TrustRadius
https://media.trustradius.com/product-logos/LF/Ap/TPOL9A2198T5.JPEGAlienVault USM Anywhere - A One-Man-SOCAlienVault is used by the cybersecurity unit of the organization to monitor and correlate security logs from other systems within the organization. Also, AlienVault acts as a log management system or repository of logs for the organization. We chose AlienVault as it is one of the few SaaS-based SIEM in the market and it was in line with our organization’s direction of going with a cloud-based solution.,Cloud based solution which minimises the need to maintain additional on premise servers. Among the cheapest SIEM solution on the market with features comparable to the other bigger players. Great dashboard and UI which makes it super easy to use. Packed with many features and integrates with many major off the shelf brands.,The SaaS based model makes the pricing very dependent on the storage capacity subscribed to. Compared to other on premise solutions, it can be really hard to deal with once the log storage has reached or maxed out the monthly storage capacity. After AT&T took over Alienvault, their customer service has deteriorated and they don’t give as much care as they did earlier with their customers. After AT&T took over, the product pricing has been increasing steadily and soon this solution may not be as affordable as it used to be.,7,Splunk Cloud, LogRhythm NextGen SIEM Platform and IBM QRadar,AlienVault managed to correlate and analyze the logs within our environment very well. Bundled together with its OTX threat intelligence engine, it managed to find threats that had been missed by our other security systems. The SaaS subscription also came bundled with a subscription to SpyCloud, a dark web account exposure monitoring service, which really added extra value to the whole solution.,AlienVault USM (SaaS) has lived up to its promise of being easy to use and boasts a very user-friendly UI. It also does not require coding or advance scripting knowledge to create filters and rules. Furthermore, it was designed with simplicity in mind which enabled us to operate it in a one-man-SOC fashion with minimal resources.,Adding assets into the system Creating rules and filters Easily integrates with a number of other well known vendors,9When the door closes what window will they try to use?Our Alienvault USM is deployed at the organizational level. It monitors and reports any attempt to breach in place security or attempts to find vulnerabilities within said security scheme. Ease of use and limited number of false positives provides peace of mind.,Quickly reports unauthorized access attempts of our network. Provides insight to the possible internal breaches sending data out of our network. provides strong reporting on network resources.,I would like to see an interface that is more menu driven. For example a method that allows me to drag and drop the items I would like in an adhoc report based on local machines that are attempting to connect to sites beyond our network that are blocked by our firewall. I would like to see a more robust connection to our SonicWall, having two devices in the same rack that must be configured independently is some times a pain to fine tune. I would like to see additional help files built that allow users to work with the Alienvault without attending formal training.,10,Very effective, as I mentioned previously, we were able to identify a true threat to our environment due that intelligence gathering nature of the AlienVault USM and its clean reporting.,AlienVault USM once configured has allowed us to move away from manual port monitoring and have an automated real-time monitor in place. Reports/texts and emails are sent within a reasonable time of an event occurring, to multiple staff members who can take immediate remedial action.,No,10,No,Every time we call (which isn't often) I would rate the service as exceptional. I have had no complaints with support at all and that alone says a lot, as I demand as much from vendors as I do from internal work force.,10Aliens to the rescue!We are primarily using the product as our SIEM system to correlate logs across our infrastructure and provide useful analysis on potential threats and anomalies. We also use the built in vulnerability scanning, IDS and asset management functions as a complement to our existing vulnerability/IDS/asset management systems. With this level of intelligence, it helps us determine what course of action to take to an incident and assists us in prioritization.,Log correlation is excellent and on par with other more expensive solutions. Ease of use is a big plus. Initial setup was simple and quick. The OTX threat intelligence is a great complement to our other threat intelligence feeds to ensure we have as many 'eyes' out there informing us of all the potentially malicious threat actors out there.,There are a couple of things that can only be done through the CLI and unless you're familiar with the CLI, there may be a large learning curve for some. The vulnerability scanner lacks a number of advanced features that other solutions have which make it simpler and more efficient to manage. Plugins are limited (although they are adding more as time goes on). If you need a plugin that is not available you will need to create one on your own which requires modification of a number of files and can be daunting for someone new to the platform.,9,,The AlienVault USM is reasonable at detecting actual security threats. There is an initial period where you may receive a large amount of false positives or false negatives however with some tweaking these disappear.,With limited budgets and resources, the AlienVault USM has definitely assisted us in reducing the amount of time we need to spend in detecting and reacting to security threats.,4,3,8,Yes,7,Yes,There have been a few times recently when AlienVault support did go out of their way to provide exceptional support. If they keep this up their customer satisfaction rates will no doubt go higher in the future.,8AlienVault is no Alien when it comes to SecurityAlienVault Unified Security Management is being used across the whole organisation for event logging and monitoring, threat/vulnerability management and IDS.,Alerting on correlated events - this has allowed us to capture malware ahead of time. Ease of device logging - once the logs are sent through, the data is available instantly. Actively reviewing and responding to vulnerabilities through an easy to use interface and schedule task format.,More functionality pushed through the web interface would be useful. Asset management can be a little restricted when applying changes across a rule set.,10,LogRythm, Alert Logic and QRadar,Threat management is an excellent feature and allows us an all round vision of our landscape.,With a reduced security team Alienvault's USM allows us to have full SOC capabilities a cost saving to the organisation.,5,2,Determining malware has entered the organisation Communication failures between servers/services Activity on firewalls Changes on AD without the necessary approval authorities in place,Triggering events in other monitoring systems Integrating with other monitoring products to give a more rounded view Utilising into quarter end reporting for excom updates,Allow dashboard use throughout the business support units Centralised view for The SOC Interfacing into other products that fall outside of traditional security products,10,Yes,Price Product Features