We live in an era where laws and rules mandate information security and event management. In fact, many industries are challenged to comply with SIEM rules that mandate specific security-oriented capabilities, with log management representing only a partial requirement.
So while log management is extremely important, it is clearly one piece of the security operations management puzzle. Companies today cannot be lulled into complacency thinking that simply implementing a log management strategy will solve their larger security operations management and compliance management challenges.
Your ability to prevent, detect and respond to internal and external threats that could harm your network or sensitive data is no longer just an industry best practice. Today, these information security best practices have been replaced with numerous laws and regulations that mandate prudent security information and event management.