{"id":40425,"date":"2019-08-09T09:42:52","date_gmt":"2019-08-09T09:42:52","guid":{"rendered":"https:\/\/www.42gears.com\/?p=40425"},"modified":"2023-01-13T05:59:01","modified_gmt":"2023-01-13T05:59:01","slug":"siem-a-shift-in-focus-to-threat-monitoring","status":"publish","type":"post","link":"https:\/\/www.42gears.com\/es\/blog\/siem-a-shift-in-focus-to-threat-monitoring\/","title":{"rendered":"SIEM &#8211; A shift in focus to threat monitoring"},"content":{"rendered":"<p><img decoding=\"async\" class=\"alignnone size-full wp-image-40621\" src=\"https:\/\/www.42gears.com\/wp-content\/uploads\/2019\/08\/SIEM-Banner.png\" alt=\"SIEM Banner\" width=\"1762\" height=\"634\" srcset=\"https:\/\/www.42gears.com\/wp-content\/uploads\/2019\/08\/SIEM-Banner.png 1762w, https:\/\/www.42gears.com\/wp-content\/uploads\/2019\/08\/SIEM-Banner-300x108.png 300w, https:\/\/www.42gears.com\/wp-content\/uploads\/2019\/08\/SIEM-Banner-768x276.png 768w, https:\/\/www.42gears.com\/wp-content\/uploads\/2019\/08\/SIEM-Banner-1024x368.png 1024w\" sizes=\"(max-width: 1762px) 100vw, 1762px\" \/><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Traditionally, <strong>Security Information and Event Management<\/strong> (<strong>SIEM<\/strong>) was used by companies to ensure regulatory compliance. But now, SIEM is primarily used for threat monitoring.<\/span><\/p>\n<div style=\"background-color: #f1f1f1; padding: 24px; text-align: center; margin-top: 16px; margin-bottom: 16px;\">\n<p style=\"font-size: 20px; margin-bottom: 0px; line-height: 30px;\"><em>As per <strong>Gartner<\/strong> analysts, there has been a \u201cstrong shift in focus in the client base to threat monitoring in the past year,\u201d with compliance now playing second fiddle.<\/em><\/p>\n<\/div>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">However, the shift is quite natural as the steep rise in the number of data breaches have become a nightmare for CIOs. A data breach can not only lead to financial losses but also ruin an organization\u2019s reputation. Also, businesses have to pay regulatory fines and bear remediation costs.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<\/span><\/p>\n<div style=\"background-color: #f1f1f1; padding: 24px; text-align: center; margin-top: 16px; margin-bottom: 16px;\">\n<p style=\"font-size: 20px; margin-bottom: 0px; line-height: 30px;\"><em>According to the latest<a href=\"https:\/\/www.ibm.com\/security\/data-breach\"> IBM data breach report,<\/a> the global average cost of a data breach is <strong>$3.26 million<\/strong> in <strong>2019<\/strong> &#8211; up <strong>6.4 %<\/strong> from <strong>2017<\/strong>. The average cost for each lost or stolen record containing sensitive and confidential information is <strong>$144<\/strong>.<\/em><\/p>\n<\/div>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">SIEM offers great threat monitoring capabilities to organizations for dealing with risks associated with data breaches. Modern SIEM tools have improved threat detection capabilities and can deal with more data than ever.&nbsp;<\/span><\/p>\n<h2 style=\"text-align: left; font-size: 20px;\"><b>What is SIEM?<\/b><\/h2>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">SIEM term was coined by Gartner analysts Mark Nicolett and Amrit Williams in 2005. This is how Gartner defines SIEM.&nbsp;<\/span><\/p>\n<p style=\"text-align: justify;\"><b>SIEM is a \u201ctechnology that aggregates event data produced by security devices, network infrastructures, systems, and applications.\u201d<\/b><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">SIEM collects different kinds of data sets such as log data, NetFlow and network packets from disparate sources and normalizes the data to analyze the results for different purposes, such as network security event monitoring, user activity monitoring and compliance reporting.