems: A Review of Rapid7 InsightIDR<\/span><\/a><\/p>\n<h3>Insufficient file storage<\/h3>\n<p>When developing a SIEM strategy, be sure to consider storage needs for log files. Some popular SIEM solutions charge by the amount of data processed and stored by their system, and some data centers may have limited internal storage for log files.<\/p>\n<p>While it may be tempting to cut costs in terms of storage, in the event of an attack, investigators may need an extensive number of logs over an extended period of time to track an attacker\u2019s activities and identify the original entry points. Arbitrary limits on storage for log files could leave an investigation without sufficient information or with increased investigation costs.<\/p>\n<p>Fortunately, modern technology offers many possible solutions for storage. Different SIEM solutions can offer different pricing options, outsourcing can offer discounted rates, and cloud storage resources can be cheap to expand. For those looking to implement or expand a SIEM, be sure to consider future growth, current resources, and SIEM capabilities.<\/p>\n<h2>Choose Your SIEM Carefully<\/h2>\n<p>SIEMs hold enormous potential to turbo-charge <a href=\"https:\/\/www.esecurityplanet.com\/networks\/network-security\/\">security<\/a> for organizations of many sizes. However, the SIEM solution needs to be selected in the context of organization needs and resources. Companies need to frankly consider their capabilities to avoid undermining their security teams with too many alerts, bad alerts, and misaligned infrastructure.<\/p>\n<p>Read next: <a href=\"https:\/\/www.esecurityplanet.com\/networks\/managed-siem\/\">Managed SIEM: A Faster Way to Great Security<\/a><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6d46e8eb53-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6d46e8eb53\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6d46e8eb53\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6d46e8eb53\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6d46e8eb53\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6d46e8eb53\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6d46e8eb53\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Security information and event management (SIEM) technology provides foundational support for threat detection. The high costs of SIEMs once made them feasible only for larger enterprise clients, but they have become more reasonable solutions for smaller organizations over time. While a properly configured SIEM can provide effective threat protection, misuse of SIEM technology can increase [&hellip;]<\/p>\n","protected":false},"author":271,"featured_media":20877,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[14],"tags":[9651,3483],"b2b_audience":[33,35],"b2b_industry":[],"b2b_product":[31776],"class_list":["post-20875","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networks","tag-faq","tag-siem","b2b_audience-awareness-and-consideration","b2b_audience-implementation-and-support","b2b_product-siem"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>SIEM Explained: What is SIEM and How Does it Work? | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"SIEM systems are central to enterprise security. Here&#039;s how the work and how they can protect your network.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/networks\/siem-explained\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SIEM Explained: What is SIEM and How Does it Work? | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"SIEM systems are central to enterprise security. Here&#039;s how the work and how they can protect your network.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/networks\/siem-explained\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-10T20:25:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-22T16:08:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/02\/womanengineer1200-e1644524620837.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Chad Kime\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chad Kime\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/siem-explained\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/siem-explained\/\"},\"author\":{\"name\":\"Chad Kime\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9\"},\"headline\":\"SIEM Explained: What is SIEM and How Does it Work?\",\"datePublished\":\"2022-02-10T20:25:55+00:00\",\"dateModified\":\"2023-03-22T16:08:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/siem-explained\/\"},\"wordCount\":1111,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/siem-explained\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/02\/womanengineer1200-e1644524620837.jpg\",\"keywords\":[\"FAQ\",\"SIEM\"],\"articleSection\":[\"Networks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/siem-explained\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/networks\/siem-explained\/\",\"name\":\"SIEM Explained: What is SIEM and How Does it Work? | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/siem-explained\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/siem-explained\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/02\/womanengineer1200-e1644524620837.jpg\",\"datePublished\":\"2022-02-10T20:25:55+00:00\",\"dateModified\":\"2023-03-22T16:08:49+00:00\",\"description\":\"SIEM systems are central to enterprise security. Here's how the work and how they can protect your network.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/siem-explained\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/networks\/siem-explained\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/siem-explained\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/02\/womanengineer1200-e1644524620837.