sb-au logo
Story image

A better way to budget for SIEM services during times of rapid growth

16 Mar 2020

Article by LogRhythm's APJ vice president of marketing, Joanne Wong.

Ensuring their organisation’s IT infrastructure remains secure at all times is a juggling act for most chief information security officers (CISOs). On one hand they want to invest in the most effective tools, but on the other they recognise a need to keep costs under control.

The challenge is particularly acute when it comes to budgeting for a security information and event management (SIEM) system. Here, the combination of constantly changing data volumes and consumption-based charging can make estimating costs a nightmare.

Things are made even more difficult during periods of rapid growth. Increases in headcount lead to increases in data volumes and network activity. Each new employee also boosts the organisation’s risk exposure as they effectively represent new attack vectors.

Then, there is the associated infrastructure growth. The addition of extra servers, network links and endpoint devices creates a more complex security challenge. Managing this while also keeping a lid on costs is no easy feat.

In these situations, many CISOs may find themselves exceeding their budget for SIEM services. They may think they have little choice but to cap the volume of log data that their SIEM is processing and analysing.

While capping the volume of data being sent to your SIEM may appear a logical way to fix a financial problem, it’s an approach that introduces fresh security risks. Excluding data from a SIEM effectively creates a security blind spot.

The challenge of SIEM pricing models

When it comes to solving this challenge, SIEM vendors certainly don’t help. In fact, the two most common subscription models only make the data-versus-budget problem worse.

In the past, vendors have charged based on capacity, with their customers typically paying an agreed amount per message, gigabyte, or second.

More recently, some SIEM vendors have adopted a user-based pricing model where customers pay a certain amount of money per user, per year. It doesn’t matter how much data each user generates as the organisation will be charged based on the total number of users. This approach is attracting a lot of attention as it offers a more direct, easy-to-understand way to budget for a SIEM.

However, user-based pricing doesn’t necessarily provide any better cost stability than capacity-based pricing, as employee headcounts are likely to increase with any business growth.

In fact, neither of these subscription-based pricing models are conducive to business growth. Under either model, enterprises lose affordability and predictability.

A better approach

Fortunately, there is another, better option for enterprises undergoing rapid growth which involves the concept of unlimited data processing. Such a SIEM license provides an insurance policy against unpredictable or rapid growth and cost blow-outs.

It also removes data ingestion restrictions, giving security vendors the freedom to ingest all data to fully protect the customer no matter what kind of growth the future brings. With this pricing model in place, it doesn’t matter how much data a SIEM processes or whether that data originates from the cloud or on-premises – it’s all included in one pre-set price.
 
Such a SIEM unlimited data processing plan is based on the idea that CISOs shouldn’t have to weigh risk against budget. Nor should they have to make difficult decisions about what data they will and will not protect.

Selecting an unlimited processing plan will allow an organisation to grow while at the same time not compromise its levels of security. Rapid growth can occur, without it resulting in spiralling SIEM costs.

It’s worth spending time to review your current SIEM charging agreement and considering whether shifting to an unlimited processing model might work for your organisation. Predictable costs and better security are within reach.
 

Story image
CrowdStrike acquires Preempt Security for $96m, develops zero trust security offerings
With this acquisition, the company plans to offer customers enhanced Zero Trust security capabilities and strengthen the CrowdStrike Falcon platform with conditional access technology. More
Story image
Video: 10 Minute IT Jams - The benefits of converged cloud security
Today, Techday speaks to Forcepoint senior sales engineer and solutions architect Matthew Bant, who discusses the benefits of a converged cloud security model, and the pandemic's role in complicating the security stack in organisations around the world.More
Story image
Why it’s essential to re-write IT security for the cloud era
Key components of network security architecture for the cloud era should be built from the ground up, as opposed to being bolted on to legacy solutions built for organisations functioning only on-premises or from only managed devices.More
Download image
Equinix study: Firms turn to NFV to support distributed networks
Decision-makers looking for a solution that virtualises a wide range of network functions should evaluate NFV, study finds.More
Story image
ConnectWise launches bug bounty program to bolster cybersecurity strategy
“Crowdsourcing in this way represents a solid additional layer of security, and we clearly value the community's expertise and participation in helping us keep our products secure."More
Story image
Trend Micro receives AWS Outposts Ready designation
rend Micro solutions are now fully and demonstrably capable of integrating with Outposts deployments.More