Learning Library

← Back to Library

Bridging SIEM Gaps with Federated Search

Key Points

  • Attackers typically remain undetected for roughly 300 days because organizations lack full visibility into all their security data.
  • SIEMs aggregate logs from various security devices to provide near‑real‑time alerts, but many sources—such as endpoint detection tools, legacy systems, or newly acquired SIEMs—often remain unconnected, creating “SIEM gaps.”
  • Expanding SIEM ingestion to cover every data source quickly becomes cost‑prohibitive, forcing teams to prioritize only the most critical streams for real‑time monitoring.
  • A federated search approach can complement SIEMs by leaving data where it resides and retrieving relevant information on‑demand, reducing storage costs while still supporting alerting, forensics, and threat hunting.

Full Transcript

# Bridging SIEM Gaps with Federated Search **Source:** [https://www.youtube.com/watch?v=3MsxAwEshfk](https://www.youtube.com/watch?v=3MsxAwEshfk) **Duration:** 00:04:50 ## Summary - Attackers typically remain undetected for roughly 300 days because organizations lack full visibility into all their security data. - SIEMs aggregate logs from various security devices to provide near‑real‑time alerts, but many sources—such as endpoint detection tools, legacy systems, or newly acquired SIEMs—often remain unconnected, creating “SIEM gaps.” - Expanding SIEM ingestion to cover every data source quickly becomes cost‑prohibitive, forcing teams to prioritize only the most critical streams for real‑time monitoring. - A federated search approach can complement SIEMs by leaving data where it resides and retrieving relevant information on‑demand, reducing storage costs while still supporting alerting, forensics, and threat hunting. ## Sections - [00:00:00](https://www.youtube.com/watch?v=3MsxAwEshfk&t=0s) **Visibility Gaps and SIEM Limitations** - The speaker explains how attackers remain undetected for months due to blind spots in traditional security monitoring, describes how SIEMs aggregate logs to provide near‑real‑time detection, and highlights common integration gaps—such as missing endpoints or legacy SIEMs—that limit their effectiveness. - [00:03:11](https://www.youtube.com/watch?v=3MsxAwEshfk&t=191s) **Leveraging Federated Search for SIEM** - The speaker describes how integrating a SIEM with federated search allows data to stay in place, reduces costs, and enhances visibility by combining bottom‑up and top‑down investigative approaches. ## Full Transcript
0:00You can't secure what you can't see. 0:03In fact, surveys tell us that on average, 0:07the bad guys are in your system for almost 300 days before it's realized. 0:12Now, why is that? 0:14It's because the systems that we use to discover this 0:18oftentimes have gaps in their understanding, 0:20and you can't secure what you can't see. 0:23So what do we use to look for these kinds of incidents when someone's breaking in? 0:28Well, we use a technology called a security information and event management system, 0:34or I'll call it a SIEM for short. 0:36And what we do with a SIEM is we take different devices that we have in our environment. 0:42Let's say maybe a firewall, maybe a network intrusion prevention system, 0:47maybe a system where I'm going to take all the logs from that system. 0:52I take all of that information and forward it up into the SIEM 0:56where I have a database where that information is stored, 1:00and then I have a security analyst up at the SIEM that takes the information 1:06once it's been collected, aggregated, correlated, and we apply a security policy to it 1:13in order to find out, in near real time, when someone has broken into our systems. 1:18So that ought to work really well. 1:20And generally it does. 1:21But there are some limitations. 1:23Why do we have limitations? 1:25Well, it turns out that a lot of organizations have other systems 1:29that are not feeding into their SIEM. 1:31Maybe an endpoint detection and response system. 1:36Could be that through an acquisition or merger 1:40you have another SIEM that you acquired from the other organization and it's not feeding in. 1:46And then a lot of organizations are creating things they call data lakes, 1:50where they're collecting security information in order to do some of their own analysis 1:55using their own data scientists that are in-house. 1:58And all of these things collectively amount to a "SIEM gap". 2:04These are the gaps that hurt our visibility. 2:08What I need is a more integrated view that allows me to see all of these things at once. 2:13Well, what's preventing that? 2:14In many cases, it's cost. 2:17It's the fact that the more information I put up into my SIEM, 2:23the more expensive the SIEM gets. 2:25That's the way most of these are priced. 2:27So there's some information I need for real time alerting 2:31and other information I might need for forensic analysis, 2:35for threat hunting, for after-the-fact kind of analysis. 2:39So what I really would like to have 2:42is something that complements the capability that I've just described with a SIEM. 2:47And I'll suggest to you that could be something like a federated search capability. 2:54In federated search, instead of bringing all the information up, 2:57as we did here with the SIEM, 2:59you notice this is a very bottoms-up approach, 3:03in fact, what I want to do with Federated Search is leave the data in place 3:07and then go out and retrieve it just in time. 3:11So you notice I don't have the massive database where everything is collected in advance. 3:16I can have just the information that needs to be into the SIEM there 3:20and have it then serve as a way to let me know 3:24when I need to do an investigation. 3:27Now my analyst sits over here 3:29and they're able to see the alarms that come in. 3:32And, in some cases, I'll tie the SIEM back into the federated search capability. 3:38So now I have the ability to search all of these other areas that had been dark before, 3:43as well as the SIEM, in an integrated system. 3:47And what this does for me now with Federated Search, I leave the data in place. 3:52Why is that useful? 3:53Leaving the data in place helps reduce cost. 3:57So we lower the cost because I'm not sending all the information into the SIEM. 4:04By leaving the data in place, I have a more efficient operation. 4:12A more efficient operation means I don't have to process all of that information in advance. 4:18I can go get the parts that I need in advance 4:20and the rest of it I go get just when I need it. 4:23So I suggest to you that this bottom up, complemented with a top down approach, 4:29give you the best of both worlds. 4:31As I said at the beginning, you can't secure what you can't see. 4:34So we need to fill the gaps in the visibility that we have. 4:38We need to get rid of the SIEM gaps. 4:40And this is a way to do it. 4:43Thanks for watching. 4:43Please remember to like this video 4:45and subscribe to this channel 4:46so we can continue to bring you content that matters to you.