Better Threat Detection for Effective Response
AlienVault Unified Security Management™ (USM) is an all-in-one platform designed and priced to ensure that mid-market organizations can effectively defend themselves against today’s advanced threats.
Unlike traditional SIEM or security point products, AlienVault USM provides:
• Unified, Coordinated Security Monitoring
• Simple Security Event Management and Reporting
• Continuous Threat Intelligence
• Fast Deployment
• Multiple Security Functions Without Multiple Consoles
AlienVault Unified Security Management for Amazon Web ServicesWith the USM for AWS platform, you have complete security awareness and threat intelligence so that you can detect and respond to threats in real time and ensure compliance in your AWS environments.
USM for AWS is a completely AWS-contained security solution. We designed USM for AWS to allow you to manage it yourself and have complete control of your data. Unlike hosted security services, it runs completely in your AWS environment and your data is never out of your control.
USM for AWS gives you visibility into:
• The state of your AWS infrastructure
• Assets in your environment
• Assets that are misconfigured or vulnerable to exploits
• Who is using your resources and how they are using them
• Malicious activity targeting your environment
AlienVault OSSIMThe World’s Most Widely Used Open Source SIEM
OSSIM, AlienVault’s Open Source Security Information and Event Management (SIEM) product, provides you with a feature-rich open source SIEM complete with event collection, normalization and correlation. Launched by security engineers because of the lack of available open source products, OSSIM was created specifically to address the reality many security professionals face: A SIEM, whether it is open source or commercial, is virtually useless without the basic security controls necessary for security visibility.
Our Open Source SIEM (OSSIM) addresses this reality by providing one unified platform with many of the essential security capabilities you need like:
• Asset discovery
• Vulnerability assessment
• Intrusion detection
• Behavioral monitoring