Product Usability Analyst Reports,Our evaluation process is part of our policy governance therefore the actual process of vendor selection would not change.,8,8,Dashboards Correlation Rule Set up Log Collection Asset Adding Vulnerability Scanning,Creating parsers can be difficult unless regex is understood.,10AlienVault is the best SIEM out there - hands down!I implemented first OSSIM, the community version, to see what type of intelligence it could give me. Before long I was feeding it information from my firewall and network devices. When people talk about a "single pane of glass", this must be the product they are referring too. I purchased the product and have it deployed across the enterprise now. I'm using it for two purposes really - to see what isn't normal - i.e. warn me about potential issues, and I'm using it to see what has happened (historical). The interface really allows you to see what's hot - if a metric, when it changes, doesn't prompt you to get out of your chair and do something, it's a wasted metric. With AlienVault, all I see are metrics that make me do things when they aren't where they are supposed to be. In my environment, I have 18 buildings spread across 72 square miles. We support 13,000 users on a daily basis, with 6,000 owned devices, and a ton of BYOD devices. With only 10 people in the department (including myself and my secretary), I couldn't imagine staying on top of this without AlienVault.,Reporting, reporting, reporting. Setting it up so I get emailed reports has allowed me to know, even when I am not in the office, how my day is going to go. The breadth and depth of the reports, and the ability to customize so you get what you want is awesome. Dashboard. The visual dashboard with the circles (areas of concentration based on number of incidents) is brilliant. All I have to do is show that to people, and they want to install it. Ease of implementation. Turn it on, answer a few questions, point stuff at it, and you're done. Ok, there is a lot more - I mean a lot more - you can do to customize it, but if you're looking to quickly establish a baseline, that's all you need to do. Who else has a fully functional product (OSSIM) you can download and install for FREE to see how it will work in your environment?,If it did a little more with IPFIX data (think NTOP). Otherwise, it's perfect.,10,,So, my environment (a K12 Public School District with 11,000 students) faces two threats. External, and internal (come on, where else are the kids going to try to break things?). AlienVault was a perfect fit because it really allows me to see EVERYTHING. I've used it to stop kids from doing network scans; trying to load bots; everything script kiddies do. I've also used it to detect and shut down traffic from external threat vectors based on attepts to scan and penetrate the network.,Um, hell yes. I have 10 people - no one full-time on security. Without AlienVault I'd feel like we were naked. It allows me to achieve a high-level of visibility without the need to increase staff. It was, and continues to be, a win for the tax payers; the staff; and me.,Yes,I spent several months using OSSIM in a production environment. While the product performed rock solid, it didn't afford me some of the reporting that I needed. I made the decision to upgrade to AlienVault and it has worked out well. The depth of reporting is so much more extensive in AlienVault. The critical aspects of a SIEM are ther in OSSIM, and I'm not saying reporting is the only reason I upgraded, but it was a major factor. I work in an environment where I have a very small staff, so support for the product was also a factor. The documentation, if you print it out, can be a bit overwhelming - it's very, very thorough. The best way to tackle it is to ask a question, then hit the documents to find the specific answer. I'm very, very happy I made the upgrade and if you're using OSSIM in a production environment, you should seriously consider making the switch.,Price Product Features Product Usability Analyst Reports Third-party Reviews,I would not change the evaluation process. Awesome that I can use an OSSIM for as long as I need to, to make sure it works, before purchase.,10,10Great system to meet FINRA's Cyber Security RequirementsWe use AlienVault to be in compliance with FINRA's cyber security regulations. We monitor our traffic, our users logins, and systems to make sure we don't have any unauthorized entries. It is used by our IT Dept primarily, periodically compliance logs in as well. It is a great system and I am happy we went with AlienVault for our cyber security needs.,It has great reports that are able to be generated A lot of functionality The intrusion and detection system is particularly useful for us,It is not easy to use for non IT professionals The set up process is very tedious and difficult,9,,I have not compared this to other software.,We have achieved this benefit but the only issue is unless you are very IT or tech savvy and understand networking professionally, it is very difficult to be able to understand what anything means. For example I took the launch pad training course, I have a legal background not a IT background because of that reason the course was not very helpful for me.,2,2,Meet FINRA Cybersecurity Regulations Network activity monitoring Intrusion detection,We use alienvault as we were trained by the alienvault team,Alienvault is particularly useful when we need to monitor user access and break in attempts.,10,No,We did not use a solution like alienvault before. We went with alienvault because of the capability the software had.,Price Product Features Product Usability Product Reputation Third-party Reviews,There is nothing I would change with our selection process as we are fully satisfied with the decision we made. We did a demo of the software which I believe is the single most important thing that must be done when selecting any kind of provider.,Implemented in-house,Change management was minimal,It had a lot of steps involved that had to do with dealing with our server and data providers Involved a lot of man power to get it fully functional.,7,No,10,No,We had an issue with our intrusion detection system and the support staff identified the issue and suggested a solution on how to resolve it. He even went above and beyond and offered to do a screen share to guide us through what to do on our alienvault platform.,The compliance reports are easy to use. The threat detection system results is easy to understand.,The setup process was difficult When a vulnerability is found, it is difficult to understand what it is.,No,7Big Bang for your BuckETCC uses AlienVault USM as the core of our managed security services practice. AlienVault USM is used together with other RMM tools from SolarWinds (N-Able). We tie AlienVault's ticket system in with AutoTask, our PSA of choice. Our target customers specific to AlienVault include the financial and healthcare sectors. One of the reasons for selecting AlienVault was its position in the Gartner magic quadrant, specific to SIEM.,Log aggregation Single pane of glass via Federation server Event Correlation,Deployment could be simplified or "smarter",9,Azure Log Analytics and Splunk,Too soon to tell. We've been using this for only a short while and our experience with other products and solutions is limited.,The jury is still out on this one.,We receive significant support resources by migrating to USM,5,5This is no Area 51, AlienVault exposes the