Skip to main content

Google SecOps: The SIEM’s Third Act

SIEM's complicated evolution has resulted in unsustainable cost increases, scope creep, and the occasional declaration that the product space is essentially dead. Thanks to deep expertise in search and data management, access to OSINT and frontline intelligence, and AI-infused features, Google SecOps demonstrates that the SIEM still has plenty of gas in the tank. Discover how SecOps is ushering in the "SIEM's Third Act" by addressing the limitations of traditional SIEMs and empowering security teams with cutting-edge tools for threat-informed defense.

SANS_Google_SecOps_The_SIEMs_Third_Act (PDF, 3.43MB)

21 Jan 2025
ByMark Orlando
Share
All papers are copyrighted

No re-posting of papers is permitted

Related Content

SANS 2025 Security Awareness Report

Research Paper

Now in its 10th year, the SANS Security Awareness Report remains the definitive, practitioner-built resource for understanding and managing the human side of cybersecurity.

  • 12 Aug 2025
  • Lance Spitzner

Be a DLP Hero: How to Quickly Deliver Value from Your DLP Program and Set It Up for Future Success

Research Paper

Download this paper and learn how to launch or strengthen your data loss prevention (DLP) program.

  • 3 Jun 2025
  • Kevin Garvey

Resiliency and Business Continuity in the Cloud Era

Research Paper

In this white paper, Dave Shackleford unpacks today’s evolving cloud threat landscape.

  • 21 May 2025
  • Dave Shackleford

SANS 2025 CTI Survey Webcast & Forum: Navigating Uncertainty in Today’s Threat Landscape

Research Paper

This paper explores results from the SANS 2025 CTI Survey, with insights into how cybersecurity...

  • 20 May 2025
  • Rebekah Brown, Andreas Sfakianakis

Collaborative Mobile App Security Development and Analysis

Research Paper

In this tactical, insight-rich review, Jeroen Beckers shares how to overcome mobile app security challenges and modernize your testing with Corellium’s virtual device platform—built for real-world conditions and faster results.

  • 19 May 2025
  • Jeroen Beckers

A Pebble In the Ocean: Maximizing Log Fidelity In Container Environments

Research Paper

Log fidelity is crucial for Incident Response Teams to investigate and contain cyber incidents but can be difficult to optimize in containerized environments.

  • 17 Apr 2025

ARMO’s Behavioral Cloud Application Detection and Response (CADR) Platform

Research Paper

This paper explores how ARMO Platform is attempting to solve the challenge with the industry’s first behavioral cloud application detection and response (CADR) product.

  • 18 Mar 2025
  • Moses Frost

ASPM: Understanding the New Application Security Landscape

Research Paper

Malicious actors continue to prey on the challenges of rapid software development cycles and cloud computing adoption. This paper examines where an application security posture management (ASPM) solution comes in.

  • 18 Mar 2025
  • Chris Edmundson, SANS Institute

2025 ICS/OT Cybersecurity Budget: Spending Trends, Challenges, and the Future

Research Paper

This white paper explores the findings of the 2025 SANS Survey on ICS/OT Security Budgets.

  • 3 Mar 2025
  • Dean Parsons

Empowering Responders with Automated Investigation

Research Paper

This white paper investigates how Binalyze’s AIR platform reduces the overhead of forensic investigations by automating the process of collecting artifacts, triaging the data, and identifying next steps.

  • 18 Feb 2025
  • Megan Roddie-Fonseca

Unveiling the Dependency on Network Telemetry: Optimizing Lateral Movement Detection

Research Paper

This study investigates the dependency on network and endpoint telemetry for identifying lateral movement attacks, focusing on the Remote Services technique from MITRE ATT&CK.

  • 17 Jan 2025

Beyond Detection: Using Real Phishing Data to Gauge Security Training Program Success

Research Paper

This paper defines one method of network security monitoring in an organization to find these existing indicators.

  • 7 Jan 2025

Protecting the Poor: A Deep Dive into EBT Skimming and Solutions to Combat It

Research Paper

This paper examines why EBT cards are vulnerable to skimming and explores potential preventive measures.

  • 23 Dec 2024

Metrics-Driven Information Security Framework as Part of Information Security Management

Research Paper

This paper presents a model of creating an actual accurate metrics-based security reporting model that is tied closely to the security management model used at the company.

  • 22 Mar 2022

Denial of Service Deterrence

Research Paper

Denial of Service has been a very useful practice for attackers and continues to remain prevalent...

  • 1 Apr 2015

Practical El Jefe

Research Paper

El Jefe is open source process monitoring software for Windows. With this tool, incident handlers...

  • 31 Mar 2015

Using Influence Strategies to Improve Security Awareness Programs

Research Paper

Even companies with extensive, well-funded security awareness programs fall victim to attacks...

  • 25 Oct 2013

Talking Out Both Sides of Your Mouth: Streamlining Communication via Metaphor

Research Paper

As Security is a relatively new field, we are still learning how to communicate what we know with...

  • 4 Oct 2013

Information Risks and Risk Management

Research Paper

This brief will cover the various exposures that companies now face as they increasingly rely on...

  • 1 May 2013

Surfing the Web Anonymously - The Good and Evil of the Anonymizer

Research Paper

Companies of all sizes spend large amounts of time, resources, and money to ensure that their...

  • 8 Oct 2012

Subscribe to GIAC’s Monthly Newsletter

Receive expert insights, priority access to certifications, essential updates on regulatory changes and industry developments.