{"id":229,"date":"2013-04-05T00:00:00","date_gmt":"2013-04-05T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/04\/05\/is-there-any-real-measurement-in-monitoring\/"},"modified":"2021-12-30T11:36:47","modified_gmt":"2021-12-30T11:36:47","slug":"is-there-any-real-measurement-in-monitoring","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/04\/05\/is-there-any-real-measurement-in-monitoring\/","title":{"rendered":"Is There Any Real Measurement In Monitoring?"},"content":{"rendered":"<p>Almost as soon as &#8220;Big Data&#8221; came along, there was someone to explain that it wasn\u2019t the size that mattered; it was how you used it. Vendors touted their &#8220;line speed&#8221; or their ability to do all their analysis in-memory (since writing to disk tends to slow down the pipe a lot). We\u2019ve known for a long time that stateful firewalls, IDS\/IPS and web application firewalls magically get a lot faster if you turn enough high-level checks off. Vendors also tout the number of inputs that go into their offerings: how many other security technologies they integrate with (where &#8220;integrate&#8221; may just mean &#8220;we consume syslog, CSV and XML&#8221;). If you want to get fancier than just saying what data formats you accept, you can say you have an API, regardless of how many other tools actually use it.<\/p>\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>After the analytics skirmishes, the other kind of &#8220;intelligence&#8221; came up, namely the number and variety of additional inputs to the algorithms: reputation, geolocation, indicators of compromise, or possibly the number of former government intelligence analysts in the research team (and\/or on the board of directors).<\/p>\n<p style=\"margin: 0px;\">And then it\u2019s back to numbers: the number of external intelligence feeds that are used to enrich the data that the monitoring system processes.<\/p>\n<p style=\"margin: 0px;\">Can one system produce data that is &#8220;more actionable&#8221; than another one, and if so, how do you prove it?<\/p>\n<p style=\"margin: 0px;\">Not only will the data be processed &#8220;live&#8221; (which is supposed to be better than &#8220;real-time,&#8221; I understand \u2013 or maybe it\u2019s the other way around), but it\u2019ll be newer than anyone else\u2019s data, still dewy from the data fields.<\/p>\n<p style=\"margin: 0px;\"><\/p>\n<p style=\"margin: 0px;\">One thing\u2019s for sure: buyers will still be wading through the marketing morass, trying to search out bits of dry land that will hold up to a purchasing decision. Not only will they have trouble differentiating vendors and their offerings; they\u2019ll also struggle to find metrics that tell them when their monitoring is good enough.<\/p>\n<p style=\"margin: 0px;\"><\/p>\n<p style=\"margin: 0px;\">Link: <a href=\"http:\/\/www.darkreading.com\/security-monitoring\/blog\/240152343\/is-there-any-real-measurement-in-monitoring.html\">http:\/\/www.darkreading.com\/security-monitoring\/blog\/240152343\/is-there-any-real-measurement-in-monitoring.html<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-229","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/229","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=229"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/229\/revisions"}],"predecessor-version":[{"id":2716,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/229\/revisions\/2716"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=229"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=229"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=229"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}