hidden threats!AlienVault USM is use throughout our organization. It was put in place to resolve two issues. One was for vulnerability scans for audit compliance. It was also used for monitoring critical systems in our network. We also use to to parse syslog and other logging. An added bonus was the ability to track AD changes. The vulnerability scans are the best bar none that we tested. The monitoring is great too, however the only thing we found lacking was hard drive monitoring, we had to put another solution in place for that, however that was 6 months ago, so things may have changed.,Vulnerability scanning Up to date security definitions Open Threat Exchange Range or product sizes to fit any size of organization,Hard drive monitoring Slightly higher learning curve,9,LogRhythm, SolarWinds Log & Event Manager and Splunk Enterprise,AlienVault USM is phenomenal at keeping us up to date with the latest threat. The Open Threat Exchange (OTX) has great integration in their product and allows peers to submit transparent samples and definitions of security threats that they have seen. This allows the wider spread of example networks and thus the products is trusted to deliver.,It is just that good. We recently had a perceived security threat from an internal user and used AlienVault to investigate. I was able to pull reports of that user's workstation(s) and could verify that nothing damaging. I was also able to verify with certainty for my management team that we had not been compromised.,8,10,7AlienVault USM Implementation ReviewWe use AlienVault USM to monitor our data center, network traffic, and key workstations. Our goal is to protect the systems from loss of PII, from malware, and from intrusion.,Alerts are emailed to us for many types of configurable concerns. Such as intrusion attempts. Network traffic can be monitored for PII that may be transferred across the network or off-site that is not authorized or that is sent unencrypted properly. Key systems can be monitored for malware, intrusions, and network traffic.,The menu structure could be broken down by categories that make it easier to locate sub-menus.,10,,We feel it is comparable to it as well as to open source solutions, but easier to implement than open source solutions.,We have achieved this benefit. We have used open source solutions. But, to get the same results we had to use multiple solutions. Also, the open source solutions were more difficult to set up and difficult to maintain. And the AlienVault OTX makes us feel better about the product being up to date as well as us being more informed as to current threats to be aware of.,2,2,IDS Malware FERPA Compliance Monitor PII IPS Ransomware,We have been able to use Custom Written plugins to monitor our off-brand switches and routers. Watch for PII being send across the network or off-site in an unencrypted format. Identify scans on the network from on and off-site in order to proactively block them at the firewall's.,Monitor critical systems, servers, an applications up-time.,10,Yes,We like the fact that USM has log management, provides excellent support, and provided us with a easy to deploy VM All-In-One system.,Price Product Features Product Usability Product Reputation Positive Sales Experience with the Vendor,The eval and selection went well and as we had hoped.,Implemented in-house Professional services company,Yes,Change management was minimal,no significant issues were encountered,10,10,No,Follow up is absolutely amazing.,Monitoring of Alarms Looking at the logs of monitored systems. Install and Setup up of Agents on servers.,Plugins are a bit difficult - but just something that needs to be learned. Some directives setup can be a bit difficult to do the first time - But, it just requires a little hands on practice.,No,10AlienVault USM, a perfect ally for MSSPCable and Wireless offers our customers across the Latin America and Caribbean region a Security Monitoring service which is based on AlienVault USM technologies. We deploy sensors and servers on different customer locations and collect the alarms generated by those devices on a centralized AlienVault Federation Server which is continuously monitored from our SOC. The SOC analysts asses all the generated alarms and based on their knowledge and they provide the customer with the necessary visibility and corresponding information in order to know how to respond to a security threat or security incident. We at C&W also use AlienVault USM technologies in order to monitor our network and datacenter infrastructure across the Latin America and Caribbean region. AlienVault technologies has allowed us to offer a managed SIEM service which is affordable and reliable, and can be provisioned in order to fulfill specific needs as all of our customers have different requirements and necessities.,AlienVault USM provides enough flexibility when collecting logs and monitoring systems that are not supported by default. AlienVault USM has five different security monitoring capabilities that are focused on monitoring the health of a network and network systems and are included by default. Other SIEM vendors need to integrate additional products in order to generate the same visibility, which can make a project more complex and more expensive. OTX has improved significantly the visibility of the existing threats and this information is not only valuable for the operation of the service we offer but it can be a great security ally for any other SOC.,As a young company, the documentation and support knowledgebase are still not completed and they can improve it in order to make an even better product. As AlienVault comes from an open source product (OSSIM) the log collection relies on the use of third part agents (snare, nxlog, ossec), however regarding the professional version, there should be an Alienvault agent that could collect logs from different datasources. This will give our customers piece of mind as they will notice that even the agents are part of the same product they acquired.,9,,By integrating different security monitoring tools and by understanding that the security threats have evolved into a much more complex environment, AlienVault has given us the tools to monitor different aspects of the information security and it helps to detect attacks that normally would not be detected by the traditional SIEM approach. OTX has been a great ally as it delivers visibility and information about the real time threats and it's information has not only be used for the customer with existing AlienVault deployments bu for other SOC customers. The hierarchy architecture also enables us to monitor all customers infrastructure from a single console make it easier for the SOC analyst to detect specifc events or security threats.,We have achieved this by using the AlienVault Federation Server. A single console facilitates our SOC staff not only to detect threats among any customer but also to continue with the incident process once the threat is detected. The correlation directives that are normally updated, give us the power to monitor new security threats without having to reconfigure the product, so the analyst can focused on their job.,25,10,For monitoring customer infrastructure and security. For monitoring datacenter infrastructure and security. For monitoring other critical infrastructure inside the company.,We have been able to focus the service to our customer's business. The flexibility it offers has allowed us to monitor datasources