<\/span><\/p>\n<h2 style=\"text-align: left; font-size: 20px;\"><b>SIEM Process<\/b><\/h2>\n<p style=\"text-align: left;\"><img decoding=\"async\" class=\"wp-image-40588 aligncenter\" src=\"https:\/\/www.42gears.com\/wp-content\/uploads\/2019\/08\/SIEM-Process-Flow.png\" alt=\"SIEM Process Flow\" width=\"411\" height=\"564\" srcset=\"https:\/\/www.42gears.com\/wp-content\/uploads\/2019\/08\/SIEM-Process-Flow.png 1645w, https:\/\/www.42gears.com\/wp-content\/uploads\/2019\/08\/SIEM-Process-Flow-218x300.png 218w, https:\/\/www.42gears.com\/wp-content\/uploads\/2019\/08\/SIEM-Process-Flow-768x1055.png 768w, https:\/\/www.42gears.com\/wp-content\/uploads\/2019\/08\/SIEM-Process-Flow-746x1024.png 746w\" sizes=\"(max-width: 411px) 100vw, 411px\" \/><\/p>\n<h2 style=\"text-align: left; font-size: 20px;\"><b>Three critical capabilities of SIEM<\/b><\/h2>\n<p style=\"text-align: left;\"><span style=\"font-weight: 400;\">These are the three critical capabilities of SIEM as identified by Gartner.<\/span><\/p>\n<p style=\"text-align: left;\"><img decoding=\"async\" class=\"wp-image-40660 aligncenter\" src=\"https:\/\/www.42gears.com\/wp-content\/uploads\/2019\/08\/three-critical-capabilities-of-SIEM-diagram-1.png\" alt=\"three critical capabilities of SIEM diagram\" width=\"519\" height=\"390\" srcset=\"https:\/\/www.42gears.com\/wp-content\/uploads\/2019\/08\/three-critical-capabilities-of-SIEM-diagram-1.png 1695w, https:\/\/www.42gears.com\/wp-content\/uploads\/2019\/08\/three-critical-capabilities-of-SIEM-diagram-1-300x225.png 300w, https:\/\/www.42gears.com\/wp-content\/uploads\/2019\/08\/three-critical-capabilities-of-SIEM-diagram-1-768x576.png 768w, https:\/\/www.42gears.com\/wp-content\/uploads\/2019\/08\/three-critical-capabilities-of-SIEM-diagram-1-1024x768.png 1024w\" sizes=\"(max-width: 519px) 100vw, 519px\" \/><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">SIEM has become an important tool in the data security ecosystem, as it collects and analyzes data to identify abnormal behavior and prevent potential cyberattacks. More and more companies are now deploying SIEM for threat detection and compliance.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">According to a <\/span><a href=\"https:\/\/451research.com\/images\/Marketing\/Webinar_Slides\/11.17.15_VOTE_InfoSec_PPT.pdf\" class=\"broken_link\"><span style=\"font-weight: 400;\">recent survey<\/span><\/a><span style=\"font-weight: 400;\">, SIEM is now a $2 billion industry. However, only 21.9 % of those companies have been able to derive any business value from it. This could be because it is both resource-intensive and expensive.&nbsp;<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">In the future, we may come up with improved SIEM tools that would resolve these issues and boost adoption. Recently, many <a href=\"https:\/\/42gears.com\/solutions\/unified-endpoint-management-uem-solution\/\">UEM<\/a> vendors have started collaborating with SIEM vendors to increase threat monitoring capabilities and secure their customers\u2019 data. 42Gears has integration with leading SIEM tool, <strong>Splunk<\/strong>, which is a full on-premise SIEM solution that Gartner rates as a leader in the industry.&nbsp;<\/span><\/p>\n<div style=\"background-image: url('https:\/\/www.42gears.com\/wp-content\/uploads\/2019\/08\/SIEM-Footer.jpg'); background-position: center; padding: 40px; border-radius: 5px; margin-top: 16px; background-size: cover;\">\n<h2 style=\"font-size: 24px; color: #333333; margin-top: 0px;\">42Gears UEM<\/h2>\n<p style=\"font-size: 16px; margin-bottom: 0px; line-height: 26px; color: #333333;\">Comprehensive Mobile Threat Defense &#8211; Protection against malicious apps,<br \/>\nnetwork&nbsp;attacks, and device vulnerabilities.