AlienVault USM

AlienVault USM

4.4
(75)

AlienVault Unified Security Management (USM) is a platform that provides five essential security capabilities in a single console to manage both compliance and threats, understanding the sensitive nature of IT environments, include active, passive and host-based technologies to match the requirements of each particular environment.

Work for AlienVault USM?

Learning about AlienVault USM?

We can help you find the solution that fits you best.

Find the Right Product

AlienVault USM Features

Response

Resolution Automation

Diagnose and resolve incidents without the need for human interaction.

Not enough data available

Resolution Guidance

Guide users through the resolution process and give specific instructions to remedy individual occurrences.

Not enough data available

System Isolation

Cuts off network connection or temporarily inactivate applications until incidents are remedied.

Not enough data available

Threat Intelligence

Gathers information related to threats in order to gain further information on remedies.

Not enough data available

Cloud Visibility

Data Discovery

Unveils applications in use and trends associated with traffic, access, and usage.

88%
(Based on 13 reviews)

Cloud Registry

Details SaaS products the cloud security product can integrate with and provide security for.

91%
(Based on 13 reviews)

Cloud Gap Analytics

Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols.

79%
(Based on 10 reviews)

Network Management

Activity Monitoring

Documents the actions from endpoints within a network. Alerts users of incidents and abnormal activities and documents the access point.

89%
(Based on 42 reviews)

Asset Management

Keeps records of each network asset and its activity. Discovers new assets accessing the network.

78%
(Based on 38 reviews)

Log Management

Provides security information and stores the data in a secure repository for reference.

89%
(Based on 42 reviews)

Records

Incident Logs

Information on each incident is stored in databases for user reference and analytics.

Not enough data available

Incident Reports

Produces reports detailing trends and vulnerabilities related to their network and infrastructrue.

Not enough data available

Resource Usage

Analyzes recurring incidents and remedies to ensure optimal resource usage.

Not enough data available

Security

Data Security

Manages policies for user data access and data encryption.

94%
(Based on 14 reviews)

Data loss Prevention

Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest.

88%
(Based on 11 reviews)

Security Auditing

Analyzes data associated with security configurations and infrastructure to provide vulnerability insights and best practices.

91%
(Based on 14 reviews)

Incident Management

Event Management

Alerts users of incidents and allows users to intervene manually or triggers an automated response.

89%
(Based on 42 reviews)

Automated Response

Reduces time spent remedying issues manually. Resolves common network security incidents quickly.

79%
(Based on 36 reviews)

Incident Reporting

Documents cases of abnormal activity and compromised systems.

84%
(Based on 38 reviews)

Management

Incident Alerts

Gives alerts when incidents arise. Some responses may be automated, but users will still be informed.

Not enough data available

Database Management

Adminstrators can access and organize data related to incidents to produce reports or make data more navigable.

Not enough data available

Workflow Management

Administrators can organize workflows to guide remedies to specific situations incident types.

Not enough data available

Identity

SSO

Provides a single access point for users to access multiple cloud products without multiple logins.

81%
(Based on 7 reviews)

Governance

Allows users to create, edit, and relinquish user access privileges.

85%
(Based on 6 reviews)

User Analytics

Allows for reporting and documentation of individual user behavior and privileges.

88%
(Based on 10 reviews)

Security Intelligence

Threat Intelligence

Stores information related to common threats and how to resolve them once incidents occur.

91%
(Based on 43 reviews)

Vulnerability Assessment

Analyzes your existing network and IT infrastructure to outline access points that can be easily compromised.

85%
(Based on 41 reviews)

Advanced Analytics

Allows users to customize analytics with granulized metrics that are pertinent to your specific resources.

89%
(Based on 11 reviews)

Data Examination

Allows users to search databases and incident logs to gain insights on vulnerabilities and incidents.

84%
(Based on 35 reviews)