that no other SIEM vendor could offer. We have been able to integrate the AlienVault USM technologies with other services that we already offered in order to come up with an improved version of already existing services. We have been able to offer POC scenarios to our customers of a technology that is somehow difficult to deliver (other vendors do not offers POC and the customers have to buy the product without proving is what they need),We are trying to deliver visibility and reporting from other services which have these features but are somehow limited.,10,9,9AlienVault - Value for the MoneyAlienVault Unified Security Management is utilized internally by our company, as well as our clients, as a central cog in the wheel of information security management. The main problem we were trying to address was to have information security visibility that was easily scalable and cost effective. By utilizing AlienVault USM we were able to check those boxes.,Value proposition - AlienVault is a package of tools that perform functions that pretty much every business needs including security information event management, intrusion detection, vulnerability scanning, availability alerting, and reporting. Stability - Considering the multiple functions this software performs, stability and availability have been pretty good for us.,Plugins - There are some plugins that aren't out of the box or some tweaking is required to get the reporting correct. Reporting - This can be a garbage in/garbage out scenario for our clients that use this. Some of the reports aren't applicable depending on the information being collected and the canned reports can have gaps. There's a good base of content to do custom reports, but other products seem to do reporting better and more coherently out of the box. Menu layout - Minor gripe, as for day to day tasks the layout is fine, but for some administrative and configuration tasks there is a bit of hunting to do and drilling down to be able to get to the right spot so you can perform your task. Integrated Threat Intelligence - The industry is changing and this is where we've had to turn to additional threat feeds and other vendors for help.,6,Cisco Sourcefire SNORT, IBM Security QRadar and HP Arcsight,AlienVault is pretty effective at detecting threats, but like everything, it takes some care and feeding. Tuning is still required; proper set up of your span/mirror is still required. You still need a trained analyst to do actual analysis of the tickets that are opened for what it sees. Yes, a ton comes in the package that AlienVault offers, but security is never plug and play. I think lately the management of the product has created additional overhead. Threat hunting is now definitely a priority but we're starting to evaluate and utilize specialized tools for that and our concern is that SIEM is becoming more of a log collection and after the fact reporting device.,There is definitely time savings in not having to manage and maintain multiple products that do multiple functions. There is definitely worthwhile correlation, a useful ticketing system, and while you need to do tuning, it's not as onerous as some other products (The old Cisco IPS comes to mind). The built in way that they do federation has allowed us to scale without having to manage multiple consoles, unlike some other products which don't have proper multi tenancy.,3,4Conspiracy Theory - No Aliens here!We are using AlienVault USM for log monitoring and retention. We also monitor the alarms dashboard to be aware of anything that may be penetrating our network. We have just started using it within the last couple of months so do not have it fully tweaked, but will be creating directives and policies to alert our tier 2 support team of possible incidents that require investigation.,Log capturing and retention. Easily searchable. Behavioral monitoring. AlienVault is able to look at all events and correlate them, taking that workload off of staff. Open Threat exchange. AlienVault is on top of the current threats and updates database regularly to optimize protection. Intrusion detection.,Vulnerability scanning. The reports are horrendous and do not provide an easy way to sort through them. Perhaps there is something I am missing, but I would like to be able to break it down by the vulnerability and list all hosts that have that vulnerability. GUI does not keep track of what page you are on. If you make a change, it refreshes and you are back on page one. Would also be nice to be able to have a GoTo Page option. Vulnerability scanning takes much too long to run. I am running scans with another system and am able to easily scan our entire network over the weekend. It times out a lot with small subsets of our network. It also seems to be locking out the account used for authentication. I verified it has the correct password and used the system to test connectivity, which it passed.,9,EventTracker,I have not used other security technology to speak of. AlienVault has provided us with better insight as to what potential threats may be attempting to breach our network. It was also a valuable tool when going through an audit. We were able to identify when the auditor was open testing our network based on the alarms that were triggered.,Since we did not have any system that was able to provide this service, it has added great value to ensuring our environment is protected. We are able to identify potential breaches of our network and whether the source has an IP reputation based on the Open Threat Exchange. It has been a great addition to our arsenal for fighting off the bad guys.,Set up alerts for when a user has locked out their account. The alert goes to helpdesk so that they can contact the user, sometimes before they even realize they have locked their account. Also provides security in knowing that the user is the one indeed locking out their account. Use the vulnerability scanning to address vulnerabilities so when the auditors scan we have a much cleaner report as well as secured our environment. Set up alerts to go to Sys Admins when domain group memberships change. This provides an audit for privileged groups as soon as they occur.,Yes,Product Features Product Usability,Would not change anything. We did a POC on several solutions to see the results first hand in our own environment rather than just a demo so the value was easy to see when choosing AlienVault over the others.,9,7,8All-in-one, Integrated Security that is Simple and Low-costWe use Alien Vault's USM all-in-one appliance for all of our compliance needs. We went looking for a security product that would meet our compliance needs and found that just one component of our compliance budget, logging, was too expensive for our budget. AlienVault United Security Management allowed us to meet the other needs of SIEM, threat detection, HIDS, and vulnerability management less than most of the other products charge for logging.,Integrated product - AlienVault does a great job of bringing the varied product functionality together and provides a centralized view of security throughout our company. Support and Training - We chose to implement AlienVault ourselves and took the training class with implementation assistance. Both helped in learning the product and allowing us to be able to administer, use and improve our use of it more effectively. Product improvements - I have found issues with the product in the short time I have been using it and then seen product