AlienVault USM

AlienVault USM

4.4 out of 5 stars

AlienVault Unified Security Management (USM) is a platform that provides five essential security capabilities in a single console to manage both compliance and threats, understanding the sensitive nature of IT environments, include active, passive and host-based technologies to match the requirements of each particular environment.

Work for AlienVault USM?

Learning about AlienVault USM?

We can help you find the solution that fits you best.

AlienVault USM Features

Cloud Visibility
Data Discovery

Unveils applications in use and trends associated with traffic, access, and usage.

(Based on 11 reviews)
Cloud Registry

Details SaaS products the cloud security product can integrate with and provide security for.

(Based on 11 reviews)
Cloud Gap Analytics

Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols.

(Based on 9 reviews)
Network Management
Activity Monitoring

Documents the actions from endpoints within a network. Alerts users of incidents and abnormal activities and documents the access point.

(Based on 39 reviews)
Asset Management

Keeps records of each network asset and its activity. Discovers new assets accessing the network.

(Based on 35 reviews)
Log Management

Provides security information and stores the data in a secure repository for reference.

(Based on 39 reviews)
Data Security

Manages policies for user data access and data encryption.

(Based on 12 reviews)
Data loss Prevention

Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest.

(Based on 10 reviews)
Security Auditing

Analyzes data associated with security configurations and infrastructure to provide vulnerability insights and best practices.

(Based on 12 reviews)
Incident Management
Event Management

Alerts users of incidents and allows users to intervene manually or triggers an automated response.

(Based on 39 reviews)
Automated Response

Reduces time spent remedying issues manually. Resolves common network security incidents quickly.

(Based on 33 reviews)
Incident Reporting

Documents cases of abnormal activity and compromised systems.

(Based on 36 reviews)

Provides a single access point for users to access multiple cloud products without multiple logins.

(Based on 5 reviews)

Allows users to create, edit, and relinquish user access privileges.

(Based on 5 reviews)
User Analytics

Allows for reporting and documentation of individual user behavior and privileges.

(Based on 8 reviews)
Security Intelligence
Threat Intelligence

Stores information related to common threats and how to resolve them once incidents occur.

(Based on 40 reviews)
Vulnerability Assessment

Analyzes your existing network and IT infrastructure to outline access points that can be easily compromised.

(Based on 38 reviews)
Advanced Analytics

Allows users to customize analytics with granulized metrics that are pertinent to your specific resources.

Data Examination

Allows users to search databases and incident logs to gain insights on vulnerabilities and incidents.

(Based on 34 reviews)