{"id":2383,"date":"2018-04-28T15:05:11","date_gmt":"2018-04-28T13:05:11","guid":{"rendered":"https:\/\/smt.okaia.dev\/?p=2383"},"modified":"2023-12-06T09:01:48","modified_gmt":"2023-12-06T08:01:48","slug":"the-who-what-where-when-and-why-of-an-analytics-driven-security-solution","status":"publish","type":"post","link":"https:\/\/devoud.smtware.com\/?p=2383","title":{"rendered":"The who, what, where, when and why of an analytics-driven security solution."},"content":{"rendered":"<div class=\"cover\">\n   <div class=\"grid-container\">\n      <div class=\"grid-x\">\n         <div class=\"cell large-6\">\n            <h1><\/h1>\n         <\/div>\n      <\/div>\n   <\/div>\n<\/div>\n\n\n\n\n\n<section class=\"tekst-block block  background background-white \" id=\"tekst-block_eb5fabcf71bf0b0cbc5260990221e2a6\">\n    <div class=\"grid-container\">\n        <div class=\"grid-x grid-margin-x align-center\">\n\n            \n                <div class=\"large-8 cell\">\n    \n                       <h3 class=\"\"><\/h3>\n\n                                            <p>We have talked before about how legacy SIEMs are stuck in the past and how large organizations have made the transition to a data-driven solution.<\/p>\n<p>A new buyer\u2019s guide explains what an analytics-driven SIEM solution is, what it is\u00a0<em>not<\/em>, its evolution, what it does and how to determine if it is the right security solution for your organization.<\/p>\n                    \n                            \n\n<style>\n\t.button:hover svg line{\n\t\tstroke: #FC2940 !important;\n\t}\n<\/style>\n                <\/div>\n\n            \n        <\/div>\n    <\/div>\n<\/section>\n\n\n\n<section class=\"form block\" id=\"form-block_1e1876089407c7e9ba297e95c4043782\">\n    <div class=\"grid-container\">\n\n        \n\n\n    \n        <div class=\"grid-x grid-margin-x align-center\">\n\n                            <div class=\"large-4 cell\">\n                    \n                    <p>Get your complimentary copy of\u00a0<em>The SIEM Buyer\u2019s Guide for 2020<\/em>\u00a0and learn:<\/p>\n<ul>\n<li>The limitations of a legacy SIEM solution<\/li>\n<li>The use cases solved by an analytics-driven SIEM solution<\/li>\n<li>The ROI benefits of adopting a modern SIEM solution<\/li>\n<\/ul>\n\n                <\/div>\n            \n            <div class=\"large-5 large-offset-1 cell\">\n\n                                \n\n            <\/div>\n        <\/div>\n\n                \n\n<style>\n\t.button:hover svg line{\n\t\tstroke: #FC2940 !important;\n\t}\n<\/style>\n    <\/div>\n<\/section>","protected":false},"excerpt":{"rendered":"<p>In 2020, Security Information Event Management (SIEM) solutions will be far more than just an information platform. They are expanding fast and include compliance reporting and logs from firewalls and other devices, as well as User and Entity Behavior Analytics\u2014 now considered an essential capability by Gartner. On top of that, the importance of a SIEM solution in today\u2019s enterprise is magnified by the growing sophistication of attacks and the use of cloud services which only increases the attack surface.<\/p>\n","protected":false},"author":10,"featured_media":2527,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"categories":[32],"class_list":["post-2383","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-download-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.4 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>The who, what, where, when and why of an analytics-driven security solution. - SMT<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/devoud.smtware.com\/?p=2383\" \/>\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The who, what, where, when and why of an analytics-driven security solution.\" \/>\n<meta property=\"og:description\" content=\"In 2020, Security Information Event Management (SIEM) solutions will be far more than just an information platform. They are expanding fast and include compliance reporting and logs from firewalls and other devices, as well as User and Entity Behavior Analytics\u2014 now considered an essential capability by Gartner. On top of that, the importance of a SIEM solution in today\u2019s enterprise is magnified by the growing sophistication of attacks and the use of cloud services which only increases the attack surface.