updates shortly thereafter that included the fixes we requested.,Plugins for data could use some improvements. Newer plugins and a more user-friendly way of creating them rather than writing regex would greatly improve the ability to add additional data sources. Documentation can be improved. The knowledge base and help are being redone and they have yet to catch up to the latest version. They provide some help but need to add detail for advanced troubleshooting. Forums can sometimes be helpful and the support also is helpful.,10,LogRhythm, WhatsUp Gold and Splunk,I have not seen another other products that do what AlienVault Unified Security Management does. It is the central view into our security stance and provides an easy to use method for detecting and finding vulnerabilities and threats to our enterprise. We still use firewall and anti-virus but without AlienVault Unified Management we would not know of the threats to our network.,I spend a few minutes each day reviewing the alerts in AlienVault Unified Security Management. I also can respond to any emergencies as they come in to my email. We upgrade the product with the latest threat feeds and any new product updates when they come out. We scan for vulnerabilities monthly, allowing us to patch and fix any known issues. AlienVault Unified Security Management makes security threats and management of them actually enjoyable.,9,9,10AlienVault USM - Always watching, just let it know where to put the magnifying glassWe use AlienVault Unified Security Management for monitoring both within our own infrastructure as well as assisting other clients and customers implement and maintain AlienVault Unified Security Management in their own environments. We particularly use it for its purpose as a centralized log store and for the advanced correlation features to provide us specific and actionable custom alarms that we can specify, or by leveraging some of the couple thousand that are already in the product. It is fairly simple to get started, but like any good tool, its only as good as the user can configure it and it takes some maintenance to keep humming smoothly and giving you the alerts and actionable information you need. To make the most of AlienVault Unified Security Management, make sure you have a pretty thorough understanding of your surrounding network and other security tools that are in place. The more data you can get into the SIEM, the more intelligence you can get out of it. But make sure to prioritize the events you want to collect so that you don't drown in your informational events.,Easy initial setup. Deep customization options for reporting, alerting, and custom actions. Provides access to CLI for scripting capabilities and troubleshooting.,Limited disk resources (1.2 TB) means that you need to really understand and prioritize what logs you need if you have a larger environment. Reporting is flexible, but more advanced grouping and customization options are desired. When there is a higher event volume, SIEM event searching can slow down.,7,OSSIM,AlienVault's threat detection is OK out of the box, it will alert you to key things like potential bruteforce authentication attacks, potential malware infections, default or cleartext credentials being passed over the network, common policy violations such as p2p software, shady toolbars, and suspicious http web calls, but like any good security tool it will require some work and tuning to get the most bang for your buck. It will take an understanding of what is and is not typical behavior on your network to better tune alerts that are important to you. This tuning will also require you to brush up a bit on some of the things that it is detecting and what they mean and how to rule out false positives. The key is to finding the balance so that you are not buried in a sea of alerts and likely false positives, but also bring out the events that mean the most to you that may otherwise go unnoticed if untuned. This includes things such as administrator accounts that should not be used for login under normal circumstances, sensitive boxes that should not be accessible from particular network segments or the Internet.,Finding out how much work you are saving by implementing a tool like AlienVault Unified Security Management into your environment can be extremely difficult to gage for most people. Often, when deploying, this may be their first tool for some of these security capabilities and no one had been manually searching the logs and network traffic on their own recently to compare the time and effort that having a tool to aggregate it all can save them. In most cases, I have seen the tool be well worth the investment and even gives implementers insights into network events that were previously invisible to them due to the lack of monitoring or data collection. The key to reducing the workload long term is to put in the time in deployment to design and customize the SIEM, reporting, and alerting to meet your organization's needs so that you spend less time later on creating one off searches, reports and configurations.,9An honest AlienVault reviewOur AlienVault was implemented across the organization in order to monitor North/South traffic as well as correlate server logs. It is a combination of a SIEM and an IDS that plays off of each other and provides insight into what is going on with the traffic that is traversing our network.,AlienVault provides great reporting for your CIO. AlienVault dashboards allow you to focus in on what the key alerts are, allowing you to save time and headaches. AlienVault support is extremely helpful.,Designing rules is convoluted and troublesome. Initial scoping of our project was wrong. Training was less than helpful.,6,IBM Security QRadar and Splunk,The AlienVault Unified Security Management is effective in discovering the security threats that we know about. We have no way to know what is currently slipping through the cracks but hopefully it is not much. The integrated threat intelligence appears to be a gimmick that lets you know that you're not the only one being annoyed by constant scans from foreign countries.,AlienVault Unified Security Management has some out of the box alerts that function great. When it comes to designing your own, it takes a lot of time to create your own. My organization is currently looking to hire an outside firm to dedicate some time to designing more robust threats and alert features.,5Alien Vault UTM is a good middle of the road SIEM for the priceWe use the network IDS, Host IDS, and point our firewall logs to Alienvault. We have found the network IDS to be useful and easy to set up. The host IDS seems a bit less reliable. We have attempted to use the Nagios feature, but it does not work as well as regular Nagios. We like the OTX integration so that we can see when traffic is headed for known bad actors.,UI is easy to read. OTX integration is good. Setting up directives is fairly straightforward.,Upgrades/Updates have gotten better, but we still have to call support for them to fix one that has gone sideways occasionally. Host IDS seems to regularly lose hosts. Nagios features just do not work well for monitoring.,6,,It was instrumental in detection C&C activity on our wireless network which was tracked to an employee's phone. We helped them remedy the situation, and would not have known without AlienVault. It has been useful in enumerating internal services that appear to be sending unencrypted credentials over the