{"id":41548,"date":"2017-10-06T00:00:00","date_gmt":"2017-10-06T00:00:00","guid":{"rendered":"https:\/\/www.techopedia.com\/experts\/how-is-siem-different-from-general-event-log-management-and-monitoring\/"},"modified":"2020-07-06T18:03:09","modified_gmt":"2020-07-06T18:03:09","slug":"how-is-siem-different-from-general-event-log-management-and-monitoring","status":"publish","type":"q-a","link":"https:\/\/www.techopedia.com\/7\/31204\/security\/how-is-siem-different-from-general-event-log-management-and-monitoring","title":{"rendered":"How is SIEM different from general event log management and monitoring?"},"content":{"rendered":"

In some ways, security information and event management<\/a> (SIEM) is different than the normal, average event log<\/a> management that businesses use to look at network vulnerability<\/a> and performance. However, as a kind of blanket term for a range of technologies, SIEM is in many ways built on the core principle of event log management and monitoring. The biggest difference may be the actual techniques and features involved.<\/p>\n

Generally, SIEM is a combination of security information management<\/a> (SIM) and security event management<\/a> (SEM). What that means is that SIEM systems incorporate a lot of general capturing of digital log recording, along with more specific systems that look at user events in context. For example, a SEM or security event management resource may be set up to capture different kinds of specific reports on account logins that happened at a certain access level, at a certain time of the day, or in a certain pattern that network administrators<\/a> can use to sense danger, or deal with various types of administrative issues. However, a security information management system offers broader reports based on all of the aggregate data that is collected about network traffic<\/a>.<\/p>\n

Some experts have defined ideas of how SIEM supersedes the average event log monitoring tool. For example, some suggest that the major value of SIEM is in more specific reports, and more specific features that reveal more about developed outcomes in a network. Where event log monitoring and management may just offer a generic view of what gets generated in a log process, SIEM tools can offer a lot of proprietary value, in terms of really getting into network activity and seeing what goes on in a network.<\/p>\n","protected":false},"excerpt":{"rendered":"

In some ways, security information and event management (SIEM) is different than the normal, average event log management that businesses use to look at network vulnerability and performance. However, as a kind of blanket term for a range of technologies, SIEM is in many ways built on the core principle of event log management and […]<\/p>\n","protected":false},"author":7683,"featured_media":41549,"comment_status":"open","ping_status":"closed","template":"","format":"standard","meta":{"_acf_changed":false,"_lmt_disableupdate":"","_lmt_disable":"","om_disable_all_campaigns":false,"footnotes":""},"q-acat":[348,358],"class_list":["post-41548","q-a","type-q-a","status-publish","format-standard","has-post-thumbnail","hentry","q-acat-cybersecurity","q-acat-risk-management"],"acf":[],"yoast_head":"\nHow is SIEM different from general event log management and monitoring? - Techopedia<\/title>\n<meta name=\"description\" content=\"While event log monitoring and management may offer a generic view of what gets generated in a log process, SIEM tools can offer a lot of proprietary value.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.techopedia.com\/7\/31204\/security\/how-is-siem-different-from-general-event-log-management-and-monitoring\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How is SIEM different from general event log management and monitoring?\" \/>\n<meta property=\"og:description\" content=\"While event log monitoring and management may offer a generic view of what gets generated in a log process, SIEM tools can offer a lot of proprietary value.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.techopedia.com\/7\/31204\/security\/how-is-siem-different-from-general-event-log-management-and-monitoring\" \/>\n<meta property=\"og:site_name\" content=\"Techopedia\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/techopedia\/\" \/>\n<meta property=\"article:modified_time\" content=\"2020-07-06T18:03:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/02\/computer-electronics-tablet-computer-screen-phone-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1\" \/>\n\t<meta property=\"og:image:height\" content=\"1\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@techopedia\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.techopedia.com\/7\/31204\/security\/how-is-siem-different-from-general-event-log-management-and-monitoring\",\"url\":\"https:\/\/www.techopedia.com\/7\/31204\/security\/how-is-siem-different-from-general-event-log-management-and-monitoring\",\"name\":\"How is SIEM different from general event log management and monitoring? - Techopedia\",\"isPartOf\":{\"@id\":\"https:\/\/www.techopedia.