Cloud Security Software - Reviews

Show Filters 
Hide Filters 
Filter 1124 vetted Cloud Security reviews and ratings
Clear all filters
Overall Rating
Reviewer's Company Size
Vendor
Product
Last Updated
Industry
Department
Experience
Job Type
Role

Reviews (1-25 of 356)

Matthew White profile photo
July 16, 2019

AlienVault USM Anywhere - Cost effective SIEM-as-a-service

Score 10 out of 10
Vetted Review
Verified User
Review Source

AlienVault USM Anywhere provides us with SIEM, at a low price point and with a great array of functionality. SIEM is critical to our security operations and feeds incident response efforts. We use it to monitor logs and events from our applications and server platforms, integrating many of our ot...

    Alex Kranz profile photo
    April 04, 2019

    AlienVault USM: better than expected and a convenient way to maintain security compliance

    Score 7 out of 10
    Vetted Review
    Verified User
    Review Source

    AlienVault is well suited for monitoring environments especially standard Linux environments and is great at generating non-technical reports. The standard user interface allows non-technical individuals to navigate the system and generates clean looking easy to understand reports. The system is ...

      Ryan Collins profile photo
      May 27, 2019

      Alienvault gives you eyes without the extra bodies :)

      Score 8 out of 10
      Vetted Review
      Verified User
      Review Source

      If you have a new, small company that needs effective monitoring and alerting right out of the box, I would say that AV has a lot less deployment and overhead than many SIEM solutions. That said, it can scale quite well and is particularly nice to deal with when dealing with cloud infrastructure.

        Francis Aghedo profile photo
        May 17, 2019

        AlienVault USM..making sense

        Score 8 out of 10
        Vetted Review
        Verified User
        Review Source

        Threat detection both on-premise and external, especially the feature of having the OTX, which comes in handy in giving more insight as to the threat being faced. The OSSIM feature is also a big plus where HIDS for windows and Linux based workstation and servers can be monitored. The correlation ...

          Corey Foster profile photo
          May 08, 2019

          Alienvault is wonderful

          Score 10 out of 10
          Vetted Review
          Verified User
          Review Source

          AlienVault USM is well suited in the log normalization, log retrievals, It helps in reviewing logs in one location. So you are not bouncing from one server or equipment to the next to view logs and network traffic. It helps to make the job a little bit easier to perform.

            XianJiang Cai profile photo
            April 29, 2019

            Accurate, easy to setup, no maintenance required, but UI needs to improve.

            Score 8 out of 10
            Vetted Review
            Verified User
            Review Source

            USM being used for our whole organization. It is deployed via sensor on various regions to capture in/out data for monitoring potential risk. We use USM as a centered logger and analysis system also collecting data from firewall/VPN, Office365, Crowstrike and others. It's convenient to integrate ...

              Elliott Yau profile photo
              April 25, 2019

              Pretty good at what it does, but could be improved.

              Score 8 out of 10
              Vetted Review
              Verified User
              Review Source

              AlienVault USM is good for meeting PCI DSS requirements but is not very appropriate if you need only bits and pieces from the application. It's good for bigger companies, although the cost may scare off smaller businesses.

                Clint Siebert profile photo
                April 19, 2019

                AlienVault proved itself after one day.

                Score 7 out of 10
                Vetted Review
                Verified User
                Review Source

                Currently it's only being used by the IT department to identify suspicious network activity, which we did not monitor prior to implementing AlienVault. One day after implementing AlienVault, we were notified of a bitcoin miner on our FTP site. Sure enough, when I logged into that machine and ran ...