internal network. This has allowed us to find and fix these issues.,It is granting us more visibility than we had before, and allowing us to find issues that we would have missed before. I am not convinced that it necessarily reduces the work involved to deal with the threats.,7AlienVault ReviewSecurity Event Correlation.,Notification Log Monitoring Threat Alerts Inventory Monitoring Vulnerability Scans,System Updates break features, especially Threat Intelligence Policies as well as corresponding Alerts Need to conduct more Customer Education regarding features and system updates Steep initial learning curve on getting the most out of system Getting a Support Technician on the phone when something breaks.,7,LogRhythm,AlienVault is very effective but lacks polish in the event correlation. It throws a lot at you as AlienVault has great features like vulnerability scanning, inventory and asset management, as well as monitoring. But getting the best use out of them can be a task. A better job can be done to test and push out system updates before releasing them. Updating the system sometimes breaks Threat Intelligence Policy as well as their corresponding alerts. Getting support assistance can be a pain but once they respond the technicians are great and very knowledgeable on the product. I feel there needs to be more customer education and webinars on AlienVault USM's features. I don't always feel confident that I'm getting all I can out of the system.,In a sense we have reduced some degree of the work, however AlienVault makes security events easier to manage and filter.,No,7,7,7The One Man SoCAlienvault is used across the whole organization and it addresses log correlation problems and real time threat intelligence visibility,Threat detection Log aggregation Threat exchange and enhanced visibility,Report customization Scalability Ability to easily develop custom plugins,9,HP Arcsight,Alienvault has the best threat intelligence and unified security management compared to other security technologies,The benefit of threat detection simplification was achieved...all in a bit!,Integration of all custom log sources- including txt, xml, and other flat files Correlation of custom log sources,10,9,9Don't be afraid of this Alien.The implementation of AlienVault Unified Security Management was the result of a network wide virus infection and not knowing where the virus originated required that all servers and workstations be scanned for infection. The system was deployed across the entire network for a centralized point of administration verifying network integrity and system security protocols.,Real-time access logs and scanning. Once the system was installed and configured it allowed our company to find that the network was being hit with a continued bruteforce attack. With this discovery we made a few changes for our remote users and reduced the unauthorized outside access attempts. Traffic monitoring. When first starting with the company part of my assignment was to find why the network was so lethargic. With the AlienVault system I was able to see the time periods of heavy internet and data usage. With this information I was able to determine the highs and lows of user access. OTX activity. After getting subscribed to the OTX community I was given frequent updates to the latest security threats and what to look for. To me the best aspect of the OTX activity monitoring is to know when the threat is directly affecting our network and keeping up to date on the threats.,Initial setup and administration. I came into this company after the utility was deployed and what I have found in our setup was that the ESXi environment in our setup does not scan the entire network. Having an initial setup assistance program for the installation. Asset environment. In our current configuration we have all the servers and network appliances running with static ip's or reservations from our dhcp server, this works very well in our environment. What does not work well are the machines that are part of the dhcp pool, if the machines are configured as an asset and the ip address changes the description (identity) does not follow the device. I think that if we have the ability assign assets from the MAC address would eliminate this problem as I see it. Kick-off program. As part of the service we where invited to join a kick-off event that I personally attended (virtual class actually) what I discovered from this class was a more advanced configuration than what I had expected to see. While in provided good information and virtual labs, I think if the class is a kick-off then it should be about the basic installation and configuration of the appliance. The time spent on configuring rules out weighed how to get information to be read from the sensors.,8,,I believe the best aspect of the AlienVault system comes ultimately from the community of users. The OTX activity notifications for myself provides a great wealth of knowledge that I would not get otherwise. This is my first true experience in managing a service such as AlienVault for a long period of time. The community support is a great reference for smaller IT departments that have limited resources to stay up to date with emerging threats.,Having been a product the company purchased after experiencing its first network wide virus infection, yes, most definitely. The company just was not set up for or equipped to properly handle this problem. The AlienVault appliance once configured indicated that the company was experiencing a bruteforce attack. Was this an underlying result of the infection possibly? What I do know is that without the AlienVault software showing this outside access the problem would have never been discovered. We implemented changes to the network that resolved this problem to about 95% with just 1 workstation that continued to have problems with network access and traffic problems. The AlienVault system allowed me to watch in real-time when exactly this workstation was getting hit and from where. The workstation that experienced the network congestion just happened to be the same workstation that infected the network. Without this valuable information and having limited IT department resources, I was able to commit my time in monitoring the network and ultimately finding this problem. Once removed from the network and rebuilt this saved the company hundreds of hours in downtime and loss of productivity. Definitely a saver for the company.,No,Coming into the company I work for they had just experienced a very bad network wide virus. The USM software have been in place would have helped to mitigate the infection and locate the machine faster. This service since being installed has provided valuable information on continued port scans and access vulnerabilities. We found that our AD server and SQL servers had continued port scans. Once identified I was able to make changes to the remote access ports and this stopped the port scans. Ultimately Alienvault USM saved valuable time and increased user productivity.,10,5,No,Not sure if this an AlienVault thing directly or not. Working with our consultant Shawn he was able to create a custom plugin for our QNAP Enclosure to support my sys log from the device. It was crucial for us to read these logs and since all other event logs are going into AlienVault this was an ideal situation. After gathering some info logs from the QNAP device Shane had a plugin created for me in 2 days and deployed. That was an invaluable