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/devoud.smtware.com\/?p=2383\" \/>\n<meta property=\"og:site_name\" content=\"SMT\" \/>\n<meta property=\"article:published_time\" content=\"2018-04-28T13:05:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-12-06T08:01:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/devoud.smtware.com\/wp-content\/uploads\/2022\/08\/Header-how.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1070\" \/>\n\t<meta property=\"og:image:height\" content=\"709\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Bastiaan ter Mors\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/devoud.smtware.com\\\/?p=2383#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/devoud.smtware.com\\\/?p=2383\"},\"author\":{\"name\":\"Bastiaan ter Mors\",\"@id\":\"https:\\\/\\\/devoud.smtware.com\\\/#\\\/schema\\\/person\\\/44c05a8bb28555754221015965884329\"},\"headline\":\"The who, what, where, when and why of an analytics-driven security solution.\",\"datePublished\":\"2018-04-28T13:05:11+00:00\",\"dateModified\":\"2023-12-06T08:01:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/devoud.smtware.com\\\/?p=2383\"},\"wordCount\":12,\"publisher\":{\"@id\":\"https:\\\/\\\/devoud.smtware.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/devoud.smtware.com\\\/?p=2383#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/devoud.smtware.com\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/Header-how.jpg\",\"articleSection\":[\"Download\"],\"inLanguage\":\"nl-NL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/devoud.smtware.com\\\/?p=2383\",\"url\":\"https:\\\/\\\/devoud.smtware.com\\\/?p=2383\",\"name\":\"The who, what, where, when and why of an analytics-driven security solution. - SMT\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/devoud.smtware.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/devoud.smtware.com\\\/?p=2383#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/devoud.smtware.com\\\/?p=2383#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/devoud.smtware.com\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/Header-how.jpg\",\"datePublished\":\"2018-04-28T13:05:11+00:00\",\"dateModified\":\"2023-12-06T08:01:48+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/devoud.smtware.com\\\/?p=2383#breadcrumb\"},\"inLanguage\":\"nl-NL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/devoud.smtware.com\\\/?p=2383\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/devoud.smtware.com\\\/?p=2383#primaryimage\",\"url\":\"https:\\\/\\\/devoud.smtware.com\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/Header-how.jpg\",\"contentUrl\":\"https:\\\/\\\/devoud.smtware.com\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/Header-how.jpg\",\"width\":1070,\"height\":709},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/devoud.smtware.com\\\/?p=2383#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/devoud.smtware.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The who, what, where, when and why of an analytics-driven security solution.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/devoud.smtware.com\\\/#website\",\"url\":\"https:\\\/\\\/devoud.smtware.com\\\/\",\"name\":\"SMT\",\"description\":\"Data zonder gedoe\",\"publisher\":{\"@id\":\"https:\\\/\\\/devoud.smtware.com\\\/#organization\"},\"alternateName\":\"SMT - Simple Management Technologies\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/devoud.smtware.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nl-NL\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/devoud.smtware.com\\\/#organization\",\"name\":\"SMT\",\"alternateName\":\"SMT - Simple Management Technologies\",\"url\":\"https:\\\/\\\/devoud.smtware.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/devoud.smtware.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/devoud.smtware.com\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/SMT-Logo-circle.png\",\"contentUrl\":\"https:\\\/\\\/devoud.smtware.com\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/SMT-Logo-circle.png\",\"width\":1281,\"height\":1281,\"caption\":\"SMT\"},\"image\":{\"@id\":\"https:\\\/\\\/devoud.smtware.