Information security
Information Security Management System - the foundation of security in the organization.
General information

The solutions offered by APIUS in the area of information security management constitute effective support for the security department by increasing the effectiveness of actions taken and by reducing the involvement of human resources in this process.

The knowledge of events and processes taking place in information systems is the basis for their effective protection. The main source of this knowledge are logs generated by systems, devices and applications. Their collection and analysis are also more and more often required by numerous standards and regulations related to security such as PCI DSS or SOX.

The SIEM-class products have been developed to meet these requirements. They enable the collection and protection of logs, reporting on the basis of the collected data and alarming about events that carry potential threats. Their role can be summarised in one phrase: giving meaning to information.

The SIEM systems, despite their unquestionable advantages, are not able to provide complete information about events and the state of security of the organisation. It is therefore essential to design and implement an appropriate safety management process in which SIEM plays a key role.

The value of the information collected by SIEM can be significantly increased by ensuring advanced integration between it and other safety management solutions such as:

  • IDM/PIM – systems used to manage identity/privileged accounts, which can enrich the clarity of reports and alarms and, above all, improve the possibilities to correlate events, taking into account the identity context,
  • DAM – specialised database monitoring systems provide information of much higher quality than standard DBMS logs,
  • VA/VM – vulnerability evaluation (vulnerability management) tools allow to eliminate many false alarms and to evaluate the impact of an incident on the security of networks and computers,
  • NBA/UBA – they extend the area of observation by including network events and events related to the broadly understood activity of users that are not reflected in the logs, and they constitute an extremely effective tool for detecting the activity of malware,
  • DLPs – enable the inclusion of information related to an event in the analysis, which is of great importance for the evaluation of the significance of a given incident.
Usefull knowledge

Only multidimensional solutions consisting of several technologies offer real protection.

  • The safety management process enables constant monitoring of the organisation's security level from the point of view of current threats as well as taking appropriate steps to address the threats.
  • This process should be permanent and iterative so that the security mechanisms in place can be improved on the basis of experience gained so far.
  • Having the right tools is essential for this process to be carried out efficiently and without excessive human resources.
  • The need for safety management results also from legal regulations, e.g. the GDPR/RODO directive, which enters into force in 2018, imposes numerous obligations in the scope of safety management the implementation of which may be difficult (if possible at all) without dedicated tools such as the obligation to report all incidents that have occurred with a strict time limit of 72 hours.
Our partners in the field of Information security management
See also