What is security event monitoring?

Security event monitoring provides real-time monitoring, correlation, and expert analysis of activity in your environment, detecting and alerting valid threats to your data and devices.

Why InfluxDB for security event monitoring?

Security monitoring is complex. Successful implementation of a security monitoring infrastructure involves people, processes, technology, and data and requires multiple iterative phases to reach maturity. The data component comes from consuming log files from every possible asset, be it an application, database, virtual machine, operating system, server, network component, storage, or even intelligent power strips. Log data from these assets will help with the following:

  • Identifying security incidents
  • Monitoring policy violations
  • Establishing baselines
  • Assisting non-repudiation controls
  • Providing information about problems and unusual conditions
  • Contributing additional application-specific data for incident investigation which is lacking in other log sources
  • Helping defend against vulnerability identification and exploitation through attack detection

But log data on its own is not an efficient way of finding the anomalies and therefore, this data should be collected and organized in a collection of time series. This data set provides a way to correlate time series events that enable incident detection, response, remediation and forensics workflows to be timely and successful.

InfluxDB Integrations
Free InfluxDB training

“When information is gathered from a large number of devices out at the edge, ensuring that data is reliable and trustworthy can be challenging. Ockam provides open source tools and libraries that make it easy to establish and maintain mutually authenticated secure channels between fleets of globally distributed devices and InfluxDB."

Mrinal Wadhwa
CTO, Ockam