AlienVault USM

AlienVault USM

4.5 out of 5 stars

AlienVault Unified Security Management (USM) is a platform that provides five essential security capabilities in a single console to manage both compliance and threats, understanding the sensitive nature of IT environments, include active, passive and host-based technologies to match the requirements of each particular environment.

Work for AlienVault USM?

Learning about AlienVault USM?

We can help you find the solution that fits you best.

AlienVault USM Features

Cloud Visibility
Data Discovery

Unveils applications in use and trends associated with traffic, access, and usage.

(Based on 5 reviews)
Cloud Registry

Details SaaS products the cloud security product can integrate with and provide security for.

(Based on 5 reviews)
Cloud Gap Analytics

Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols.

Not enough data available

Network Management
Activity Monitoring

Documents the actions from endpoints within a network. Alerts users of incidents and abnormal activities and documents the access point.

(Based on 30 reviews)
Asset Management

Keeps records of each network asset and its activity. Discovers new assets accessing the network.

(Based on 26 reviews)
Log Management

Provides security information and stores the data in a secure repository for reference.

(Based on 30 reviews)
Data Security

Manages policies for user data access and data encryption.

(Based on 6 reviews)
Data loss Prevention

Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest.

(Based on 5 reviews)
Security Auditing

Analyzes data associated with security configurations and infrastructure to provide vulnerability insights and best practices.

(Based on 6 reviews)
Incident Management
Event Management

Alerts users of incidents and allows users to intervene manually or triggers an automated response.

(Based on 30 reviews)
Automated Response

Reduces time spent remedying issues manually. Resolves common network security incidents quickly.

(Based on 25 reviews)
Incident Reporting

Documents cases of abnormal activity and compromised systems.

(Based on 28 reviews)

Provides a single access point for users to access multiple cloud products without multiple logins.

Not enough data available


Allows users to create, edit, and relinquish user access privileges.

Not enough data available

User Analytics

Allows for reporting and documentation of individual user behavior and privileges.

Not enough data available

Security Intelligence
Threat Intelligence

Stores information related to common threats and how to resolve them once incidents occur.

(Based on 31 reviews)
Vulnerability Assessment

Analyzes your existing network and IT infrastructure to outline access points that can be easily compromised.

(Based on 29 reviews)
Advanced Analytics

Allows users to customize analytics with granulized metrics that are pertinent to your specific resources.

Data Examination

Allows users to search databases and incident logs to gain insights on vulnerabilities and incidents.

(Based on 26 reviews)