Skip to main content
TrustRadius
AlienVault USM

AlienVault USM

Overview

What is AlienVault USM?

AlienVault® Unified Security Management® (USM) delivers threat detection, incident response, and compliance management in one unified platform. It is designed to combine all the essential security capabilities needed for effective security monitoring across cloud and on-premises environments, including SIEM, intrusion detection, vulnerability management, as…

Read more
Recent Reviews

TrustRadius Insights

Users have found AlienVault USM to be a valuable SIEM solution for centralizing and searching log data from a large number of network …
Continue reading

MSSP Review

8 out of 10
October 04, 2021
AlienVault offers a different experience as opposed to other SIEM tools where it can be set up and configured properly in a shorter amount …
Continue reading
Read all reviews

Awards

Products that are considered exceptional by their customers based on a variety of criteria win TrustRadius awards. Learn more about the types of TrustRadius awards to make the best purchase decision. More about TrustRadius Awards

Popular Features

View all 7 features
  • Centralized event and log data collection (8)
    8.5
    85%
  • Correlation (8)
    8.5
    85%
  • Event and log normalization/management (8)
    8.0
    80%
  • Custom dashboards and workspaces (8)
    7.0
    70%

Reviewer Pros & Cons

View all pros & cons
Return to navigation

Pricing

View all pricing

Essentials

$1,075

Cloud
per month

Standard

$1,695

Cloud
per month

Premium

$2,595

Cloud
per month

Entry-level set up fee?

  • Setup fee optional
For the latest information on pricing, visithttps://www.alienvault.com/products/pri…

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services
Return to navigation

Features

Security Information and Event Management (SIEM)

Security Information and Event Management is a category of security software that allows security analysts to look at a more comprehensive view of security logs and events than would be possible by looking at the log files of individual, point security tools

8
Avg 7.8
Return to navigation

Product Details

What is AlienVault USM?

AlienVault® Unified Security Management® (USM) delivers threat detection, incident response, and compliance management in one unified platform. It is designed to combine all the essential security capabilities needed for effective security monitoring across cloud and on-premises environments, including SIEM, intrusion detection, vulnerability management, as well as continuous threat intelligence updates. The vendor states that even for resource-limited IT security teams, AlienVault USM can be affordable, fast to deploy, and easy to use. It eliminates the need to deploy, integrate, and maintain multiple point solutions in the data center.

Smart, automated data collection & analysis: USM Anywhere automatically collects and analyzes data across the attack surface, helping to quickly gain centralized security visibility without the complexity of multiple disparate security technologies.

Automated threat detection powered by AT&T Alien Labs: With threat intelligence provided by AT&T Alien Labs, USM Anywhere is updated automatically to stay on top of evolving and emerging threats, so the security team can focus on responding to alerts.

Incident response orchestration with AlienApps: USM Anywhere supports a growing ecosystem of AlienApps, enabling the user to orchestrate and automate actions towards other security technologies, able to respond to incidents quickly and easily.

AlienVault USM Features

Security Information and Event Management (SIEM) Features

  • Supported: Centralized event and log data collection
  • Supported: Correlation
  • Supported: Event and log normalization/management
  • Supported: Deployment flexibility
  • Supported: Integration with Identity and Access Management Tools
  • Supported: Custom dashboards and workspaces
  • Supported: Host and network-based intrusion detection

Additional Features

  • Supported: AlienVault Open Threat Exchange

AlienVault USM Screenshots

Screenshot of USM Anywhere NIDS Dashboard

AlienVault USM Videos

AlienVault USM Competitors

AlienVault USM Technical Details

Deployment TypesSoftware as a Service (SaaS), Cloud, or Web-Based
Operating SystemsUnspecified
Mobile ApplicationNo
Supported CountriesGlobal

Frequently Asked Questions

Splunk Cloud and Fortinet on IBM Cloud are common alternatives for AlienVault USM.

Reviewers rate Deployment flexibility highest, with a score of 8.6.

The most common users of AlienVault USM are from Mid-sized Companies (51-1,000 employees).
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(735)

Community Insights

TrustRadius Insights are summaries of user sentiment data from TrustRadius reviews and, when necessary, 3rd-party data sources. Have feedback on this content? Let us know!

Users have found AlienVault USM to be a valuable SIEM solution for centralizing and searching log data from a large number of network attached devices. This platform is being used for various use cases such as vulnerability management, scanning, malware detection, and monitoring malicious network traffic. It is considered a good SIEM solution for organizations new to security operational logging or those with a smaller staff and budget. The product has been praised for its integrated feature sets, including HIDS, NIDS, FIM, and security alerting capabilities. The inclusion of features like vulnerability scanning and file integrity monitoring has extended its value for organizations in the early stages of cybersecurity program development. Many users have experienced real-time alerts, enabling them to respond to security incidents and compromised passwords more quickly. Furthermore, AlienVault is used for a range of functions such as SIEM, vulnerability scanning, asset discovery, and investigations. It provides organizations with a centralized log collection site, allowing them to monitor and address new problems more effectively. The platform has been effective in helping organizations meet regulatory compliance requirements and improve SOC operations. Additionally, AlienVault is used to analyze network traffic, Windows Event Logs, and other security events, helping organizations improve network security and protect their customers. It solves security challenges related to device and software visibility, monitoring for anomalous events, and ensuring patch management. Users appreciate the simplicity of deployment and the robustness of the interface. The support team is highly responsive and knowledgeable.

