Reference Hub2
Mitigating Risk: Analysis of Security Information and Event Management

Mitigating Risk: Analysis of Security Information and Event Management

Ken Lozito
Copyright: © 2011 |Volume: 2 |Issue: 2 |Pages: 9
ISSN: 1947-3591|EISSN: 1947-3605|EISBN13: 9781613505908|DOI: 10.4018/jbir.2011040105
Cite Article Cite Article

MLA

Lozito, Ken. "Mitigating Risk: Analysis of Security Information and Event Management." IJBIR vol.2, no.2 2011: pp.67-75. http://doi.org/10.4018/jbir.2011040105

APA

Lozito, K. (2011). Mitigating Risk: Analysis of Security Information and Event Management. International Journal of Business Intelligence Research (IJBIR), 2(2), 67-75. http://doi.org/10.4018/jbir.2011040105

Chicago

Lozito, Ken. "Mitigating Risk: Analysis of Security Information and Event Management," International Journal of Business Intelligence Research (IJBIR) 2, no.2: 67-75. http://doi.org/10.4018/jbir.2011040105

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Business Intelligence (BI) has often been described as the tools and systems that play an essential role in the strategic planning process of a corporation. The application of BI is most commonly associated with the analysis of sales and stock trends, pricing and customer behavior to inform business decision-making. There is a growing trend in utilizing the tools and processes used in the analysis of data and applying them to security event management. Security Information and Event Management (SIEM) has emerged within the last 10 years providing a centralized source to enable both real-time and deep level analysis of historical event data to drive security standards and align IT resources in a more efficient manner.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.