What is a Next-Gen SIEM?

Organizations today are faced with an increasing number of sophisticated threats that traditional security tools, which they struggle to address effectively. As a result, Next-Generation SIEM (NG-SIEM) solutions have emerged as a vital part of modern security infrastructures.

These advanced platforms combine traditional SIEM functionality with cutting-edge technologies like machine learning, artificial intelligence, and automated response capabilities. The goal is to offer better detection, more efficient incident response, and a more comprehensive approach to cybersecurity.

Key capabilities of Next-Gen SIEM solutions include real-time threat detection, automated threat response, and the ability to leverage big data analytics to identify patterns that may indicate an attack. Furthermore, they are designed to scale with the growing needs of modern enterprises, supporting both on-premise and cloud-based infrastructures.

Unlike conventional SIEM tools, which primarily focus on log collection and basic event correlation, Next-Gen SIEM platforms offer deeper integration with other security technologies, such as endpoint detection and response (EDR), network traffic analysis (NTA), and cloud security monitoring. This broader scope enables organizations to detect complex threats that span multiple environments and take a more proactive approach to threat hunting.

This guide explores the features, benefits, and use cases of these advanced solutions, providing valuable insights for organizations seeking to enhance their security operations. We explain the advantages of adopting a Next-Gen SIEM system, such as faster incident response, improved threat intelligence, and reduced false positives. We also examine the challenges organizations may face when transitioning to this advanced security approach.

Next-Gen threat intelligence

The “next-gen” concept, whether applied to AVs or SIEM services is an attempt to cut out the middle man. Users of security systems can alert each other to the presence of a new attack. However, the mechanism for sharing attack information needs to be automated.

A big problem with AV database updates in the past is that users didn’t keep constantly connected to the internet and preferred to manually command an update. This opened up the possibility of some installations becoming out-of-date very quickly and left systems vulnerable to attack. Next-Gen SIEM systems stay connected to the internet all of the time so that they can receive attack signature updates without the need for manual intervention.

The Next-Gen system is a peer-to-peer operation. Just like with file-sharing systems, the SIEM package acts as an information network client. It is like there is a built-in uTorrent client in there. The information-sharing system is often called a “threat intelligence feed.” The client for this information-sharing network is able to both read in new updates and post information for others to access.

Not only does this threat intelligence system remove the need for a central lab to formulate threat signatures, but it also takes the system administrator out of the process.

The threat intelligence manager within the SIEM follows a common reporting format. Once a new attack strategy is detected within the SIEM, the threat intelligence client formats this information and uploads it to the information exchange. All other SIEM systems in the world that subscribe to the same threat intelligence feed regularly poll the data source for new posts and then download them.

Through the peer-to-peer threat intelligence model, SIEM systems can get warnings of new attacks almost as soon as a hacker team tries out its method for the first time. This has a double benefit. First of all, the number of systems that a zero-day attack can actually damage is drastically reduced. A secondary benefit of this system is that it cuts down the opportunities for hacker teams to recover the cost of developing a new attack vector. Thus, as next-gen systems become more common, hacking becomes less profitable.

Although there are a number of bored teenagers in the world that try to break into IT systems just for fun, the most damage that is caused to IT security is from professional teams of hackers who make a good living out of the business. Removing their profitability reduces the incentives for hacking and cuts the amount of time and money that can be spent developing new hacking strategies.

Anomaly detection

The common pool of threat intelligence is the mediating system that makes next-gen SIEM systems so effective. However, that rapid distribution of information wouldn’t be much use if the subscribing cybersecurity packages weren’t able to spot unexpected attack strategies.

Anomaly detection is a key source of new information for threat intelligence feeds. Although the information on what behavior to look out for helps SIEM systems react rapidly to new attacks, it isn’t the only method these systems use to block malicious activity.

Next-gen SIEM services use a system of activity tracking that is based on machine learning – a strategy that was developed for Artificial Intelligence. This tracks all activity on a network and on endpoints over time. It looks for regular patterns in behavior and creates a baseline from that pattern.

When a user account suddenly performs different actions to the normal activity expected from that user group, the SIEM system pays closer attention. This is a method called “triage.” It cuts down the amount of processing that a SIEM system needs to do. Special routines only kick in once a candidate for surveillance is identified by the anomaly detection systems that look for deviations from the baseline of normal activity.

As the investigation deepens, suspicious patterns of behavior can then be checked against the intelligence feed. Further anomalies cause that pattern of activity to be uploaded to the threat intelligence system. Thus, many implementations of the same SIEM system will start to research that activity even before it is proven to be caused by an intruder or new malware.