AlienVault USM Anywhere is used by organizations to easily identify security incidents happening across their infrastructure and comply with PCI-DSS compliance requirements. MSSPs utilize AlienVault USM Anywhere to provide their customers with best-in-class threat monitoring and response services. It is also used to monitor cloud environments, scanning and alerting for any known vulnerabilities or activity on servers. AlienVault helps organizations with auditing purposes by monitoring cloud permissions and changes to security. Additionally, it is deployed to customers for monitoring and is used by NSOCs to monitor their networks. AlienVault has been implemented across organizations, covering server assets and providing granular logging on systems and networks. It helps in raising alarms/alerts and mitigating network-related activities. AlienVault collects and alerts on network and system activity across the entire organization, making it easy to filter for important data. The product centralizes log data and helps perform vulnerability analysis and threat detection. It assists in security patching and monitoring within AWS environments. Users appreciate the ease of use and configuration of the cloud-based panel. AlienVault is implemented and managed for clients as a recommended SIEM solution, collecting and normalizing logs from various data sources. It is used throughout organizations to gain insight into network and server events, manage and correlate logs, and recognize anomalous activity. Users have been able to set up alerts for specific events and policies, effectively managing systems and alerts in place, monitoring multiple client environments, and identifying issues that clients may have missed.

AlienVault USM Anywhere is praised for its cost-effectiveness compared to other SIEM solutions on the market. Users appreciate its threat intelligence capabilities, ease of use, user-friendly interface, and simplicity of deployment. The built-in correlation rules require minimal setup and provide high-quality results. Asset management and scanning features help users stay on top of monitoring assets, including dynamic and static asset lists. The integration of OTX into USM Anywhere allows for up-to-date threat intelligence and pulse subscriptions.

The software plays a crucial role in monitoring and alerting when anomalies occur, aiding in threat detection, compliance management, log collection, and vulnerability scanning. It helps organizations stay up to speed on new vulnerabilities and supports agile business initiatives by aiding analysts in identifying cyber threats and providing access to threat cross-referencing data. AlienVault USM Anywhere is deployed to monitor AWS cloud environments, attain compliance, identify threats, and facilitate auditing of non-emergency configuration changes and vulnerability monitoring.

Overall, AlienVault USM Anywhere provides centralized security monitoring, incident response capabilities, compliance reporting features, vulnerability assessment tools, real-time SIEM functionality, as well as asset discovery and user activity monitoring capabilities. It has been widely adopted across various industries for enhancing security posture and gaining comprehensive visibility into network activities.

Based on user recommendations, AlienVault USM receives the following common recommendations:

  1. AlienVault USM is recommended for cost-conscious companies and small to medium businesses due to its affordability and effectiveness. Users find it to be a great tool for analyzing and reacting to threats, offering excellent value for the price.

  2. Users suggest exploring alternative SIEM choices and discussing functionality and configuration requirements. Logrhythm is mentioned as a possible alternate SIEM choice, especially for high-end functionality needs. It is advised to compare features and select the SIEM system that offers the best cost for desired features.

  3. To maximize the experience with AlienVault USM, users recommend taking advantage of training opportunities provided by AlienVault. Joining official training sessions allows users to learn best practices from other users and gain comprehensive knowledge of the product. Users also recommend utilizing forums, support, webinars, and videos offered by AlienVault to enhance understanding and achieve optimal results.

Overall, AlienVault USM is regarded as a cost-effective solution suitable for organizations with data privacy and security priorities. The product's flexibility, community-created intelligence, and continual improvement are also highlighted by users. While some mention areas for improvement, such as support stability and module quality, the general consensus is that AlienVault USM delivers reliable security enhancements and cost savings.