effort on the part of AlienVault and Shane.,Real-time scanning OTX activity Easy to read dashboard,Configuring the ESXi network adaptors Understanding how to create rules Not knowing what many of the rules meant or what they do.,7Why log into 25 systems, when AlienVault can do it better for you!!??We use AlienVault to process all our syslogs to proactively respond to threats from environmental to system compromise. It takes the guess work out of the equation and saves us time while ensuring a more comprehensive coverage.,Support is great! The plug ins for logs are great, built in and or you can request them and if you are good enough, you can build them. The amount of information provided is excellent.,Maybe some optional self remediation. Maybe some additional built-in alerting.,10,Varonis,It works very well, we stopped CryptoLocker at least three times and were able to determine that a remote location has a lot of malware.,YES - it has reduced work and guess work, and it does a much better comprehensive job!!!,Predictive analysis behavior,Configuring plugins Writing policies are only a little difficult,No,7AlienVault - Funny name but a great security productWe are an AlienVault Managed Service Security Provider (MSSP). We use the product internally, as well as for customers. AlienVault is a great product because it provider a level of visibility into network activity that is difficult to achieve with traditional infrastructure monitoring tools. Like any good tool, there is a learning curve. I highly recommend working with a partner or a consultant if you are considering implementing AlienVault. Once it's set up properly on a network, it provides excellent data about vulnerabilities and network activity that would otherwise be missed. In every case where we've deployed AlienVault, the tool has exposed risks and/or activity that was unknown prior to the installation. AlienVault support is excellent. In every case where we've had to escalate an incident or problem to support, they have been very responsive initially and in fixing the problem. I highly recommend the AlienVault product for any organization that is looking for a cost-effective and comprehensive security tool.,Identifying network vulnerabilities Alerting on suspicious network traffic Providing a single pane-of-glass for security monitoring,Ticketing - the internal ticketing system is not very good and integration with external ticketing systems is limited to email forwarding Out-of-the-box usefulness. The product requires a significant amount of time and expertise to make it useful. AlienVault could provide better documentation and/or GUI workflows to make setup smoother,9,AlienVault has done a great job of detecting security threats in the environments where we have it deployed. We had a ransomware outbreak on a network with AlienVault deployed and the product detected it and alerted immediately. I was very impressed. It's also done a great job of identifying potential security vulnerabilities, which has helped us lock down our customer networks.,With AlienVault deployed, I feel very confident about the security posture of a given network. Without this tool, we have to run a number of audits and reports, which only yield data about a single point-in-time. AlienVault is continuously monitoring the network for vulnerabilities and threats, which reduces amount of manual work required to maintain a good security posture.,8,825th Century Security on a 20th Century BudgetWe were looking for a solution to enhance our security standing. We quickly found more than a few eager providers willing to help us with this challenge for the right price. The problem was that price was WAY too high for our market and budget as well almost every product we found was little more than an expensive tool for a security technician. We wanted to avoid hiring a new staff member and having to worry about keeping them up to date with expensive training and paying for expensive tools. We found AlienVault through SpiceWorks and began investigating. From there we discovered how badly we needed this product. During the proof of concept we discovered an active breach attempt. Once we purchased AlienVault Unified Security Management we discovered two additional active breach attempts on our most mission critical systems. We have been able to patch, resolve and plug every hole we have found and feel infinitely more secure. We never had visualization into the network like this before and never would have with the competing vendors. I will never work in an environment again that does not have AlienVault.,Visualization into your network traffic! Simplifies the complicated and scary! Gives you a warm and secure feeling over your environment. Provides real time analysis and view into your security.,Creating Filters and Rules will come easier with time but they currently have some room to grow. Integration with existing security and new security products. With all AlienVault has done to improve my network I haven't gotten a raise yet - Not really AlienVault's fault but they could write a letter about how awesome I am.,10,Splunk,There is no other solution that can do what AlienVault does and that is a fact. Others try to make use of the FREE OTX (Open Threat Exchange) and advertise their product "keeps up to date with the latest threats" and tell you it can show you everything on your network and problems before they are a problem but none can truly do what AlienVault does. Is that App you installed on your local network susceptible to HEARTBLEED, or POODLE? What about that program your in house developers built? Not sure how to test since the application is only visible from inside the network? AlienVault. Want to know if it is being breached? AlienVault. Want to know the latest security threats and if you are vulnerable without having to test each threat manually against all your applications? AlienVault. Think that Server isn't visible from the internet? AlienVault. I had multiple servers and applications we didn't think were visible and by all rights they shouldn't have been however for one reason or another we found they were and never would have known people were actively attempting to breach them if it wasn't for AlienVault. We had a Splunk server running and it never alarmed us or caught any of it.,Yes we have achieved this benefit with AlienVault. Minimal effort to setup and learn and I was immediately effective with this product. With some time and effort I was able to clean up my environment and server security dramatically. AlienVault helped me make the argument to management for the need for a new Edge Router and Security training! AlienVault has helped us develop a budget for security training, and prove the need for continued training of our end users, and establish an on boarding security training course for our environment. Thank you AlienVault.,10,10Security Insight Out of the BoxWe deployed AlienVault's USM for a complete view of our network and assets across the company as a whole. We are now able to have a single pane of glass view of assets, services, vulnerabilities, anomalies, or security related alarms.,Initial deployment, during my research on deploying a SIEM solution deployment, seemed to be a nightmare in many of AlienVault's competitors. AlienVault's process was amazingly simple. The readability of log information is great with AlienVault. I am able to review security alerts or events and know exactly what may have occurred and what