SIEM ingests event data from a wide range of sources across an organization’s entire IT infrastructure, including on-premises and cloud environments.
Event log data from users, endpoints, applications, data sources, cloud workloads and networks, as well as data from security hardware and software, such as firewalls or antivirus software, is collected, correlated and analyzed in real-time.
Some SIEM solutions also integrate with third-party threat intelligence feeds to correlate their internal security data against previously recognized threat signatures and profiles. Integration with real-time threat feeds enables teams to block or detect new types of attack signatures.