Attribute Ratings

Reviews

(351-375 of 390)
Companies can't remove reviews or game the system. Here's why
December 04, 2015

AlienVault's no Alien

Score 9 out of 10
Vetted Review
Verified User
Incentivized
The primary reason our organization purchased AlienVault was the pricing point. It is significantly cheaper that many of its competitors but doesn't skimp on any of the features. Clearly, lots of time and effort is put into the product. There are even recompiled Windows agents for the HIDS modules.
December 01, 2015

Best bang for your buck

Score 8 out of 10
Vetted Review
Verified User
Incentivized
AlienVault Unified Security Management is well suited for scenarios where an SIEM device is needed. For companies just looking to get their feet wet in vulnerability assessments, AlienVault should be at the top of their list because of the added benefits they bring. Instead of using multiple products, AlienVault is able to converge all the technologies under a single pane of glass.
Alissa Knight | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
ResellerIncentivized
Well suited for organizations that have the necessary internal resources to monitor/manage an enterprise SIEM deployment, monitor and respond to security events, and triage events filtering out false positives
Sk Jaki | TrustRadius Reviewer
Score 7 out of 10
Vetted Review
Verified User
Incentivized
AlienVault Unified Security Management is well suited for any private network to keep eyes on all data packets. It is also well suited for when you need to check the network infrastructure and where you need to put it and to see what things need to be monitored based on what you want analyze in the packets.
November 23, 2015

AV Trust Radius Review

Score 7 out of 10
Vetted Review
Verified User
Incentivized
Do your administrators have any familiarity with Linux? If not, you may want to consider a Windows based platform. You will need to move to the dark side (CLI) for some work within this tool.
Валерий Ткаченко | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
Incentivized
We consider that scenario depends on the existing network environment. In an environment of modern equipment, Cisco or CheckPoint is much better to use. For multi-brand equipment AlienVault Unified Security Management would be the best choice, especially for efficiency and economy.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Due to budget cuts our organization was able to put in place a solid network security management solution at a price that we could afford. Going through the steps to set up the product forced us to address security gaps we didn't realize we had. We feel we have a stronger solution in place with AlienVault Unified Security Management than when we were able to allocate much more funds to similar solutions in the past.
Aaron Rothstein | TrustRadius Reviewer
Score 5 out of 10
Vetted Review
Verified User
Incentivized
I wouldn't recommend it for anyone that isn't comfortable messing around at the Linux command line. Basic out of the box monitoring is OK, but if you have any specialized requirements, be prepared to put in a lot of time and testing. For vulnerability scanning, if you have a lot of remote locations and can't put a sensor in each one (like a small quick-serve restaurant), don't plan on using that feature. The vulnerability reporting views are sorely lacking as well. It doesn't allow you to easily pivot and collapse views based on a node or a vulnerability.
Chris Dale | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
Incentivized
AlienVault Unified Security Management is well suited for organisations that need to get started. It won't replace Splunk if you are using Splunk for debugging, but still, you have log handling.
Score 8 out of 10
Vetted Review
Verified User
Incentivized
Cost and complexity are always concerns, but If you buy the right package and deploy it correctly it can cover any environment. There are simple deployments, complex deployments, and even manged deployments. It can cover your needs if set up correctly.

I would like to see automated responses, other than alerts. I believe they may be working on this, so that it can actually take action not just warn you of the incident.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
What can it do for me? Every company is different and they will always have different needs, specifically for us was the need for centralized logging and a simple but amazing vulnerability scanning. Everything else in the system was just an added bonus and not to mention the sales team working a lot with me on pricing and additional components.
Jay Dibble | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
Incentivized
For the implementation, the sizing really needs to be looked at carefully. For example, the USM All-In-One virtual appliance is limited on space and scaling versus the standard and enterprise versions (as well as hardware versus virtual appliances).
Vishal Jadhav | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
Incentivized
I think it is very suited as a SIEM tool. In scenarios where network monitoring using both log collection as well as the Network Intrusion Detection System is required and correlation of events is required, AlienVault Unified Security Management is an excellent fit. It addresses the security, audit and compliance monitoring of the networks very effectively. Of course, tuning is the most important part in the case of any SIEM, so it iss true with AlienVault Unified Security as well, but it allows options to filter events at the source or at processing stages and also to redirect or drop or directly store events as per the organization's information security policies. The security analysis process is very well defined. Of course, every analyst will have his own style of investigations, but AlienVault Unified Security Management is definitely a value addition.
November 18, 2015

To the moon and Back

Barry Stephenson | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized

What documentation do you have available to help with the likes of setting up OCS, WIDS?

What assistance can be provided to assist with the set up of the Vulnerability Scanner? Both for internal hardware, web applications and external hardware hosting our data.

November 18, 2015

Alien Vault - USM

Score 9 out of 10
Vetted Review
Verified User
Incentivized
Yes, the specific scenario here was to achieve PCI DSS level 1 compliance and AlienVault Unified Security Management covered our SIEM requirements. Another major reason for selecting AlienVault is the ease of implementation.
November 17, 2015

Champ for SMBs

Score 8 out of 10
Vetted Review
ResellerIncentivized
It's well suited for companies where they have one or few security analysts. Even if they don't have any, the IT guy can easily learn the operations in less time and make use of it. It doesn't compete well with other SIEM solutions in the market like HP ArcSight as they have more integrations with other products like antiviruses and firewalls and have official plugins to fetch data from them.
Return to navigation