Report: SIM Market to Heat Up

Security information management technology to grow as it integrates more closely with network management

Dark Reading logo in a gray background | Dark Reading

The security information management market is about to undergo big changes, as vendors consolidate and integrate their products more closely with traditional security tools, according to a new report just released by The 451 Group.

Changes in SIM technology will also bring security management and network management closer together. (See Blurring the Line Between SOC & NOC.) But that doesn't mean the security operations center (SOC) and the network operations center (NOC) will merge, says Nick Selby, senior analyst and director of the enterprise security practice at The 451 Group.

"We don't believe it will be everyone whistling while they work in a converged NOC and SOC," says Selby, one of the authors of the "Security Information Management Moves Upstream" report. "The SOC won't be eliminated, but you'll see a tighter integration with ITSM [IT service management]."

The 451 Group splits the SIM market into two sectors: enterprise security information management (ESIM), the sector of large enterprises that wants both correlated real-time views of security data and correlated views of archived security events; and the SEM (Security Event Management) sector, which are mid-sized enterprises mostly focused on real-time security data.

"ESIM vendors are seeing they are running out of room in the security space, and that they have quite a bit to offer in network operations." That means SIM products will be more tightly integrated with management monoliths like HP OpenView, IBM/Tivoli, and BMC Patrol, he says.

This churn will come to a head in the next 18 months, according to the report. Mergers and acquisitions -- such as IBM's purchase of risk management firm Consul, which was finalized yesterday -- will intensify. "And enterprises will be slowly but surely adopting these [management tools] and enjoying better integration."

The security team typically has had no say or control over the network, even though security touches the network, he notes. "But the SOC is going to get a bit more control." The NOC has historically been queasy about allowing the security team the ability to make network configuration changes based on security problems, because such changes sometimes lock users out of their authorized applications.

So the integration between the ESIM and ITSM products must offer role-based controls to the security group, the report says, so that a security analyst automatically only sees what he or she needs to see in a network device when checking or fixing a security problem. That "sanitization" is done manually today by network administrators.

ESIM vendor ArcSight's NCM, for instance, includes a wizard-based interface that lets a senior NOC staffer "pre-authorize" certain actions by SOC members to ensure any changes they make don't hurt the network, Selby says.

And there still will be a healthy separation between the NOC and SOC. "For budgetary and organizational reasons, the two sides are completely different. The NOC is busy trying to speed things up. The SOC wants to slow things down and see relationships between things and events."

The 451 Group uses the analogy of traffic cops and homicide detectives to describe the similarities and differences between the NOC and SOC: "Both are for the common good -- to keep people safe -- but the NOC is the traffic cop trying to keep everyone moving, and the SOC is the homicide detective stopping everyone and asking questions."

— Kelly Jackson Higgins, Senior Editor, Dark Reading

Read more about:

2007

About the Author

Kelly Jackson Higgins, Editor-in-Chief, Dark Reading

Kelly Jackson Higgins is the Editor-in-Chief of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise Magazine, Virginia Business magazine, and other major media properties. Jackson Higgins was recently selected as one of the Top 10 Cybersecurity Journalists in the US, and named as one of Folio's 2019 Top Women in Media. She began her career as a sports writer in the Washington, DC metropolitan area, and earned her BA at William & Mary. Follow her on Twitter @kjhiggins.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights