SIEM (Security Information and Event Management) is a system, an application or a solution where IT security information is concentrated. It is a fundamental principle in the creation of a security event management system.
In 2003, Gartner was the benchmark on the formalization of SIEM technology, as can be evidenced in the first Gartner chart. In 2011, McGraw Hill published the first book on SIEM, "Security Information Event Management (SIEM) Implementation", also written by David R. Miller, Shon Harris, Allen A. Harper, Stephen VanDyke and Chris Blask.
A book that talks about what were considered, at the time, the leading SIEMs: OSSIM, Cisco MARS, Q1 and Arcsight. However, some of these names are no longer circulating on the web, as they were absorbed or transformed by other organizations.
We have seen the arrival of DR (Detection and Response), EDR, NDR, XDR ... systems. And so on, multiple technologies that have changed more in name than in technology per se. SIEM has gone through Next-Generation SIEM, Security Analytics and is now an MDR service.
In its development process, SIEM was considered a log manager, a regulatory compliance tool for: event correlation, active response and endpoint security.
Correlation is the basis of information intelligence, an intelligent SIEM is one that has the ability to develop better and different forms of correlations, which will ultimately have a greater impact on organizations.
If the SIEM is the heart of the SOC, correlation is the brain of the SIEM, and this is where all manufacturers should bet on creating better ways of correlating information, since the intelligence they can generate will trigger the ability to detect and respond quickly to incidents.
Automation is now SOAR and the future of this will be oriented in more fast streamlined SecDevOps-like models with recipes and playbooks. The more infrastructure we have as code, the more correlation will trigger events that execute playbooks, and these in turn will produce more events for better playbooks. Thus generating a work cycle for better reaction to different security incidents.
Right now SOAR must evolve to create better playbooks or adaptive recipes so that the work becomes more collaborative and replicated. We will see SOAR systems adapting faster and better to different technologies, both those that are emerging and those that are established.
Now we can see that this functionality has been relegated to EDR, proprietary information gathering systems, Machine Learning and rule-less detection capabilities for early threat detection and reaction. SIEM still has high value versus EDR, as we must bring data from one tool to the other in order to identify, contain and secure the infrastructure with an enhanced view of what is happening at the endpoint. The SIEM system will continue to evolve to better support the integration of EDR systems and build knowledge bases for organizations.
Although it contains some of these elements, SIEM has changed over the last 15 years, becoming the nerve center of the security incident detection and response strategy, it is the heart of the SOC.