Andrea Danti - Fotolia

How can SIEM and SOAR software work together?

Many security pros initially thought SOAR software could replace SIEM. Our security expert advocates learning how SIEM and SOAR can work together.

Ask cybersecurity administrators whether they prefer SIEM or SOAR software, and odds are the answer is "both." While some IT shops could get away with using one or the other, they are best deployed as complementary products.

Security information and event management (SIEM) is great at ingesting traditional log and event data sourced from local infrastructure equipment, including firewalls, intrusion prevention systems (IPS), network gear, servers and applications. All data is aggregated, and analysis is applied to correlate logs and events into alerts to be investigated. The problem is that SIEM can produce far more alerts than can be handled by the cybersecurity team. On the other hand, security orchestration automation and response (SOAR) software can ingest not only local log and event data, but also external threat data coming from endpoint security software and third-party threat intelligence feeds. A SOAR software platform also uses advanced artificial intelligence and external integrations that automate the creation of actionable investigation workflows that IT follows when tracking down security events. This significantly reduces the time required to remediate or clear events.

SIEM is still good at pulling in local security log and event information. While SOAR software could be used in its place, it wasn't designed to replace SIEM. SIEM can be used in conjunction with SOAR to help create investigation workflow based on data pulled in from both SIEM and SOAR sources. SOAR can also go one step further to integrate third-party security tools to automate specific actions after events are analyzed and determined to include vulnerabilities.

Dig Deeper on Threat detection and response

Networking
CIO
Enterprise Desktop
  • Understanding how GPOs and Intune interact

    Group Policy and Microsoft Intune are both mature device management technologies with enterprise use cases. IT should know how to...

  • Comparing MSI vs. MSIX

    While MSI was the preferred method for distributing enterprise applications for decades, the MSIX format promises to improve upon...

  • How to install MSIX and msixbundle

    IT admins should know that one of the simplest ways to deploy Windows applications across a fleet of managed desktops is with an ...

Cloud Computing
ComputerWeekly.com
Close