Can I replace my SIEM with MDR?

man in office with provision on laptop

When you’re deciding how to spend your valuable cybersecurity budget, it’s important to understand the options and differences between them. There is a lot of confusion between MDR (Managed Detection and Response), and SIEM (Security Information and Event Management). Many people often wonder about the difference and if you can replace your SIEM with an MDR. It becomes even more confusing when a vendor throws in the term MSS (Managed Security Service) — rightly so as a managed SIEM and an MDR are technically both Managed Security Services.

Here’s what you need to know about SIEM, MDR, MSS providers, and how to tell what you may need. 

Table of Contents

What is a SIEM?

SIEM stands for Security Information and Event Management. It is a security solution that combines security information management (SIM) and security event management (SEM) into one security management system. SIEM, pronounced “sim,” collects event log data from a range of sources, identifies activity that deviates from the norm with real-time analysis, and takes appropriate action.

SIEM is important because it can help organizations detect threats before they disrupt business. It surfaces user behavior anomalies and uses artificial intelligence to automate many of the manual processes associated with threat detection and incident response.

SIEM can be used for a variety of purposes, including:

  • Detecting security threats
  • Investigating security incidents
  • Complying with regulations
  • Providing security intelligence

What is Managed Detection and Response (MDR)?

MDR is a threat detection measure, utilizing an array of tools (sometimes even a SIEM). MDR attempts to find the needle in the haystack, typically using machine learning and behavioral analytics as well as a human with the goal being to proactively disrupt an attack.

What are the features of a SIEM?

SIEM can be a valuable tool for organizations of all sizes, but it is especially important for large organizations with complex IT infrastructures.

SIEM solutions typically include the following features:

  • Event collection: SIEM solutions collect event logs from a variety of sources, including security devices, servers, and applications.
  • Event correlation: SIEM solutions correlate event logs from different sources to identify patterns that may indicate security threats.
  • Alerting: SIEM solutions generate alerts when they detect potential security threats.
  • Reporting: SIEM solutions provide reports on security events and threats.
  • Analytics: SIEM solutions use analytics to identify trends and patterns in security data.
  • Automation: SIEM solutions can automate some security tasks, such as responding to alerts and investigating incidents.

SIEM solutions can be deployed on-premises or in the cloud. On-premises solutions offer more control over the data and the security of the solution, but they can be more expensive to implement and maintain. Cloud-based solutions are less expensive to implement and maintain, but they may offer less control over the data and the security of the solution.

What are the features of MDR?

MDR can be a valuable tool for organizations of all sizes, but it is especially important for organizations that lack the resources or expertise to manage their own security operations. MDR can help organizations improve their security posture, reduce the risk of security breaches, and comply with regulations.

MDR services typically include the following features:

  • Threat detection: MDR providers use a variety of tools and techniques to detect threats, including network monitoring, endpoint detection and response (EDR), and security information and event management (SIEM).
  • Threat prioritization: MDR providers use threat intelligence and other data to prioritize threats and focus their attention on the most urgent ones.
  • Threat hunting: MDR providers actively search for threats that may not have been detected by automated systems.
  • Incident response: MDR providers can help organizations respond to security incidents, including containment, eradication, and remediation.
  • Compliance support: MDR providers can help organizations comply with security regulations, such as HIPAA and PCI DSS.

How do SIEM and MDR differ?

In the simplest terms, there are two major differences. First, MDR is a service while SIEM is a technology. Second, SIEM takes in information and then allows you do decide what to do about it, while MDR takes a proactive approach at stopping threats from the start.

You can think of it as a SIEM is spraying a mass area for mosquitoes and hoping to get everything, whereas an MDR is swatting them individually after isolating which ones were the most likely to bite. An advanced and modern MSSP is trying to know about all of the mosquitoes, report on them all and swat the ones most likely to bite.

Will I be compliant if I replace SIEM with MDR?

If you are an organization that falls under a regulatory compliance it’s likely that MDRs may not measure up to the compliance requirements. This would have to be evaluated individually to be sure, but most compliances have not caught up to MDR as a service. Another area in compliance that can be an issue for MDR is log availability and retention. Most SIEMs will be able to collect and retain all logs, where MDR is trying to pinpoint meaningful logs.

Verdict: Can I replace my SIEM with MDR?

After considering all the facts, the answer to “Can I replace my SIEM with MDR?” is still a difficult question to answer but probably not, and you probably shouldn’t.

Ideally, you would use both, but if it comes down to one or the other the managed SIEM will likely give you more bang for your buck. As time goes on it’s highly likely that MSSPs and SIEM tools will incorporate MDR and MDR will start to evolve to include SIEM elements.

Tracy Fox

Sign up for our Newsletter

Receive weekly emails for the latest cybersecurity news

Expand your team with Foresite

Enterprise-level cybersecurity and risk management for mid-sized businesses. Prioritize your security tasks and reduce the complexity of cybersecurity. 

Search