The CISO’s Guide to

Azure Sentinel

The CISO’s Guide to Azure Sentinel


Wednesday 9th December 2020 | 2-3 minute read

As infrastructure becomes more complex, the importance of security processes has increased significantly. Faced with a constant flow of log data and alerts, your security team might be feeling overwhelmed.

It is also highly likely that your team has been relying on some form of on-premise security information and event management (SIEM) toolkit to try and cut through the white noise. But the reality is that 44% of alerts are never investigated or escalated to incident response – and this places your systems at risk of compromise.

Ignoring alerts is neither sustainable nor responsible – eventually one will relate to a real threat that needs to be investigated and dealt with. Security services are now a strategic imperative, with incidents like the WannaCry and NotPetya malware outbreaks helping to emphasise their importance. The hugely disruptive nature of these events serves as a warning to under-prepared businesses of the potential risks they face every day.


Your on-premise SIEM toolkit creates risk

Until now, on-premise SIEM capabilities have been a reasonable attempt at formalising threat intelligence and security monitoring, but now it’s time to consider the next evolution to better protect your IT assets.

Why? First, your on-premise SIEM is costly to maintain and update, taking resources away from dealing with actual events. Second, the on-premise approach is at odds with the modern hybrid cloud platform. Third, with limited access to skills and computing power, your toolkit cannot take full advantage of machine learning and artificial intelligence-powered incident response.

The system probably works ok – but not as well as you need.


The hybrid SIEM services approach

More than a basic data logging platform, Azure Sentinel connects to all your assets to provide intelligent security analytics for your entire IT estate – on-premise and in the cloud.

With built-in machine learning, including User and Entity Behaviour Analytics, Azure Sentinel detects ‘unknown threats’ as well as common cyberattack signatures. This approach helps to protect hybrid cloud assets from internal risks such as insider threats and compromised user accounts.

Azure Sentinel is not a passive monitoring solution either. The platform offers integrated threat hunting capabilities, enabling you to adopt a proactive security posture. With a little help from the Maple Networks security team, you can turbo-charge your response to risks, helping to dramatically reduce potential damage.

Leveraging the power and the potential of the cloud, Azure Sentinel uses machine learning to analyse and assess your systems. This allows the platform to automatically establish a baseline of “normal” operations, which becomes a reference point for the built-in Artificial Intelligence (AI). It then automatically categorises potential threats passed into the system, helping to reduce false-positives and accelerate speed and accuracy of detecting and mitigating unknown threats.


Why make the move?

Migrating to Azure Sentinel SIEM solves two major problems. First, the platform is constantly updated and developed to improve protection and coverage as a regular part of the service. Freed of the mundane, repetitive task of log monitoring, your in-house security team can focus on adding value through internal cyber security projects and improving security posture.

Second, Azure Sentinel combines the power and scalability of the cloud to ensure all your assets are properly logged, analysed and monitored.

In addition, Azure Sentinel is billed on a pay-as-you-go (PAYG) basis, ensuring costs are properly controlled without limiting the growth potential of your business. And with the ability to log by API, monitoring can be extended to applications such as video conferencing software for improved, continuous response.

These capabilities can be further enhanced with threat intelligence services from a partner such as Maple Networks. Drawing industry insights from other trusted sources, the Maple Networks team can proactively manage known threats, and prepare a plan of defence. This takes care of your low-level security responses, strengthening your security posture and providing a base for future improvement.

Azure Sentinel is specifically built for the hybrid environment, offering complete protection for your business. Moving your SIEM capabilities to the cloud will better prepare your organisation to manage emerging situations and risks, including the new remote working paradigm.

To learn more about Azure Sentinel SIEM and how it can be used to improve your information and event management capabilities, get in touch.

Contact us