Security Information Event Management (SIEM)

SIEM is a Security Information Event Management system that combines outputs from multiple sources to provide visibility into an organization’s network infrastructure. SIEM provides real-time analysis of security alerts generated by network hardware and applications, by correlating events from critical assets to provide actionable threat intelligence. A properly configured SIEM can help detect threats and decrease the amount of time a malicious adversary may be in/on a network.

Network Intrusion Detection System (NIDS)

NIDS is a system that monitors network traffic for malicious activity or policy violations. Any detected activity or violation is typically reported either to security personnel or collected centrally using a security information and event management (SIEM) system.

Host-based Intrusion Detection System (HIDS)

HIDS is a software application that monitors a critical host system for malicious activity or policy violations. A HIDS agent utilizes various detection methods including; log monitoring and collection, rootkit detection, file integrity and windows registry monitoring, and can alert security personnel of specific events and configuration changes.

File Integrity Monitoring (FIM)

FIM is an internal control or process that validates the integrity of operating systems and application software files using a checksum verification method between the current state of a file and a previous baseline.

Intrusion Detection System (IDS)

includes NIDS, HIDS, and FIM.

Does your organization incorporate any of these?

Vertek Managed Threat Intelligence (MTI) incorporates SIEM, NIDS, HIDS and FIM into the Managed Threat Intelligence solution.

    • No outlay of upfront capital or churn for these technologies; predictable operating expense
    • Comprehensive view of what is happening real time with your assets
    • Real-time continuous threat intelligence
    • Asset Discovery; find and validate all assets on your network
    • Monitor trends and behavior; identify suspicious behavior and potentially compromised systems
    • Detect malicious traffic on your network