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/smt-simple-management-technologies-b.v.\"],\"description\":\"SMT is een vooraanstaande leverancier van innovatieve data-engineeringoplossingen, gespecialiseerd in cyber security, ITOps en DevOps. Met een passie voor het maximaliseren van de waarde van data, in samenwerking met Splunk en Cribl, helpen we organisaties om waardevolle inzichten te verkrijgen uit complexe datasets. Ons team van gecertificeerde, ervaren en gepassioneerde professionals is gericht op het leveren van waardegedreven data-integratie- en engineeringdiensten om organisaties te ondersteunen bij hun data-uitdagingen. Met uitgebreide expertise in Splunk-technologie\u00ebn bieden we onze klanten krachtige analyse- en monitoringmogelijkheden.\",\"email\":\"info@devoud.smtware.com\",\"telephone\":\"+31 (0)88 018 41 00\",\"legalName\":\"SMT - Simple Management Technologies\",\"foundingDate\":\"1997-10-01\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"11\",\"maxValue\":\"50\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/devoud.smtware.com\\\/#\\\/schema\\\/person\\\/44c05a8bb28555754221015965884329\",\"name\":\"Bastiaan ter Mors\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/97f976171114ac1687d828f1935c38303824dd2e69029d7d4b01b918435d82e7?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/97f976171114ac1687d828f1935c38303824dd2e69029d7d4b01b918435d82e7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/97f976171114ac1687d828f1935c38303824dd2e69029d7d4b01b918435d82e7?s=96&d=mm&r=g\",\"caption\":\"Bastiaan ter Mors\"},\"url\":\"https:\\\/\\\/devoud.smtware.com\\\/?author=10\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The who, what, where, when and why of an analytics-driven security solution. - SMT","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/devoud.smtware.com\/?p=2383","og_locale":"nl_NL","og_type":"article","og_title":"The who, what, where, when and why of an analytics-driven security solution.","og_description":"In 2020, Security Information Event Management (SIEM) solutions will be far more than just an information platform. They are expanding fast and include compliance reporting and logs from firewalls and other devices, as well as User and Entity Behavior Analytics\u2014 now considered an essential capability by Gartner. On top of that, the importance of a SIEM solution in today\u2019s enterprise is magnified by the growing sophistication of attacks and the use of cloud services which only increases the attack surface.","og_url":"https:\/\/devoud.smtware.com\/?p=2383","og_site_name":"SMT","article_published_time":"2018-04-28T13:05:11+00:00","article_modified_time":"2023-12-06T08:01:48+00:00","og_image":[{"width":1070,"height":709,"url":"https:\/\/devoud.smtware.com\/wp-content\/uploads\/2022\/08\/Header-how.jpg","type":"image\/jpeg"}],"author":"Bastiaan ter Mors","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/devoud.smtware.com\/?p=2383#article","isPartOf":{"@id":"https:\/\/devoud.smtware.com\/?p=2383"},"author":{"name":"Bastiaan ter Mors","@id":"https:\/\/devoud.smtware.com\/#\/schema\/person\/44c05a8bb28555754221015965884329"},"headline":"The who, what, where, when and why of an analytics-driven security solution.","datePublished":"2018-04-28T13:05:11+00:00","dateModified":"2023-12-06T08:01:48+00:00","mainEntityOfPage":{"@id":"https:\/\/devoud.smtware.com\/?p=2383"},"wordCount":12,"publisher":{"@id":"https:\/\/devoud.smtware.com\/#organization"},"image":{"@id":"https:\/\/devoud.smtware.com\/?p=2383#primaryimage"},"thumbnailUrl":"https:\/\/devoud.smtware.com\/wp-content\/uploads\/2022\/08\/Header-how.jpg","articleSection":["Download"],"inLanguage":"nl-NL"},{"@type":"WebPage","@id":"https:\/\/devoud.smtware.com\/?p=2383","url":"https:\/\/devoud.smtware.com\/?p=2383","name":"The who, what, where, when and why of an analytics-driven security solution. - SMT","isPartOf":{"@id":"https:\/\/devoud.smtware.