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.techopedia.com\/7\/31204\/security\/how-is-siem-different-from-general-event-log-management-and-monitoring#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.techopedia.com\/7\/31204\/security\/how-is-siem-different-from-general-event-log-management-and-monitoring#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/02\/computer-electronics-tablet-computer-screen-phone-1.jpg\",\"datePublished\":\"2017-10-06T00:00:00+00:00\",\"dateModified\":\"2020-07-06T18:03:09+00:00\",\"description\":\"While event log monitoring and management may offer a generic view of what gets generated in a log process, SIEM tools can offer a lot of proprietary value.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.techopedia.com\/7\/31204\/security\/how-is-siem-different-from-general-event-log-management-and-monitoring#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.techopedia.com\/7\/31204\/security\/how-is-siem-different-from-general-event-log-management-and-monitoring\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.techopedia.com\/7\/31204\/security\/how-is-siem-different-from-general-event-log-management-and-monitoring#primaryimage\",\"url\":\"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/02\/computer-electronics-tablet-computer-screen-phone-1.jpg\",\"contentUrl\":\"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/02\/computer-electronics-tablet-computer-screen-phone-1.jpg\",\"caption\":\"Welcomia\/Dreamstime.com\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.techopedia.com\/7\/31204\/security\/how-is-siem-different-from-general-event-log-management-and-monitoring#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.techopedia.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity\",\"item\":\"https:\/\/www.techopedia.com\/topic\/4\/cybersecurity\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Q&A\",\"item\":\"https:\/\/www.techopedia.com\/experts\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"How is SIEM different from general event log management and monitoring?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.techopedia.com\/#website\",\"url\":\"https:\/\/www.techopedia.com\/\",\"name\":\"Techopedia\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.techopedia.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.techopedia.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.techopedia.com\/#organization\",\"name\":\"Techopedia\",\"url\":\"https:\/\/www.techopedia.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.techopedia.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/08\/techopedia-light.svg\",\"contentUrl\":\"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/08\/techopedia-light.svg\",\"width\":209,\"height\":37,\"caption\":\"Techopedia\"},\"image\":{\"@id\":\"https:\/\/www.techopedia.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/techopedia\/\",\"https:\/\/x.com\/techopedia\",\"https:\/\/www.linkedin.com\/company\/techopedia\/\",\"https:\/\/www.youtube.com\/c\/Techopedia\"],\"publishingPrinciples\":\"https:\/\/www.techopedia.com\/about\/editorial-policy\",\"ownershipFundingInfo\":\"https:\/\/www.techopedia.com\/about\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How is SIEM different from general event log management and monitoring? - Techopedia","description":"While event log monitoring and management may offer a generic view of what gets generated in a log process, SIEM tools can offer a lot of proprietary value.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.techopedia.com\/7\/31204\/security\/how-is-siem-different-from-general-event-log-management-and-monitoring","og_locale":"en_US","og_type":"article","og_title":"How is SIEM different from general event log management and monitoring?","og_description":"While event log monitoring and management may offer a generic view of what gets generated in a log process, SIEM tools can offer a lot of proprietary value.","og_url":"https:\/\/www.techopedia.com\/7\/31204\/security\/how-is-siem-different-from-general-event-log-management-and-monitoring","og_site_name":"Techopedia","article_publisher":"https:\/\/www.facebook.com\/techopedia\/","article_modified_time":"2020-07-06T18:03:09+00:00","og_image":[{"url":"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/02\/computer-electronics-tablet-computer-screen-phone-1.jpg","width":1,"height":1,"type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@techopedia","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.techopedia.com\/7\/31204\/security\/how-is-siem-different-from-general-event-log-management-and-monitoring","url":"https:\/\/www.techopedia.com\/7\/31204\/security\/how-is-siem-different-from-general-event-log-management-and-monitoring","name":"How is SIEM different from general event log management and monitoring? - Techopedia","isPartOf":{"@id":"https:\/\/www.techopedia.