<\/p>\n<p style=\"margin-top: 32px; display: inline-block;\"><a style=\"min-width: 148px; height: 48px; padding: 0 24px; text-align: center; display: inline-block; background-color: #333333; color: #ffffff; line-height: 48px; border-radius: 5px; letter-spacing: 1px; font-size: 12px; font-weight: bold; transition: all 0.5s; margin-bottom: 0px;\" href=\"https:\/\/suremdm.42gears.com\/console\/?registration=true\" target=\"_black\" rel=\"noopener noreferrer\">TRY FOR FREE<\/a><a style=\"min-width: 148px; height: 48px; padding: 0 24px; text-align: center; display: inline-block; background-color: transparent; color: #333333; line-height: 48px; border-radius: 5px; letter-spacing: 1px; font-size: 12px; font-weight: bold; transition: all 0.5s; margin-bottom: 0px; margin-left: 16px;\" href=\"https:\/\/www.42gears.com\/solutions\/mobile-threat-defense\/\" target=\"_black\" rel=\"noopener noreferrer\">READ MORE<\/a><\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Traditionally, Security Information and Event Management (SIEM) was used by companies to ensure regulatory compliance. But now, SIEM is primarily used for threat monitoring. As per Gartner analysts, there has been a \u201cstrong shift in focus in the client base to threat monitoring in the past year,\u201d with compliance now playing second fiddle. However, the&hellip;<\/p>\n","protected":false},"author":7,"featured_media":40641,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10,8,398,399],"tags":[494,361],"class_list":["post-40425","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-business","category-general","category-uem","category-unified-endpoint-management","tag-mobile-threat","tag-uem"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.6 (Yoast SEO v24.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>SIEM \u2013 A Shift In Focus To Threat Monitoring | 42Gears<\/title>\n<meta name=\"description\" content=\"42Gear&#039;s blog has everything you need to future-proof your business. Security Information and Event Management is now primarily used for threat monitoring.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.42gears.com\/blog\/siem-a-shift-in-focus-to-threat-monitoring\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SIEM - A shift in focus to threat monitoring\" \/>\n<meta property=\"og:description\" content=\"42Gear&#039;s blog has everything you need to future-proof your business. Security Information and Event Management is now primarily used for threat monitoring.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.42gears.com\/blog\/siem-a-shift-in-focus-to-threat-monitoring\/\" \/>\n<meta property=\"og:site_name\" content=\"42Gears Mobility Systems\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/42gears\" \/>\n<meta property=\"article:published_time\" content=\"2019-08-09T09:42:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-01-13T05:59:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.42gears.com\/wp-content\/uploads\/2019\/08\/Featured-Image-SIEM-A-shift-in-focus-to-threat-monitoring-01.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"661\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"42Gears Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@42Gears\" \/>\n<meta name=\"twitter:site\" content=\"@42Gears\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"42Gears Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.42gears.com\/blog\/siem-a-shift-in-focus-to-threat-monitoring\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.42gears.com\/blog\/siem-a-shift-in-focus-to-threat-monitoring\/\"},\"author\":{\"name\":\"42Gears Team\",\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/person\/28a14f2c32de4a7903ac672579a88a2d\"},\"headline\":\"SIEM &#8211; A shift in focus to threat monitoring\",\"datePublished\":\"2019-08-09T09:42:52+00:00\",\"dateModified\":\"2023-01-13T05:59:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.42gears.com\/blog\/siem-a-shift-in-focus-to-threat-monitoring\/\"},\"wordCount\":449,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.42gears.