AlienVault USM

AlienVault USM

4.4 out of 5 stars

AlienVault Unified Security Management (USM) is a platform that provides five essential security capabilities in a single console to manage both compliance and threats, understanding the sensitive nature of IT environments, include active, passive and host-based technologies to match the requirements of each particular environment.

Work for AlienVault USM?

Learning about AlienVault USM?

We can help you find the solution that fits you best.

Find the Right Product

AlienVault USM Features

Cloud Visibility
Data Discovery

Unveils applications in use and trends associated with traffic, access, and usage.

(Based on 7 reviews)
Cloud Registry

Details SaaS products the cloud security product can integrate with and provide security for.

(Based on 7 reviews)
Cloud Gap Analytics

Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols.

(Based on 6 reviews)
Network Management
Activity Monitoring

Documents the actions from endpoints within a network. Alerts users of incidents and abnormal activities and documents the access point.

(Based on 38 reviews)
Asset Management

Keeps records of each network asset and its activity. Discovers new assets accessing the network.

(Based on 34 reviews)
Log Management

Provides security information and stores the data in a secure repository for reference.

(Based on 38 reviews)
Data Security

Manages policies for user data access and data encryption.

(Based on 8 reviews)
Data loss Prevention

Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest.

(Based on 7 reviews)
Security Auditing

Analyzes data associated with security configurations and infrastructure to provide vulnerability insights and best practices.

(Based on 8 reviews)
Incident Management
Event Management

Alerts users of incidents and allows users to intervene manually or triggers an automated response.

(Based on 38 reviews)
Automated Response

Reduces time spent remedying issues manually. Resolves common network security incidents quickly.

(Based on 32 reviews)
Incident Reporting

Documents cases of abnormal activity and compromised systems.

(Based on 35 reviews)

Provides a single access point for users to access multiple cloud products without multiple logins.

Not enough data available


Allows users to create, edit, and relinquish user access privileges.

Not enough data available

User Analytics

Allows for reporting and documentation of individual user behavior and privileges.

(Based on 5 reviews)
Security Intelligence
Threat Intelligence

Stores information related to common threats and how to resolve them once incidents occur.

(Based on 39 reviews)
Vulnerability Assessment

Analyzes your existing network and IT infrastructure to outline access points that can be easily compromised.

(Based on 37 reviews)
Advanced Analytics

Allows users to customize analytics with granulized metrics that are pertinent to your specific resources.

Data Examination

Allows users to search databases and incident logs to gain insights on vulnerabilities and incidents.

(Based on 33 reviews)