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.techopedia.com\/7\/31204\/security\/how-is-siem-different-from-general-event-log-management-and-monitoring#primaryimage"},"image":{"@id":"https:\/\/www.techopedia.com\/7\/31204\/security\/how-is-siem-different-from-general-event-log-management-and-monitoring#primaryimage"},"thumbnailUrl":"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/02\/computer-electronics-tablet-computer-screen-phone-1.jpg","datePublished":"2017-10-06T00:00:00+00:00","dateModified":"2020-07-06T18:03:09+00:00","description":"While event log monitoring and management may offer a generic view of what gets generated in a log process, SIEM tools can offer a lot of proprietary value.","breadcrumb":{"@id":"https:\/\/www.techopedia.com\/7\/31204\/security\/how-is-siem-different-from-general-event-log-management-and-monitoring#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.techopedia.com\/7\/31204\/security\/how-is-siem-different-from-general-event-log-management-and-monitoring"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techopedia.com\/7\/31204\/security\/how-is-siem-different-from-general-event-log-management-and-monitoring#primaryimage","url":"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/02\/computer-electronics-tablet-computer-screen-phone-1.jpg","contentUrl":"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/02\/computer-electronics-tablet-computer-screen-phone-1.jpg","caption":"Welcomia\/Dreamstime.com"},{"@type":"BreadcrumbList","@id":"https:\/\/www.techopedia.com\/7\/31204\/security\/how-is-siem-different-from-general-event-log-management-and-monitoring#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.techopedia.com\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity","item":"https:\/\/www.techopedia.com\/topic\/4\/cybersecurity"},{"@type":"ListItem","position":3,"name":"Q&A","item":"https:\/\/www.techopedia.com\/experts"},{"@type":"ListItem","position":4,"name":"How is SIEM different from general event log management and monitoring?"}]},{"@type":"WebSite","@id":"https:\/\/www.techopedia.com\/#website","url":"https:\/\/www.techopedia.com\/","name":"Techopedia","description":"","publisher":{"@id":"https:\/\/www.techopedia.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.techopedia.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.techopedia.com\/#organization","name":"Techopedia","url":"https:\/\/www.techopedia.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techopedia.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/08\/techopedia-light.svg","contentUrl":"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/08\/techopedia-light.svg","width":209,"height":37,"caption":"Techopedia"},"image":{"@id":"https:\/\/www.techopedia.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/techopedia\/","https:\/\/x.com\/techopedia","https:\/\/www.linkedin.com\/company\/techopedia\/","https:\/\/www.youtube.com\/c\/Techopedia"],"publishingPrinciples":"https:\/\/www.techopedia.com\/about\/editorial-policy","ownershipFundingInfo":"https:\/\/www.techopedia.com\/about"}]}},"_links":{"self":[{"href":"https:\/\/www.techopedia.com\/wp-json\/wp\/v2\/q-a\/41548"}],"collection":[{"href":"https:\/\/www.techopedia.com\/wp-json\/wp\/v2\/q-a"}],"about":[{"href":"https:\/\/www.techopedia.com\/wp-json\/wp\/v2\/types\/q-a"}],"author":[{"embeddable":true,"href":"https:\/\/www.techopedia.com\/wp-json\/wp\/v2\/users\/7683"}],"replies":[{"embeddable":true,"href":"https:\/\/www.techopedia.com\/wp-json\/wp\/v2\/comments?post=41548"}],"version-history":[{"count":0,"href":"https:\/\/www.techopedia.com\/wp-json\/wp\/v2\/q-a\/41548\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.techopedia.com\/wp-json\/wp\/v2\/media\/41549"}],"wp:attachment":[{"href":"https:\/\/www.techopedia.com\/wp-json\/wp\/v2\/media?parent=41548"}],"wp:term":[{"taxonomy":"q-acat","embeddable":true,"href":"https:\/\/www.techopedia.com\/wp-json\/wp\/v2\/q-acat?post=41548"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}