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.42gears.com\/blog\/siem-a-shift-in-focus-to-threat-monitoring\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2019\/08\/Featured-Image-SIEM-A-shift-in-focus-to-threat-monitoring-01.jpg\",\"keywords\":[\"Mobile Threat\",\"UEM\"],\"articleSection\":[\"Business\",\"General\",\"UEM\",\"Unified Endpoint Management\"],\"inLanguage\":\"es-ES\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.42gears.com\/blog\/siem-a-shift-in-focus-to-threat-monitoring\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.42gears.com\/blog\/siem-a-shift-in-focus-to-threat-monitoring\/\",\"url\":\"https:\/\/www.42gears.com\/blog\/siem-a-shift-in-focus-to-threat-monitoring\/\",\"name\":\"SIEM \u2013 A Shift In Focus To Threat Monitoring | 42Gears\",\"isPartOf\":{\"@id\":\"https:\/\/www.42gears.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.42gears.com\/blog\/siem-a-shift-in-focus-to-threat-monitoring\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.42gears.com\/blog\/siem-a-shift-in-focus-to-threat-monitoring\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2019\/08\/Featured-Image-SIEM-A-shift-in-focus-to-threat-monitoring-01.jpg\",\"datePublished\":\"2019-08-09T09:42:52+00:00\",\"dateModified\":\"2023-01-13T05:59:01+00:00\",\"description\":\"42Gear's blog has everything you need to future-proof your business. Security Information and Event Management is now primarily used for threat monitoring.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.42gears.com\/blog\/siem-a-shift-in-focus-to-threat-monitoring\/#breadcrumb\"},\"inLanguage\":\"es-ES\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.42gears.com\/blog\/siem-a-shift-in-focus-to-threat-monitoring\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es-ES\",\"@id\":\"https:\/\/www.42gears.com\/blog\/siem-a-shift-in-focus-to-threat-monitoring\/#primaryimage\",\"url\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2019\/08\/Featured-Image-SIEM-A-shift-in-focus-to-threat-monitoring-01.jpg\",\"contentUrl\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2019\/08\/Featured-Image-SIEM-A-shift-in-focus-to-threat-monitoring-01.jpg\",\"width\":1000,\"height\":661,\"caption\":\"Featured Image - SIEM A shift in focus to threat monitoring-01\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.42gears.com\/blog\/siem-a-shift-in-focus-to-threat-monitoring\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.42gears.com\/es\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SIEM &#8211; A shift in focus to threat monitoring\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.42gears.com\/#website\",\"url\":\"https:\/\/www.42gears.com\/\",\"name\":\"42Gears Mobility Systems\",\"description\":\"Mobile Device Management (MDM), Mobile Security &amp; Mobile Device Lockdown\",\"publisher\":{\"@id\":\"https:\/\/www.42gears.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.42gears.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es-ES\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.42gears.com\/#organization\",\"name\":\"MDM - 42Gears\",\"url\":\"https:\/\/www.42gears.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-ES\",\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/12\/Featured-Image-42Gears-logo.png\",\"contentUrl\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/12\/Featured-Image-42Gears-logo.png\",\"width\":499,\"height\":330,\"caption\":\"MDM - 42Gears\"},\"image\":{\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/42gears\",\"https:\/\/x.com\/42Gears\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/person\/28a14f2c32de4a7903ac672579a88a2d\",\"name\":\"42Gears Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-ES\",\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7d257fb658a429b8607872336eac3833a8314ca3ca67d72c90ceeddc7700c42e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7d257fb658a429b8607872336eac3833a8314ca3ca67d72c90ceeddc7700c42e?s=96&d=mm&r=g\",\"caption\":\"42Gears Team\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"SIEM \u2013 A Shift In Focus To Threat Monitoring | 42Gears","description":"42Gear's blog has everything you need to future-proof your business. Security Information and Event Management is now primarily used for threat monitoring.