Looking Back at the Evolution of SIEM - Exabeam

Looking Back at the Evolution of SIEM

Published
October 11, 2022

Author

Reading time
6 mins

If you’re in cybersecurity, it’s likely you know that SIEM stands for Security Information and Event Management (SIEM), is pronounced “sim” (or “seem” if you’re in Europe), and that SIEM systems help security teams detect and respond to threats, manage incident response, and stay compliant. Over the last 20+ years, the SIEM market has had quite an evolution and growth explosion. 

Today, SIEM accounts for approximately $4B of total cybersecurity spend and is expected to increase to $6.24B by 2027. This is easy to understand as SIEM has evolved into the data store for cybersecurity data which has been exploding as the volume of data and number of alerts is growing exponentially.

According to Ponemon Institute, the average number of cybersecurity products a company uses is 45. Some vendors claim Fortune 2000 companies have upwards of 130 tools. Each of these is generating both log files as well as alerts. But before we go into where the SIEM market goes from here, let’s first take a look back at how SIEM has evolved.

In this article:

Phase 1: The first SIEMs took in data and served up alerts

In the early part of the century, the first wave of SIEM vendors were the likes of ArcSight (now owned by Micro Focus) and QRadar (now owned by IBM). These early SIEMs married both log files (raw data) and security alerts (summarized events). Back then, it was about ingesting data and kicking off alerts from all the cybersecurity products that were being used –– mostly host- and network-based intrusion detection devices (ISS et al), network tools and firewalls (Check Point, Cisco et al).  Endpoint and anti-virus software would come a little later. 

Most of what a SIEM could really do back then was get data in, aggregate it, and send alerts to security teams. They were also used for data retention and compliance. 

The most prevalent first- and second-generation SIEMs also came with very basic correlation engines, the best they knew how to do at that time. They had the ability to build correlation rules and say, “If I see X, Y and Z, then open a case in our ticketing system and send an alert to the security team”. 

But on-premises processing power against “unstructured” data was still quite slow so it could take eons to query your essentially raw data and get any semblance of an answer about the root cause of an alert, security incident or otherwise. 

Then the data got big

There still wasn’t nearly as much data as there is today. What was being generated back then was easily parked in a database –– usually Oracle or DB2 –– and behind the scenes. With time though, enterprises continued their digital journey and the data began to explode in volume — but all of this data was still being forced inside rigid databases.

Eventually, structured databases could not keep up with the needs of IT or security teams. They couldn’t keep up with the volume, variety or velocity of the data coming at them. 

Early SIEM vendors also couldn’t keep up as structured databases were clearly not able to adapt — and writing new parsers to ingest new log sources took weeks or months.

Phase 2: Splunk entered the market, making search and access easy

Splunk was founded in 2003 as essentially the first-ever flexible and powerful store and search engine for big data. It introduced indexing which can search any kind of raw data – from structured to unstructured – and quickly transformed the data into searchable events. 

The company’s technology was a breakthrough because it made it so much easier for organizations to ingest, search, store, visualize and get insights from all of their growing data.

When they entered the SIEM market later, it changed the game for original SIEM vendors. Its first appearance as a Leader on the Gartner MQ for SIEM was in 2012. While the company’s bread and butter was mostly IT operations use cases up until that point, once they introduced a SIEM, the indexing and “schema at read” capabilities allowed security teams to store, search and drill down into their data far more efficiently to get much faster SOC answers too. 

Splunk’s architecture was far more effective than legacy vendors, and the company had somewhat of a market lead for many years.

Phase 3: SIEM met UEBA, aka anomaly detection

At this point, the world was beginning to see more zero day attacks, computer-software vulnerabilities previously unknown until adversaries find and take advantage of them. The SIEM industry had to keep up by trying to make even more sense of the data that was being stored. Eventually, User and Entity Behavior Analytics (UEBA) was created to apply more cyber intelligence to this problem. 

Most vendors were still trying to bolt some form of UEBA on top of their SIEM, but for UEBA to be at its best for anomaly detection, it needs to be able to pull data from all of the cyber data lakes that companies create. Exabeam announced our UEBA product in 2014 in the partners pavilion at a Splunk .conf User’s conference.

Around that time, most CISOs and security teams were drowning in a sea of data accompanied by too many security alerts, many of them not actionable. UEBA and alert triage tools have helped significantly, but this is still a problem today with legacy SIEMs. 

Today’s SIEMs cost too much

Fast forward to 2022 and what we have is a set of antiquated technology stacks that are either still on premises or have moved to the cloud as “lift and shifts” which are super expensive to maintain. Combined with the fact that cyber data is exploding, we end up with SIEMs that cost too much. 

It’s not uncommon to see large organizations spend upwards of $10m per year on legacy and next-gen log management and SIEM solutions.

Some early SIEM players still have nearly 50% of their customer install base running their SIEMs on premises, which is far more costly than the cloud. But even as more customers move to the cloud, they have woken up to the fact that SIEM costs have gotten out of control. 

So where does SIEM go from here? 

It’s time to bring the best of what cloud-native technology can do for SIEM. Cloud is super fast, offers inexpensive storage, instantaneous search and can integrate a threat detection engine that can catch bad actors, including the majority who are now breaking in with valid credentials. 

The SIEM industry has been ripe for forward evolution for some time and we are committed to leading that evolution.

Similar Posts

Augmenting Microsoft Sentinel SIEM: The Power of Exabeam for UEBA and TDIR

Exabeam Unveils 2023 Partner of the Year Award Winners

Exabeam IRAP Assessment Completion Creates New Opportunities for Partners in Australia 




Recent Posts

What’s New in Exabeam Product Development – March 2024

Take TDIR to a Whole New Level: Achieving Security Operations Excellence

Generative AI is Reshaping Cybersecurity. Is Your Organization Prepared?

See a world-class SIEM solution in action

Most reported breaches involved lost or stolen credentials. How can you keep pace?

Exabeam delivers SOC teams industry-leading analytics, patented anomaly detection, and Smart Timelines to help teams pinpoint the actions that lead to exploits.

Whether you need a SIEM replacement, a legacy SIEM modernization with XDR, Exabeam offers advanced, modular, and cloud-delivered TDIR.

Get a demo today!