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/02\/womanengineer1200-e1644524620837.jpg\",\"width\":900,\"height\":600,\"caption\":\"SIEM tutorial\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/siem-explained\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SIEM Explained: What is SIEM and How Does it Work?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9\",\"name\":\"Chad Kime\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg\",\"caption\":\"Chad Kime\"},\"description\":\"eSecurity Planet lead writer Chad Kime covers a variety of security, compliance, and risk topics. Before joining the site, Chad studied electrical engineering at UCLA, earned an MBA from USC, managed 200+ ediscovery cases, and helped market a number of IT and cybersecurity products, then transitioned into technical writing policies and penetration test reports for MSPs and MSSPs. In his free time, Chad enjoys walks on the beach with his wife, annoying his children, and trying to carve out time for movies, books, video games, and bike rides.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/chad-kime\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SIEM Explained: What is SIEM and How Does it Work? | eSecurity Planet","description":"SIEM systems are central to enterprise security. Here's how the work and how they can protect your network.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/networks\/siem-explained\/","og_locale":"en_US","og_type":"article","og_title":"SIEM Explained: What is SIEM and How Does it Work? | eSecurity Planet","og_description":"SIEM systems are central to enterprise security. Here's how the work and how they can protect your network.","og_url":"https:\/\/www.esecurityplanet.com\/networks\/siem-explained\/","og_site_name":"eSecurity Planet","article_published_time":"2022-02-10T20:25:55+00:00","article_modified_time":"2023-03-22T16:08:49+00:00","og_image":[{"width":900,"height":600,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/02\/womanengineer1200-e1644524620837.jpg","type":"image\/jpeg"}],"author":"Chad Kime","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Chad Kime","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/networks\/siem-explained\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/siem-explained\/"},"author":{"name":"Chad Kime","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9"},"headline":"SIEM Explained: What is SIEM and How Does it Work?","datePublished":"2022-02-10T20:25:55+00:00","dateModified":"2023-03-22T16:08:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/siem-explained\/"},"wordCount":1111,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/siem-explained\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/02\/womanengineer1200-e1644524620837.jpg","keywords":["FAQ","SIEM"],"articleSection":["Networks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/networks\/siem-explained\/","url":"https:\/\/www.esecurityplanet.com\/networks\/siem-explained\/","name":"SIEM Explained: What is SIEM and How Does it Work? | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/siem-explained\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/siem-explained\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/02\/womanengineer1200-e1644524620837.jpg","datePublished":"2022-02-10T20:25:55+00:00","dateModified":"2023-03-22T16:08:49+00:00","description":"SIEM systems are central to enterprise security. Here's how the work and how they can protect your network.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/siem-explained\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/networks\/siem-explained\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/networks\/siem-explained\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/02\/womanengineer1200-e1644524620837.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/02\/womanengineer1200-e1644524620837.jpg","width":900,"height":600,"caption":"SIEM tutorial"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/networks\/siem-explained\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"SIEM Explained: What is SIEM and How Does it Work?"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9","name":"Chad Kime","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg","caption":"Chad Kime"},"description":"eSecurity Planet lead writer Chad Kime covers a variety of security, compliance, and risk topics. Before joining the site, Chad studied electrical engineering at UCLA, earned an MBA from USC, managed 200+ ediscovery cases, and helped market a number of IT and cybersecurity products, then transitioned into technical writing policies and penetration test reports for MSPs and MSSPs. In his free time, Chad enjoys walks on the beach with his wife, annoying his children, and trying to carve out time for movies, books, video games, and bike rides.","url":"https:\/\/www.esecurityplanet.com\/author\/chad-kime\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/20875"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/271"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=20875"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/20875\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/20877"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=20875"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=20875"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=20875"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=20875"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=20875"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=20875"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}