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/devoud.smtware.com\/?p=2383#primaryimage"},"image":{"@id":"https:\/\/devoud.smtware.com\/?p=2383#primaryimage"},"thumbnailUrl":"https:\/\/devoud.smtware.com\/wp-content\/uploads\/2022\/08\/Header-how.jpg","datePublished":"2018-04-28T13:05:11+00:00","dateModified":"2023-12-06T08:01:48+00:00","breadcrumb":{"@id":"https:\/\/devoud.smtware.com\/?p=2383#breadcrumb"},"inLanguage":"nl-NL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/devoud.smtware.com\/?p=2383"]}]},{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/devoud.smtware.com\/?p=2383#primaryimage","url":"https:\/\/devoud.smtware.com\/wp-content\/uploads\/2022\/08\/Header-how.jpg","contentUrl":"https:\/\/devoud.smtware.com\/wp-content\/uploads\/2022\/08\/Header-how.jpg","width":1070,"height":709},{"@type":"BreadcrumbList","@id":"https:\/\/devoud.smtware.com\/?p=2383#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/devoud.smtware.com\/"},{"@type":"ListItem","position":2,"name":"The who, what, where, when and why of an analytics-driven security solution."}]},{"@type":"WebSite","@id":"https:\/\/devoud.smtware.com\/#website","url":"https:\/\/devoud.smtware.com\/","name":"SMT","description":"Data zonder gedoe","publisher":{"@id":"https:\/\/devoud.smtware.com\/#organization"},"alternateName":"SMT - Simple Management Technologies","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/devoud.smtware.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl-NL"},{"@type":"Organization","@id":"https:\/\/devoud.smtware.com\/#organization","name":"SMT","alternateName":"SMT - Simple Management Technologies","url":"https:\/\/devoud.smtware.com\/","logo":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/devoud.smtware.com\/#\/schema\/logo\/image\/","url":"https:\/\/devoud.smtware.com\/wp-content\/uploads\/2024\/02\/SMT-Logo-circle.png","contentUrl":"https:\/\/devoud.smtware.com\/wp-content\/uploads\/2024\/02\/SMT-Logo-circle.png","width":1281,"height":1281,"caption":"SMT"},"image":{"@id":"https:\/\/devoud.smtware.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/smt-simple-management-technologies-b.v."],"description":"SMT is een vooraanstaande leverancier van innovatieve data-engineeringoplossingen, gespecialiseerd in cyber security, ITOps en DevOps. Met een passie voor het maximaliseren van de waarde van data, in samenwerking met Splunk en Cribl, helpen we organisaties om waardevolle inzichten te verkrijgen uit complexe datasets. Ons team van gecertificeerde, ervaren en gepassioneerde professionals is gericht op het leveren van waardegedreven data-integratie- en engineeringdiensten om organisaties te ondersteunen bij hun data-uitdagingen. Met uitgebreide expertise in Splunk-technologie\u00ebn bieden we onze klanten krachtige analyse- en monitoringmogelijkheden.","email":"info@devoud.smtware.com","telephone":"+31 (0)88 018 41 00","legalName":"SMT - Simple Management Technologies","foundingDate":"1997-10-01","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"11","maxValue":"50"}},{"@type":"Person","@id":"https:\/\/devoud.smtware.com\/#\/schema\/person\/44c05a8bb28555754221015965884329","name":"Bastiaan ter Mors","image":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/secure.gravatar.com\/avatar\/97f976171114ac1687d828f1935c38303824dd2e69029d7d4b01b918435d82e7?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/97f976171114ac1687d828f1935c38303824dd2e69029d7d4b01b918435d82e7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/97f976171114ac1687d828f1935c38303824dd2e69029d7d4b01b918435d82e7?s=96&d=mm&r=g","caption":"Bastiaan ter Mors"},"url":"https:\/\/devoud.smtware.com\/?author=10"}]}},"_links":{"self":[{"href":"https:\/\/devoud.smtware.com\/index.php?rest_route=\/wp\/v2\/posts\/2383","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/devoud.smtware.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/devoud.smtware.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/devoud.smtware.com\/index.php?rest_route=\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/devoud.smtware.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2383"}],"version-history":[{"count":0,"href":"https:\/\/devoud.smtware.com\/index.php?rest_route=\/wp\/v2\/posts\/2383\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/devoud.smtware.com\/index.php?rest_route=\/wp\/v2\/media\/2527"}],"wp:attachment":[{"href":"https:\/\/devoud.smtware.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2383"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/devoud.smtware.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2383"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}