ArcSight Console Fundamentals

![Image result for arcsight png](https://www.verodin.com/img/logos/Arcsight.png)**What is ArcSight?**ArcSight ESM is a comprehensive and powerful Security Information and Event Management (SIEM) application for security and operations centers. It is part of the ArcSight SIEM solution, a threat detection and management platform with a flexible architecture allowing organizations to easily scale out their existing SIEM deployments as they grow their infrastructure. ArcSight ESM is used in conjunction with ArcSight Data Platform or any collection system that uses Common Event Format (CEF). It can easily integrate with investigation and/or remediation tools. **What is ArcSight used for?**• Monitor systems and infrastructure in real time for potential security threats • Identify true threats accurately within minutes so you can take action before critical systems are impacted • Understand contextual information of the events so you can make informed decisions • Detect indicators of compromise and threats that would otherwise be undetectable • Improve the efficiency of incident handling activities • Automate and streamline compliance reporting

0
0
M
Time
beginner
difficulty

![Image result for arcsight png](https://www.verodin.com/img/logos/Arcsight.png)What is ArcSight?ArcSight ESM is a comprehensive and powerful Security Information and Event Management (SIEM) application for security and operations centers. It is part of the ArcSight SIEM solution, a threat detection and management platform with a flexible architecture allowing organizations to easily scale out their existing SIEM deployments as they grow their infrastructure. ArcSight ESM is used in conjunction with ArcSight Data Platform or any collection system that uses Common Event Format (CEF). It can easily integrate with investigation and/or remediation tools. What is ArcSight used for?• Monitor systems and infrastructure in real time for potential security threats • Identify true threats accurately within minutes so you can take action before critical systems are impacted • Understand contextual information of the events so you can make informed decisions • Detect indicators of compromise and threats that would otherwise be undetectable • Improve the efficiency of incident handling activities • Automate and streamline compliance reporting

Learning Partner