Chapter 5: Selection & Interfaces

Core product introduction, typical wiring, interface logic, and comprehensive product feature comparison

Selecting the right products for a cybersecurity monitoring system requires understanding both the functional capabilities of each component and the interface requirements for integration. This chapter introduces the five core product categories that form the foundation of a complete monitoring architecture, presents the interface and connection logic that defines how these products communicate, and provides a detailed feature comparison table to guide procurement decisions.

5.1 Core Product Introduction

The five core product categories — SIEM Platform, Network TAP/Bypass, Log Collector Appliance, Threat Intelligence Platform, and SOAR Automation Platform — work together to provide complete monitoring coverage from data collection through automated response. Each product category has distinct technical requirements and selection criteria that must be evaluated against the specific deployment scenario.

Core Cybersecurity Monitoring Products

Figure 5.1: Core Cybersecurity Monitoring Product Lineup — Enterprise SIEM Platform, Network TAP/Bypass Appliance, Log Collector, Threat Intelligence Platform, and SOAR Automation Platform in professional product showcase.

Product CategoryPrimary FunctionForm FactorKey SpecificationTypical Deployment
Enterprise SIEM PlatformEvent correlation, alerting, investigation2U/4U rack server or VM50,000+ EPS, 1 PB+ storageCentral data center
Network TAP/BypassPassive traffic capture without disruption1U rack appliance10/40/100G, failopen modeCore network inline
Log Collector ApplianceMulti-protocol log aggregation and normalization1U rack appliance or VM20,000 EPS per collectorDistributed (per site)
Threat Intelligence PlatformIOC management, threat feed aggregation2U rack server or VM100M+ IOC capacityCentral or cloud
SOAR Automation PlatformPlaybook automation, incident orchestrationVM or SaaS1,000+ pre-built playbooksCentral SOC

5.2 Typical Wiring & Interface Logic

The interface and connection logic defines the exact protocols, ports, and data flows between all components in the monitoring architecture. Understanding this interface map is essential for network firewall rule configuration, capacity planning, and troubleshooting. The diagram below shows the complete interface topology from data sources through the log collector to the SIEM platform and its downstream integrations.

Interface and Connection Logic Diagram

Figure 5.2: Interface and Connection Logic Diagram — Data source interfaces (left), Log Collector port specifications (center), SIEM Platform output interfaces (right), with color-coded connections: blue for log ingestion, orange for alerts, green for management.

InterfaceProtocolPortDirectionEncryptionNotes
Syslog (UDP)Syslog RFC 3164/5424UDP 514Source → CollectorNone (plain)Legacy devices; use TCP for reliability
Syslog (TCP/TLS)Syslog over TLSTCP 6514Source → CollectorTLS 1.2+Recommended for all new deployments
HTTPS APIREST/JSON over HTTPSTCP 443Source → CollectorTLS 1.2+Cloud services, modern applications
SFTPSSH File Transfer ProtocolTCP 22Source → CollectorSSHBatch log file transfer
Log ForwardingProprietary/RESTTCP 8443Collector → SIEMTLS 1.2+Normalized events from collector to SIEM
Alert APIREST/JSON over HTTPSTCP 443SIEM → SOARTLS 1.2+Alert forwarding to SOAR for automation
TicketingREST/JSON over HTTPSTCP 443SIEM → ITSMTLS 1.2+Incident ticket creation in ServiceNow/Jira
DashboardHTTPSTCP 8080/443Browser → SIEMTLS 1.2+Analyst workstation access

5.3 Core Product Feature Comparison Table

The following comprehensive feature table enables direct comparison of the five core product categories across all critical functional dimensions. This table serves as the primary reference for procurement evaluation and gap analysis when assessing existing tooling against the reference architecture requirements.

Feature Category Feature SIEM Platform Network TAP Log Collector Threat Intel SOAR Platform
Data CollectionSyslog (UDP/TCP/TLS)✓ Primary✓ Primary
REST API Integration
Network Packet CaptureOptional✓ Primary
Agent-based Collection
ProcessingLog Parsing & Normalization✓ Primary
Real-time Correlation✓ Primary
ML Anomaly Detection
IOC EnrichmentBasic✓ Primary
ResponseAlert Generation✓ Primary
Automated PlaybooksBasic✓ Primary
Ticketing Integration✓ Primary
Firewall Block ActionVia SOAR✓ Primary
ComplianceAudit Log Retention✓ PrimaryBuffer
Compliance Reporting✓ PrimaryPartial
Chain of Custody
OperationsHigh Availability✓ Cluster✓ Failopen✓ Active-Active✓ HA Pair✓ HA
Multi-tenancyPartial
API Management✓ Primary

Legend: ✓ = Full support (primary function); Partial = Limited or optional support; — = Not applicable

← Architecture Design Chapter 6: Security & Risks →