Sign in to see all reviews and comparisons. It's Free!
By clicking Sign In with Social Media, you agree to let PAT RESEARCH store, use and/or disclose your Social Media profile and email address in accordance with the PAT RESEARCH Privacy Policy and agree to the Terms of Use.
AlienVault Unified Security Management (USM) is a comprehensive approach to security monitoring, delivered in a unified platform. The USM platform includes five essential security capabilities that provide resource-constrained organizations with all the security essentials needed for effective threat detection, incident response, and compliance, in a single pane of glass.
Category
Security Information and Event Management Software
Small (<50 employees), Medium (50 to 1000 Enterprise (>1001 employees)
Company
AlienVault
PAT Rating™
Editor Rating
Aggregated User Rating
Rate Here
Ease of use
7.8
8.1
Features & Functionality
7.8
8.0
Advanced Features
7.8
8.1
Integration
7.8
8.3
Performance
7.8
5.8
Training
—
Customer Support
7.8
—
Implementation
—
Renew & Recommend
—
Bottom Line
Designed to monitor cloud, hybrid cloud and on-premises environments, AlienVault USM significantly reduces complexity and deployment time so that you can go from installation to first insight in minutes – talk about fast threat detection.
7.8
Editor Rating
7.7
Aggregated User Rating
3 ratings
You have rated this
AlienVault Unified Security Management (USM) is a comprehensive approach to security monitoring, delivered in a unified platform. The USM platform includes five essential security capabilities that provide resource-constrained organizations with all the security essentials needed for effective threat detection, incident response, and compliance, in a single pane of glass. AlienVault unifies all essential security tools in one location and combines them with real-time threat intelligence. Within minutes of installing AlienVault USM Anywhere or USM Appliance, the built-in asset discovery will find and provide visibility into the assets in AWS, Azure, and on-premises environments. Users will be able to discover all the IP-enabled devices on network, determining what software and services are installed on them, how they’re configured, any potential vulnerabilities and active threats being executed against them. If users have cloud infrastructure, USM Anywhere’s built-in asset discovery capability will find and provide visibility into the assets in AWS and Azure environments.AlienVault USM provides all this information in a single pane of glass, so users can easily perform network vulnerability assessment in cloud, hybrid cloud, and on-premises environments. It brings together five essential security capabilities—asset discovery and inventory, vulnerability assessment, intrusion detection, behavioral monitoring, and SIEM & log management—all in a unified, easy-to-use platform. In addition, continuous threat intelligence, including vulnerability signatures, are delivered directly from AlienVault Labs Security Research Team, backed by the AlienVault Open Threat Exchange (OTX). AlienVault Unified Security Management (USM) delivers built-in intrusion detection systems for critical IT infrastructure, enabling users to detect threats as they emerge in the cloud and on premises. With AlienVault USM, users can also collect and correlate events from existing IDS/IPS into a single console for complete security visibility while protecting investments. As soon as AlienVault Unified Security Management (USM) is installed, the behavioral monitoring functionality starts gathering data to help users understand “normal” system and network activity. Using the built-in network behavior monitoring you can simplify the incident response when investigating an operational issue or potential security incident. And because AlienVault USM combines network behavioral analysis with service availability monitoring, users will have a full picture of system, service, and network anomalies.
By clicking Sign In with Social Media, you agree to let PAT RESEARCH store, use and/or disclose your Social Media profile and email address in accordance with the PAT RESEARCH Privacy Policy and agree to the Terms of Use.