{"id":301,"date":"2019-12-26T11:04:08","date_gmt":"2019-12-26T09:04:08","guid":{"rendered":"http:\/\/itis-adobe.bmg-ua.com\/?page_id=301"},"modified":"2021-04-26T16:57:52","modified_gmt":"2021-04-26T14:57:52","slug":"siem","status":"publish","type":"page","link":"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/siem\/","title":{"rendered":"SIEM. Security Information and Event Management"},"content":{"rendered":"\n\n\t<section class=\"lightBg\">\n        <div class=\"container\">\n            <div class=\"blocks project_inside\">\n                <div class=\"content_solution\">\n                    <div class=\"center\"><h1>SIEM. Security Information and Event Management<\/h1><\/div>\n\t\t\t\t\t<p>Provides real-time analysis of, and response to, security events. Automatic generation of incident database. Automation of incident management process and continuity of business processes.&nbsp;<\/p>\n<p>Functionality:<br>\n<\/p><ul class=\"type1\"><li>data aggregation;<\/li><li>correlation;<\/li><li>notification;<\/li><li>display;<\/li><li>transformation;<\/li><li>data storage;<\/li><li>expert analysis.<\/li><\/ul>\n\n\t\t\t\t\t<div class=\"center p30\"><button class=\"button empty\" id=\"myModalButContent\" data-toggle=\"modal\" data-send=\"\u041a\u043d\u043e\u043f\u043a\u0430 \u0432 \u0442\u0435\u043a\u0441\u0442\u0435 \u0441\u0442\u0440\u0430\u043d\u0438\u0446\u044b. \u0421\u0442\u0440\u0430\u043d\u0438\u0446\u0430 SIEM. Security Information and Event Management\" data-ga=\"gtag('event', 'event_name', {'event_category': 'consultationSIEM', 'event_action': 'send_SIEM'});\" data-target=\"#myModal\">REQUEST A CONSULTATION<\/button><\/div>\n\t\t\t\t<\/div>\n                <div class=\"sidebar_solution\">\n\t\t\t\t\t<div class=\"blocks sidebar\">\n\t\t\t\t\t\t<div class=\"block \">\n                            <h3>Business value<\/h3>\n\t\t\t\t\t\t\t<h4><img class=\"alignnone size-full wp-image-1762\" src=\"https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/03\/speed.png\" alt width=\"40\" height=\"40\">&nbsp;Proactive incident response&nbsp;<\/h4>\n<h4><img class=\"alignnone size-full wp-image-1763\" src=\"https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/03\/sticker.png\" alt width=\"40\" height=\"40\"> Automation of information security processes<\/h4>\n<h4><img class=\"alignnone size-full wp-image-1734\" src=\"https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/03\/brainstorm.png\" alt width=\"40\" height=\"40\"> Creation of company security monitoring centre<\/h4>\n\n                        <\/div>\n\t\t\t\t\t\t<div class=\"block \">\n                            <h3>Partners<\/h3>\n\t\t\t\t\t\t\t<div class=\"blocks solutions_partner\">\n\t\t\t\t\t\t\t\t<div class=\"block\">\n\t\t\t\t\t\t\t\t\t<img class=\"full\" src=\"https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/04\/mcafee_partner.png\">\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"block\">\n\t\t\t\t\t\t\t\t\t<img class=\"full\" src=\"https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/04\/micro_focus_partner.png\">\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"block\">\n\t\t\t\t\t\t\t\t\t<img class=\"full\" src=\"https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/04\/exabeam_partner.png\">\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"block\">\n\t\t\t\t\t\t\t\t\t<img class=\"full\" src=\"https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/04\/fortinet_partner-1.png\">\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"block\">\n\t\t\t\t\t\t\t\t\t<img class=\"full\" src=\"https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/04\/rapid_7_partner.png\">\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n                        <\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n            <\/div>\n        <\/div>\n    <\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":2613,"parent":214,"menu_order":7,"comment_status":"closed","ping_status":"closed","template":"","meta":{"wp_typography_post_enhancements_disabled":false},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>SIEM \u0441\u0438\u0441\u0442\u0435\u043c\u0438 | \u0423\u043f\u0440\u0430\u0432\u043b\u0456\u043d\u043d\u044f \u043f\u043e\u0434\u0456\u044f\u043c\u0438 \u0442\u0430 \u0456\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 | \u0406\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u0430 \u0431\u0435\u0437\u043f\u0435\u043a\u0430 | ITIS<\/title>\n<meta name=\"description\" content=\"\u041f\u0456\u0434\u0431\u0456\u0440, \u0432\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u043d\u044f \u0442\u0430 \u043d\u0430\u043b\u0430\u0448\u0442\u0443\u0432\u0430\u043d\u043d\u044f Security Information and Event Management \u0441\u0438\u0441\u0442\u0435\u043c \u0432\u0456\u0434 McAfee, Exabeam, Microfocus.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/siem\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SIEM \u0441\u0438\u0441\u0442\u0435\u043c\u0438 | \u0423\u043f\u0440\u0430\u0432\u043b\u0456\u043d\u043d\u044f \u043f\u043e\u0434\u0456\u044f\u043c\u0438 \u0442\u0430 \u0456\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 | \u0406\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u0430 \u0431\u0435\u0437\u043f\u0435\u043a\u0430 | ITIS\" \/>\n<meta property=\"og:description\" content=\"\u041f\u0456\u0434\u0431\u0456\u0440, \u0432\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u043d\u044f \u0442\u0430 \u043d\u0430\u043b\u0430\u0448\u0442\u0443\u0432\u0430\u043d\u043d\u044f Security Information and Event Management \u0441\u0438\u0441\u0442\u0435\u043c \u0432\u0456\u0434 McAfee, Exabeam, Microfocus.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/siem\/\" \/>\n<meta property=\"og:site_name\" content=\"ITIS \u0441\u0438\u0441\u0442\u0435\u043c\u043d\u0430 \u0456\u043d\u0442\u0435\u0433\u0440\u0430\u0446\u0456\u044f\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-26T14:57:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/04\/SIEM.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"1068\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.itis.net.ua\/#website\",\"url\":\"https:\/\/www.itis.net.ua\/\",\"name\":\"ITIS \\u0441\\u0438\\u0441\\u0442\\u0435\\u043c\\u043d\\u0430 \\u0456\\u043d\\u0442\\u0435\\u0433\\u0440\\u0430\\u0446\\u0456\\u044f\",\"description\":\"\\u041f\\u0440\\u043e\\u0444\\u0435\\u0441\\u0456\\u0439\\u043d\\u0430 I\\u0422-\\u043f\\u0456\\u0434\\u0442\\u0440\\u0438\\u043c\\u043a\\u0430 \\u0412\\u0430\\u0448\\u043e\\u0433\\u043e \\u0431\\u0456\\u0437\\u043d\\u0435\\u0441\\u0443\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.itis.net.ua\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/siem\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/04\/SIEM.jpg\",\"contentUrl\":\"https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/04\/SIEM.jpg\",\"width\":1600,\"height\":1068},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/siem\/#webpage\",\"url\":\"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/siem\/\",\"name\":\"SIEM \\u0441\\u0438\\u0441\\u0442\\u0435\\u043c\\u0438 | \\u0423\\u043f\\u0440\\u0430\\u0432\\u043b\\u0456\\u043d\\u043d\\u044f \\u043f\\u043e\\u0434\\u0456\\u044f\\u043c\\u0438 \\u0442\\u0430 \\u0456\\u043d\\u0446\\u0438\\u0434\\u0435\\u043d\\u0442\\u0430\\u043c\\u0438 | \\u0406\\u043d\\u0444\\u043e\\u0440\\u043c\\u0430\\u0446\\u0456\\u0439\\u043d\\u0430 \\u0431\\u0435\\u0437\\u043f\\u0435\\u043a\\u0430 | ITIS\",\"isPartOf\":{\"@id\":\"https:\/\/www.itis.net.ua\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/siem\/#primaryimage\"},\"datePublished\":\"2019-12-26T09:04:08+00:00\",\"dateModified\":\"2021-04-26T14:57:52+00:00\",\"description\":\"\\u041f\\u0456\\u0434\\u0431\\u0456\\u0440, \\u0432\\u0441\\u0442\\u0430\\u043d\\u043e\\u0432\\u043b\\u0435\\u043d\\u043d\\u044f \\u0442\\u0430 \\u043d\\u0430\\u043b\\u0430\\u0448\\u0442\\u0443\\u0432\\u0430\\u043d\\u043d\\u044f Security Information and Event Management \\u0441\\u0438\\u0441\\u0442\\u0435\\u043c \\u0432\\u0456\\u0434 McAfee, Exabeam, Microfocus.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/siem\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/siem\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/siem\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Main\",\"item\":\"https:\/\/www.itis.net.ua\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\\u041d\\u0430\\u0448\\u0456 \\u0440\\u0456\\u0448\\u0435\\u043d\\u043d\\u044f\",\"item\":\"https:\/\/www.itis.net.ua\/solution\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"\\u041a\\u0438\\u0431\\u0435\\u0440\\u0431\\u0435\\u0437\\u043e\\u043f\\u0430\\u0441\\u043d\\u043e\\u0441\\u0442\\u044c\",\"item\":\"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"SIEM. \\u0423\\u043f\\u0440\\u0430\\u0432\\u043b\\u0435\\u043d\\u0438\\u0435 \\u0441\\u043e\\u0431\\u044b\\u0442\\u0438\\u044f\\u043c\\u0438 \\u0438 \\u0438\\u043d\\u0446\\u0438\\u0434\\u0435\\u043d\\u0442\\u0430\\u043c\\u0438 \\u0438\\u043d\\u0444\\u043e\\u0440\\u043c\\u0430\\u0446\\u0438\\u043e\\u043d\\u043d\\u043e\\u0439 \\u0431\\u0435\\u0437\\u043e\\u043f\\u0430\\u0441\\u043d\\u043e\\u0441\\u0442\\u0438\"}]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SIEM \u0441\u0438\u0441\u0442\u0435\u043c\u0438 | \u0423\u043f\u0440\u0430\u0432\u043b\u0456\u043d\u043d\u044f \u043f\u043e\u0434\u0456\u044f\u043c\u0438 \u0442\u0430 \u0456\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 | \u0406\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u0430 \u0431\u0435\u0437\u043f\u0435\u043a\u0430 | ITIS","description":"\u041f\u0456\u0434\u0431\u0456\u0440, \u0432\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u043d\u044f \u0442\u0430 \u043d\u0430\u043b\u0430\u0448\u0442\u0443\u0432\u0430\u043d\u043d\u044f Security Information and Event Management \u0441\u0438\u0441\u0442\u0435\u043c \u0432\u0456\u0434 McAfee, Exabeam, Microfocus.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/siem\/","og_locale":"en_US","og_type":"article","og_title":"SIEM \u0441\u0438\u0441\u0442\u0435\u043c\u0438 | \u0423\u043f\u0440\u0430\u0432\u043b\u0456\u043d\u043d\u044f \u043f\u043e\u0434\u0456\u044f\u043c\u0438 \u0442\u0430 \u0456\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 | \u0406\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u0430 \u0431\u0435\u0437\u043f\u0435\u043a\u0430 | ITIS","og_description":"\u041f\u0456\u0434\u0431\u0456\u0440, \u0432\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u043d\u044f \u0442\u0430 \u043d\u0430\u043b\u0430\u0448\u0442\u0443\u0432\u0430\u043d\u043d\u044f Security Information and Event Management \u0441\u0438\u0441\u0442\u0435\u043c \u0432\u0456\u0434 McAfee, Exabeam, Microfocus.","og_url":"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/siem\/","og_site_name":"ITIS \u0441\u0438\u0441\u0442\u0435\u043c\u043d\u0430 \u0456\u043d\u0442\u0435\u0433\u0440\u0430\u0446\u0456\u044f","article_modified_time":"2021-04-26T14:57:52+00:00","og_image":[{"width":1600,"height":1068,"url":"https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/04\/SIEM.jpg","path":"\/var\/www\/itisyk\/itis.net.ua\/wp-content\/uploads\/2020\/04\/SIEM.jpg","size":"full","id":2613,"alt":"","pixels":1708800,"type":"image\/jpeg"}],"twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.itis.net.ua\/#website","url":"https:\/\/www.itis.net.ua\/","name":"ITIS \u0441\u0438\u0441\u0442\u0435\u043c\u043d\u0430 \u0456\u043d\u0442\u0435\u0433\u0440\u0430\u0446\u0456\u044f","description":"\u041f\u0440\u043e\u0444\u0435\u0441\u0456\u0439\u043d\u0430 I\u0422-\u043f\u0456\u0434\u0442\u0440\u0438\u043c\u043a\u0430 \u0412\u0430\u0448\u043e\u0433\u043e \u0431\u0456\u0437\u043d\u0435\u0441\u0443","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.itis.net.ua\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/siem\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/04\/SIEM.jpg","contentUrl":"https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/04\/SIEM.jpg","width":1600,"height":1068},{"@type":"WebPage","@id":"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/siem\/#webpage","url":"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/siem\/","name":"SIEM \u0441\u0438\u0441\u0442\u0435\u043c\u0438 | \u0423\u043f\u0440\u0430\u0432\u043b\u0456\u043d\u043d\u044f \u043f\u043e\u0434\u0456\u044f\u043c\u0438 \u0442\u0430 \u0456\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 | \u0406\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u0430 \u0431\u0435\u0437\u043f\u0435\u043a\u0430 | ITIS","isPartOf":{"@id":"https:\/\/www.itis.net.ua\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/siem\/#primaryimage"},"datePublished":"2019-12-26T09:04:08+00:00","dateModified":"2021-04-26T14:57:52+00:00","description":"\u041f\u0456\u0434\u0431\u0456\u0440, \u0432\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u043d\u044f \u0442\u0430 \u043d\u0430\u043b\u0430\u0448\u0442\u0443\u0432\u0430\u043d\u043d\u044f Security Information and Event Management \u0441\u0438\u0441\u0442\u0435\u043c \u0432\u0456\u0434 McAfee, Exabeam, Microfocus.","breadcrumb":{"@id":"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/siem\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/siem\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/siem\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Main","item":"https:\/\/www.itis.net.ua\/"},{"@type":"ListItem","position":2,"name":"\u041d\u0430\u0448\u0456 \u0440\u0456\u0448\u0435\u043d\u043d\u044f","item":"https:\/\/www.itis.net.ua\/solution\/"},{"@type":"ListItem","position":3,"name":"\u041a\u0438\u0431\u0435\u0440\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c","item":"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/"},{"@type":"ListItem","position":4,"name":"SIEM. \u0423\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435 \u0441\u043e\u0431\u044b\u0442\u0438\u044f\u043c\u0438 \u0438 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438"}]}]}},"_links":{"self":[{"href":"https:\/\/www.itis.net.ua\/en\/wp-json\/wp\/v2\/pages\/301"}],"collection":[{"href":"https:\/\/www.itis.net.ua\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.itis.net.ua\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.itis.net.ua\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.itis.net.ua\/en\/wp-json\/wp\/v2\/comments?post=301"}],"version-history":[{"count":25,"href":"https:\/\/www.itis.net.ua\/en\/wp-json\/wp\/v2\/pages\/301\/revisions"}],"predecessor-version":[{"id":4640,"href":"https:\/\/www.itis.net.ua\/en\/wp-json\/wp\/v2\/pages\/301\/revisions\/4640"}],"up":[{"embeddable":true,"href":"https:\/\/www.itis.net.ua\/en\/wp-json\/wp\/v2\/pages\/214"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.itis.net.ua\/en\/wp-json\/wp\/v2\/media\/2613"}],"wp:attachment":[{"href":"https:\/\/www.itis.net.ua\/en\/wp-json\/wp\/v2\/media?parent=301"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}