Q1 : What does SIEM stand for and what is it about?
A : SIEM stands for Security Information and Event management.
So this is a platform where a holistic view of the security process implemented within the organization. The letter e is silent and it is addressed as “SIM” platform. Basically, in this process, the data is all gathered into one secure repository where the logs are used for future security analysis. This process is widely used in Payment Card Industry. It is actually classified as a data security standard in Payment Card industry.
Q2 : How does ArcSight ESM provide Powerful real-time data correlation?
A : Well, ArcSight ESM provides powerful real-time data correlation by processing number of events per second. Based on this analysis a more accurate outcome is proposed. So based on this analysis, the threats that violate the internal rules are escalated within the platform. ESM actually processes 75,000 events per second basis.
A : The key features of
- Enriched Security Event data
- Powerful real-time data visualization and correlation
- Automated workflows
- Security process optimized
- ArcSight Enterprise Security Manager tool is compatible with ArcSight Data Platform and ArcSight Investigate
Q4 : What is SIEM tool, explain briefly?
A : In the field of Information technology and computer security, products which provide or offer services like real-time security generated alerts analysis can be categorized as SIEM tool.
Q5 : What does ArcSight Connectors mean?
A : The main use of ArcSight Connectors is listed below:
** With the use of ArcSight connectors, the user can actually automate the process of collecting and managing the logs irrespective of the device. All the data can be normalized into a CEF, i.e. Common Event Format
** ArcSight connectors provide a bunch of universal data collections from different unique devices.
Q6 : What does IDS stand for?
A : IDS stands for “Intrusion Detection System”. This is the main component when it comes to ArcSight ESM.
Q7 : What are the system requirements for implementing ArcSight ESM?
A : Supported Operating systems are:
- Red Hat Enterprise Linux Version 6.2, 64 bit CPU
- Memory 16-36GB
- Disk space for 2-4 TB
- Average Compression of 10:1 SAS 15K RPM
A : The key capabilities of ArcSight Logger
- It collects logs from any sort of log generating source
- After collecting the data, it categorizes and registers as Common Event Format (CEF)
- These events can be searched with the use of a simple interface
- It can handle and store years worth of logs information
- It is perfect for automation analysis which can be later used for reporting, the intelligence of logs or events for IT Security purposes and logs analytics.
Q9 : What is the main purpose of ArcSight Express?
A : Basically, ArcSight Express provides the same functionalities that they do at ArcSight ESM but at a very much smaller scale. ArcSight Express analyzes threats within a database and provides possible action item.
Q10 : What does ArcSight Manager do, explain in brief?
A : The use of ArcSight manager is to simply put in place robust security parameters within the organization. So it is one of the high-performance service engines which actually filters, manages, correlates all security-related events that are collected by the IT system.
The main parts that are essential for the ArcSight manager to work appropriately is:
** ArcSight Console
** ACC
** CORR Engine
** ArcSight SmartConnectors
The operational environment for ArcSight Manager is nothing but the underlying OS and the file system that are in place.
A : The following are the important points about
- With this tool, administrators and analyst can actually detect more incidents
- Operate more efficiently
- The same data set can be used for real-time correlation of the data and log management application can use the same dataset.
Q12 : What is the main use of ArcSight Logger?
A : The main use of ArcSight Logger is to capture or stream real-time data and categorize them into different buckets of specific logs.
A : The core offering of ArcSight ESM is:
- Analyzes different threats to a database
- Checks with the logs that were captured
- Provide possible solutions or advice based on the risk level
Q14 : How can ArcSight ESM help organizations in terms of security aspects?
A : Well, ArcSight ESM can help the organizations building more enhanced use cases to improve the APT’s ( Advanced Persistent Threats)which will allow a faster and targeted response in a timely fashion.
Q15 : What is a SOC team?
A
So basically this is a center for all the websites, applications, databases, data centers and servers, networks are duly monitored and analyzed and well defended.
Q16 : What does ArcSight Logger do?
A : So, ArcSight Logger is nothing but a log management solution that can be used widely in security practices. So using solution, the users will be able to capture and analyze different type of log data and provide necessary inputs to all the individual’s teams so their questions are answered. Eventually, this can be expanded into an enterprise level log management solution if needed.
So using this solution, topics like compliance and risk management are taken into due consideration. Also, the data can be used for searching, indexing, reporting, analysis purposes, and retention as well.
Q17 : What can be done using ArcSight ESM?
A : ArcSight ESM actually helps the organizations and the individuals as below:
All the event data is collected centrally and stored and monitor
User-friendly compliance reporting in a single touch provides necessary data in an appropriate format.
Has an ability to monitor and mitigate the risk.
Eliminates manual process as much as possible
Saves valuable hours of security analyst where they spend on false alarms
Brings awareness to the team about the security process in place and the countermeasures implemented.
A : Well, most of the small companies don’t have enough manpower to make sure that their security process is intact. But they won’t be able to be proactive and warn the team that there might be a possible threat attack, this is because they don’t have any automatic mechanism which triggers a threat attack. So to solve the