itb-au logo
Story image

A better way to budget for SIEM services during times of rapid growth

16 Mar 2020

Article by LogRhythm's APJ vice president of marketing, Joanne Wong.

Ensuring their organisation’s IT infrastructure remains secure at all times is a juggling act for most chief information security officers (CISOs). On one hand they want to invest in the most effective tools, but on the other they recognise a need to keep costs under control.

The challenge is particularly acute when it comes to budgeting for a security information and event management (SIEM) system. Here, the combination of constantly changing data volumes and consumption-based charging can make estimating costs a nightmare.

Things are made even more difficult during periods of rapid growth. Increases in headcount lead to increases in data volumes and network activity. Each new employee also boosts the organisation’s risk exposure as they effectively represent new attack vectors.

Then, there is the associated infrastructure growth. The addition of extra servers, network links and endpoint devices creates a more complex security challenge. Managing this while also keeping a lid on costs is no easy feat.

In these situations, many CISOs may find themselves exceeding their budget for SIEM services. They may think they have little choice but to cap the volume of log data that their SIEM is processing and analysing.

While capping the volume of data being sent to your SIEM may appear a logical way to fix a financial problem, it’s an approach that introduces fresh security risks. Excluding data from a SIEM effectively creates a security blind spot.

The challenge of SIEM pricing models

When it comes to solving this challenge, SIEM vendors certainly don’t help. In fact, the two most common subscription models only make the data-versus-budget problem worse.

In the past, vendors have charged based on capacity, with their customers typically paying an agreed amount per message, gigabyte, or second.

More recently, some SIEM vendors have adopted a user-based pricing model where customers pay a certain amount of money per user, per year. It doesn’t matter how much data each user generates as the organisation will be charged based on the total number of users. This approach is attracting a lot of attention as it offers a more direct, easy-to-understand way to budget for a SIEM.

However, user-based pricing doesn’t necessarily provide any better cost stability than capacity-based pricing, as employee headcounts are likely to increase with any business growth.

In fact, neither of these subscription-based pricing models are conducive to business growth. Under either model, enterprises lose affordability and predictability.

A better approach

Fortunately, there is another, better option for enterprises undergoing rapid growth which involves the concept of unlimited data processing. Such a SIEM license provides an insurance policy against unpredictable or rapid growth and cost blow-outs.

It also removes data ingestion restrictions, giving security vendors the freedom to ingest all data to fully protect the customer no matter what kind of growth the future brings. With this pricing model in place, it doesn’t matter how much data a SIEM processes or whether that data originates from the cloud or on-premises – it’s all included in one pre-set price.
 
Such a SIEM unlimited data processing plan is based on the idea that CISOs shouldn’t have to weigh risk against budget. Nor should they have to make difficult decisions about what data they will and will not protect.

Selecting an unlimited processing plan will allow an organisation to grow while at the same time not compromise its levels of security. Rapid growth can occur, without it resulting in spiralling SIEM costs.

It’s worth spending time to review your current SIEM charging agreement and considering whether shifting to an unlimited processing model might work for your organisation. Predictable costs and better security are within reach.
 

Story image
E-waste becoming a massive issue for businesses, so what can be done?
E-waste is a global concern, and is quickly becoming a crisis of its own, the researchers state. In fact, more than 53 million metric tons of e-waste was produced in 2019.More
Story image
Why 2021 will be the year of catch-up
The transition to remote work and new online contactless business models is not temporary and is affecting the future strategy on how organisations invest in cybersecurity, writes Radware vice president and managing director for EMEA and LATAM, Rob Hartley.More
Link image
The definitive checklist to distinguish a broken authentication system
An improper or insecure implementation of authentication is a critical web application security risk. This checklist will discern the good from the bad.More
Story image
The retailer safety guide for the world of online shopping
Are you an online retailer? This guide details the threats that you need to be aware of to keep safe in the biggest ever year of online shopping.More
Story image
Advanced Threat Protection from Fortinet: Prevent, detect and mitigate
Cornelius Mare, Fortinet A/NZ Director, Security Solutions, explains why zero-day threats represent an unacceptable risk to your enterprise and how to protect your network by adopting Advanced Threat Protection security services.More
Story image
Hybrid cloud is the ideal IT infrastructure model, says majority of IT execs
76% of surveyed IT decision-makers reported thinking more strategically about IT because of the pandemic, and nearly half (46%) have increased investments in hybrid cloud as a direct result of COVID-19.More