Threat intelligence data sources

Cybersecurity systems producers run their own threat intelligence networks, which is simply a common data store for all threat information gathered by each implementation. Many vendors make their threat intelligence pools available to non-customers as well. There are vendor-neutral threat intelligence systems as well. Some cyber threat intelligence (CTI) systems are open-source and free to access, while others are only available to those who pay a subscription.

In all probability, when you buy or subscribe to a next-gen SIEM, the decision of which CTI feeds the service will take has already been made for you. The supplier of your SIEM will probably already run an in-house CTI for information sharing among customers. These services might also include access to some open-source CTIs.

There are two widely used data exchange formats for CTI systems:

  • Collective Intelligence Framework
  • Structured Threat Information Expression

If a cybersecurity firm creates its intelligence feed along with one of these standards, many other systems will be able to receive data from the information pool.

Collective Intelligence Framework

The Collective Intelligence Framework (CIF) is an open-source formatting and management system for threat intelligence feeds. It assigns a type to each notification, such as Botnet, Phishing, or Malware, and it also has a Confidence factor field, which will be a number up to 100 with 75 to 84 indicating “reliable,” 85 to 94 being “very reliable.”

You can learn more about this system at its home on the CSIRT Gadgets website.

Structured Threat Information Expression

Structured Threat Information Expression (STIX CTI) is another free, open-source system for managing threat intelligence pools. This system has its own message communication and storage protocol. This system is a little more complicated than CIF because it is structured as objects that gain meaning through connections. Rather than a single record format, the STIX database contains a number of TTP objects. TTP stands for “tactics, techniques, and procedures.”

In order to process a threat intelligence notification, you would need to load in a TTP object, such a Malware, and that bring through all of the linked objects, such as “Indicator” or “Course of Action.” Each object contains further information.

You can learn more about the STIX project on its GitHub page.

Next-gen SIEM use cases

In SIEM, a use case is a specification of technical rules. It is a set of events that if detected in combination will trigger an alert or some other action. The list of actions to implement also form part of the use case. In other words, it is a number of things to look out for.

The triggering events in a use case don’t necessarily need to occur in a specific order. The next-gen SIEM will be shipped with a number of use cases to get it started. However, the point of the “next-gen” part of these systems is that they adapt to evolving events. Thus, they are able to build new use cases from information that is pulled in from the threat intelligence feed.

Use cases can be slanted according to specific security goals. For example, if the business needs to comply with specific security standards, such as HIPAA or PCI DSS, the emphasis of the threat detection system will need to have event detection rules around a particular type of data, which is held in specific locations.

The concept of “triage” is expressed in the use cases of the next-gen SIEM. For example, if the SIEM detection system is working with a specific use case that contains four different events, the detection of one of those four will cause the SIEM tool to gather deeper intel on the actions of the user account that performed that action, looking for signs of the other three linked events.

In the above action, deeper tracking of an account is an action in the use case. The use case might specify a lower-level alert to notify operators if just one or two linked actions are detected. The combination of all events in the use case occurring can be set to trip an automated action, such as locking an account or instructing the network firewall to block all access from a specific IP address. In all events, the staged encounter of elements in a use case will be logged.

Pros & cons of next-gen SIEM

Apart from the pros and cons of using a SIEM system, there are specific advantages and disadvantages to next-gen SIEMs.

Next-Gen SIEM Pros

  • Fewer false-positive alarms due to machine-learning adjusting normal activity baselines
  • Faster communication between threat intelligence feed subscribers of new attack vectors
  • The integration and collaboration with existing protection systems, such as firewalls and access rights management systems for threat mitigation
  • Faster detection of potential threats through the use of heuristics that identify partial matches to known threats
  • Less processing of data through staged reaction levels to normal activity tracking through suspicion to focused tracking

Next-Gen SIEM Cons

  • The loss of the internet connection reduces the effectiveness of the SIEM system, which creates a point of weakness
  • The system is autonomous and is, therefore, difficult to understand or manage
  • The next-gen SIEM service is difficult to benchmark – is your SIEM working well or have you just not been subjected to many attack attempts?
  • The dependency on a remote threat intelligence feed creates a vulnerability – if hackers can manipulate the feed source, many dependent systems could be attacked

Implementing next-gen SIEM

More than any other cybersecurity system, next-gen SIEMs are interdependent packages of many specialist modules. These services are highly automated and very autonomous. This means that the quality of the service is very important, particularly the quality of the associated threat intelligence feed. You can read our recommendations on excellent next-gen SIEMs to consider in the Best Next-Gen SIEMs.