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.42gears.com\/blog\/siem-a-shift-in-focus-to-threat-monitoring\/","og_locale":"es_ES","og_type":"article","og_title":"SIEM - A shift in focus to threat monitoring","og_description":"42Gear's blog has everything you need to future-proof your business. Security Information and Event Management is now primarily used for threat monitoring.","og_url":"https:\/\/www.42gears.com\/blog\/siem-a-shift-in-focus-to-threat-monitoring\/","og_site_name":"42Gears Mobility Systems","article_publisher":"https:\/\/www.facebook.com\/42gears","article_published_time":"2019-08-09T09:42:52+00:00","article_modified_time":"2023-01-13T05:59:01+00:00","og_image":[{"width":1000,"height":661,"url":"https:\/\/www.42gears.com\/wp-content\/uploads\/2019\/08\/Featured-Image-SIEM-A-shift-in-focus-to-threat-monitoring-01.jpg","type":"image\/jpeg"}],"author":"42Gears Team","twitter_card":"summary_large_image","twitter_creator":"@42Gears","twitter_site":"@42Gears","twitter_misc":{"Written by":"42Gears Team","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.42gears.com\/blog\/siem-a-shift-in-focus-to-threat-monitoring\/#article","isPartOf":{"@id":"https:\/\/www.42gears.com\/blog\/siem-a-shift-in-focus-to-threat-monitoring\/"},"author":{"name":"42Gears Team","@id":"https:\/\/www.42gears.com\/#\/schema\/person\/28a14f2c32de4a7903ac672579a88a2d"},"headline":"SIEM &#8211; A shift in focus to threat monitoring","datePublished":"2019-08-09T09:42:52+00:00","dateModified":"2023-01-13T05:59:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.42gears.com\/blog\/siem-a-shift-in-focus-to-threat-monitoring\/"},"wordCount":449,"commentCount":0,"publisher":{"@id":"https:\/\/www.42gears.com\/#organization"},"image":{"@id":"https:\/\/www.42gears.com\/blog\/siem-a-shift-in-focus-to-threat-monitoring\/#primaryimage"},"thumbnailUrl":"https:\/\/www.42gears.com\/wp-content\/uploads\/2019\/08\/Featured-Image-SIEM-A-shift-in-focus-to-threat-monitoring-01.jpg","keywords":["Mobile Threat","UEM"],"articleSection":["Business","General","UEM","Unified Endpoint Management"],"inLanguage":"es-ES","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.42gears.com\/blog\/siem-a-shift-in-focus-to-threat-monitoring\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.42gears.com\/blog\/siem-a-shift-in-focus-to-threat-monitoring\/","url":"https:\/\/www.42gears.com\/blog\/siem-a-shift-in-focus-to-threat-monitoring\/","name":"SIEM \u2013 A Shift In Focus To Threat Monitoring | 42Gears","isPartOf":{"@id":"https:\/\/www.42gears.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.42gears.com\/blog\/siem-a-shift-in-focus-to-threat-monitoring\/#primaryimage"},"image":{"@id":"https:\/\/www.42gears.com\/blog\/siem-a-shift-in-focus-to-threat-monitoring\/#primaryimage"},"thumbnailUrl":"https:\/\/www.42gears.com\/wp-content\/uploads\/2019\/08\/Featured-Image-SIEM-A-shift-in-focus-to-threat-monitoring-01.jpg","datePublished":"2019-08-09T09:42:52+00:00","dateModified":"2023-01-13T05:59:01+00:00","description":"42Gear's blog has everything you need to future-proof your business. Security Information and Event Management is now primarily used for threat