Want to see who topped the 2019 Best Software Awards?

AlienVault USM

4.4
(78 reviews)

AlienVault Unified Security Management (USM) is a platform that provides five essential security capabilities in a single console to manage both compliance and threats, understanding the sensitive nature of IT environments, include active, passive and host-based technologies to match the requirements of each particular environment.

Work for AlienVault USM?

Learning about AlienVault USM?

We can help you find the solution that fits you best.

AlienVault USM Features

Response

Resolution Automation

Diagnose and resolve incidents without the need for human interaction.

Not enough data available

Resolution Guidance

Guide users through the resolution process and give specific instructions to remedy individual occurrences.

Not enough data available

System Isolation

Cuts off network connection or temporarily inactivate applications until incidents are remedied.

Not enough data available

Threat Intelligence

Gathers information related to threats in order to gain further information on remedies.

Not enough data available

Cloud Visibility

Data Discovery

Unveils applications in use and trends associated with traffic, access, and usage.

91%
(Based on 15 reviews)

Cloud Registry

Details SaaS products the cloud security product can integrate with and provide security for.

88%
(Based on 15 reviews)

Cloud Gap Analytics

Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols.

79%
(Based on 13 reviews)

Network Management

Activity Monitoring

Documents the actions from endpoints within a network. Alerts users of incidents and abnormal activities and documents the access point.

89%
(Based on 45 reviews)

Asset Management

Keeps records of each network asset and its activity. Discovers new assets accessing the network.

77%
(Based on 41 reviews)

Log Management

Provides security information and stores the data in a secure repository for reference.

89%
(Based on 45 reviews)

Records

Incident Logs

Information on each incident is stored in databases for user reference and analytics.

Not enough data available

Incident Reports

Produces reports detailing trends and vulnerabilities related to their network and infrastructrue.

Not enough data available

Resource Usage

Analyzes recurring incidents and remedies to ensure optimal resource usage.

Not enough data available

Security

Data Security

Manages policies for user data access and data encryption.

93%
(Based on 16 reviews)

Data loss Prevention

Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest.

87%
(Based on 15 reviews)

Security Auditing

Analyzes data associated with security configurations and infrastructure to provide vulnerability insights and best practices.

93%
(Based on 16 reviews)

Incident Management

Event Management

Alerts users of incidents and allows users to intervene manually or triggers an automated response.

89%
(Based on 45 reviews)

Automated Response

Reduces time spent remedying issues manually. Resolves common network security incidents quickly.

78%
(Based on 38 reviews)

Incident Reporting

Documents cases of abnormal activity and compromised systems.

84%
(Based on 41 reviews)

Management

Incident Alerts

Gives alerts when incidents arise. Some responses may be automated, but users will still be informed.

Not enough data available

Database Management

Adminstrators can access and organize data related to incidents to produce reports or make data more navigable.

Not enough data available

Workflow Management

Administrators can organize workflows to guide remedies to specific situations incident types.

Not enough data available

Identity

SSO

Provides a single access point for users to access multiple cloud products without multiple logins.

82%
(Based on 9 reviews)

Governance

Allows users to create, edit, and relinquish user access privileges.

86%
(Based on 10 reviews)

User Analytics

Allows for reporting and documentation of individual user behavior and privileges.

88%
(Based on 13 reviews)

Security Intelligence

Threat Intelligence

Stores information related to common threats and how to resolve them once incidents occur.

91%
(Based on 46 reviews)

Vulnerability Assessment

Analyzes your existing network and IT infrastructure to outline access points that can be easily compromised.

86%
(Based on 44 reviews)

Advanced Analytics

Allows users to customize analytics with granulized metrics that are pertinent to your specific resources.

88%
(Based on 15 reviews)

Data Examination

Allows users to search databases and incident logs to gain insights on vulnerabilities and incidents.

85%
(Based on 39 reviews)
AlienVault USM
4.4
(78 reviews)