monitoring.","breadcrumb":{"@id":"https:\/\/www.42gears.com\/blog\/siem-a-shift-in-focus-to-threat-monitoring\/#breadcrumb"},"inLanguage":"es-ES","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.42gears.com\/blog\/siem-a-shift-in-focus-to-threat-monitoring\/"]}]},{"@type":"ImageObject","inLanguage":"es-ES","@id":"https:\/\/www.42gears.com\/blog\/siem-a-shift-in-focus-to-threat-monitoring\/#primaryimage","url":"https:\/\/www.42gears.com\/wp-content\/uploads\/2019\/08\/Featured-Image-SIEM-A-shift-in-focus-to-threat-monitoring-01.jpg","contentUrl":"https:\/\/www.42gears.com\/wp-content\/uploads\/2019\/08\/Featured-Image-SIEM-A-shift-in-focus-to-threat-monitoring-01.jpg","width":1000,"height":661,"caption":"Featured Image - SIEM A shift in focus to threat monitoring-01"},{"@type":"BreadcrumbList","@id":"https:\/\/www.42gears.com\/blog\/siem-a-shift-in-focus-to-threat-monitoring\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.42gears.com\/es\/"},{"@type":"ListItem","position":2,"name":"SIEM &#8211; A shift in focus to threat monitoring"}]},{"@type":"WebSite","@id":"https:\/\/www.42gears.com\/#website","url":"https:\/\/www.42gears.com\/","name":"42Gears Mobility Systems","description":"Mobile Device Management (MDM), Mobile Security &amp; Mobile Device Lockdown","publisher":{"@id":"https:\/\/www.42gears.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.42gears.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es-ES"},{"@type":"Organization","@id":"https:\/\/www.42gears.com\/#organization","name":"MDM - 42Gears","url":"https:\/\/www.42gears.com\/","logo":{"@type":"ImageObject","inLanguage":"es-ES","@id":"https:\/\/www.42gears.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/12\/Featured-Image-42Gears-logo.png","contentUrl":"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/12\/Featured-Image-42Gears-logo.png","width":499,"height":330,"caption":"MDM - 42Gears"},"image":{"@id":"https:\/\/www.42gears.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/42gears","https:\/\/x.com\/42Gears"]},{"@type":"Person","@id":"https:\/\/www.42gears.com\/#\/schema\/person\/28a14f2c32de4a7903ac672579a88a2d","name":"42Gears Team","image":{"@type":"ImageObject","inLanguage":"es-ES","@id":"https:\/\/www.42gears.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7d257fb658a429b8607872336eac3833a8314ca3ca67d72c90ceeddc7700c42e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7d257fb658a429b8607872336eac3833a8314ca3ca67d72c90ceeddc7700c42e?s=96&d=mm&r=g","caption":"42Gears Team"}}]}},"author_meta":{"ID":"7","user_nicename":"42gears","user_email":"42gears@gmail.com","user_registered":"2015-07-15 04:55:37","display_name":"42Gears Team","first_name":"42Gears","last_name":"Team"},"featured_image_url":"https:\/\/www.42gears.com\/wp-content\/uploads\/2019\/08\/Featured-Image-SIEM-A-shift-in-focus-to-threat-monitoring-01.jpg","_links":{"self":[{"href":"https:\/\/www.42gears.com\/es\/wp-json\/wp\/v2\/posts\/40425","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.42gears.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.42gears.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.42gears.com\/es\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.42gears.com\/es\/wp-json\/wp\/v2\/comments?post=40425"}],"version-history":[{"count":22,"href":"https:\/\/www.42gears.com\/es\/wp-json\/wp\/v2\/posts\/40425\/revisions"}],"predecessor-version":[{"id":50895,"href":"https:\/\/www.42gears.com\/es\/wp-json\/wp\/v2\/posts\/40425\/revisions\/50895"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.42gears.com\/es\/wp-json\/wp\/v2\/media\/40641"}],"wp:attachment":[{"href":"https:\/\/www.42gears.com\/es\/wp-json\/wp\/v2\/media?parent=40425"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.42gears.com\/es\/wp-json\/wp\/v2\/categories?post=40425"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.42gears.com\/es\/wp-json\/wp\/v2\/tags?post=40425"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}