information is actionable on the network level to address any issues.,Easier to create reports for large sets of data. Better out of the box automation of alarm and ticket responses or actions. Very small but the ability to always view alarms in a grouped view.,10,,AlienVault is my first SIEM product I have worked with in a production environment, but everything seems very straight forward and easy to use and easy to understand summaries of what is occurring on your network.,Yes, definitely we have a much better view and ability to detect what threats or vulnerabilities our network may have.,No,Price Product Features Positive Sales Experience with the Vendor,The only thing I would do differently is schedule/budget more professional services time down the road after using and configuring the AlienVault USM to meet my needs to see how my configuration could be improved, or answer any questions I may have accumulated after using the system for awhile.,8,9The right SIEM tool for small and mid-sized organisationsWe've implemented and are currently operating AlienVault for few clients. Some clients use AlienVault to manage the security of a particular network. Another client is using AlienVault to offer managed security services. AlienVault has been improving the security visibility for our clients' infrastructure security. It helps those companies that are tight on budget for security spending. AlienVault helps us to maintain our service level agreement with our clients. After the tool is integrated with the infrastructure, it becomes easy to spot existing abnormalities.,Easy to use dashboard Based on open source making it easy to customise the deployment Cost effective OSSEC agent integration enables file integrity monitoring,Bulk sensors update Improving NIDS signatures Managing OSSEC agents from dashboard is limited and quite restricted Assets tracking,8,Correlating security events proved to be very useful. NIDS is a crucial component of AlienVault and without it one third of security visibility is hindered. The IP reputation and open threat exchange framework maintained by AlienVault labs facilitate sharing security intelligence among AlienVault users. It is possible to create correlation rules and actions based on threat intelligence information.,Yes these benefits are being achieved by continuously tuning the tool. Managing AlienVault is like any other SIEM requires continuous effort to ensure the quality and reliability of the triggered security alerts. Defining concrete use cases from the beginning is a crucial requirement for a successful implementation. It is important to keep track of the assets inventory.,Yes,Switching from AlienVault OSSIM to USM provided our operations team with the following key advantages: - Wider spectrum of security threat intelligence and commercial security feeds updates. - Product support availability. - Activating logger component to maintain a cryptographically secure repository of normalized logs. The logs stay in indexed file and can be retained for extended periods without hindering the system performance. These text based logs also don't consume disk storage. Moreover, we learned that AlienVault USM has tuned settings for system and database performance.,No,5,Yes,Best support can come during pre sales where we wanted to demonstrate how AlienVault can integrate with some technology vendor products. At that time the support team was exceptionally helpful and supplied us with the required plugins.,Scanning and adding assets Creating correlation directives Users management,Manage OSSEC agents Bulk updates for sensors tracking disconnected assets,No,8Alienvault - The Answer to Many of our Network Security NeedsAlienVault is used to provide visibility into our network traffic inbound and outbound from/to the Internet as well as traffic between our DMZ, corporate and extranet networks. Prior to AlienVault we configured a layered security design and it was sufficient for most purposes. However, we did not have insight into the actual network traffic to see any viruses, or exploits that were being transmitted within or through our network. AlienVault provided that visibility and also allows us easier vulnerability tracking. We are now able to see when an exploit is present and respond immediately and appropriately.,Exploit detection Vulnerability Scanning SIEM IDS,AlienVault is excellent at finding issues/exploits and providing the information necessary for forensics. It could be nice if instructions for remedies could be provided as well.,10,,AlienVault has been extremely effective in finding threats in my environment. From something as simple as outdated software detection to detecting an exploit or phishing attempt. It provides me with unequaled visibility into the actual network traffic. It finds exploits in transit and will send me an alarm instantly so I can resolve the issue before it has a chance to propagate through our environment. It integrates with our firewall so I gain the visibility at the edge of our network as well.,After the initial configuration and burn-in period it has reduced the amount of time we use to react to issues. We also have a greater sense of awareness and security knowing that the system is constantly scanning network traffic, analyzing server and firewall logs, etc., to provide us with the necessary information to keep the network secure.,3,1,Exploit detection Vulnerability scanning Logging,Great log monitoring.,Vulnerability resolution.,10,No,Product Features Product Usability Positive Sales Experience with the Vendor,N/A,Implemented in-house,Yes,Change management was minimal,Learning the product.,9,No,9,Yes,At one time the AlienVault system was falsely reporting that Adobe Flash Player was outdated on some of our systems. I contacted support and they contacted me the same day. They researched the issue with me and found that the newest AlienVault update would fix the problem. We installed the new update and the problem was resolved, quickly.,Vulnerability scanning Alarm monitoring,Custom logging,8
Unspecified
AlienVault USM
547 Ratings
Score 8.1 out of 101
<a href='https://www.trustradius.com/static/about-trustradius-scoring' target='_blank' rel='nofollow noopener noreferrer'>trScore algorithm: Learn more.</a>TRScore

AlienVault USM Reviews

<a href='https://www.trustradius.com/static/about-trustradius-scoring#question3' target='_blank' rel='nofollow noopener noreferrer'>Customer Verified: Read more.</a>
AlienVault USM
547 Ratings
<a href='https://www.trustradius.com/static/about-trustradius-scoring' target='_blank' rel='nofollow noopener noreferrer'>trScore algorithm: Learn more.</a>
Score 8.1 out of 101

Do you work for this company?

TrustRadius Top Rated for 2019
Show Filters 
Hide Filters 
Showing 34 of 548 AlienVault USM ratings and reviews.
Clear all filters
Overall Rating
Reviewer's Company Size
Last Updated
By Topic
Industry
Department
Experience
Job Type
Role

Reviews (1-25 of 34)

Companies can't remove reviews or game the system. Here's why.
Brian W. Caldwell BIT | MIS profile photo
September 29, 2017

Big Bang for your Buck

Score 9 out of 10
Vetted Review
Reseller
Review Source

Usability

5
After using it for some time I have found the interface to be somewhat "clunky." Some of the system management requirements have to be done from the CLI (Command Line Interface). There is no way to easily automate some of the system maintenance, that if not addressed, causes the system to become unusable after a period of time.
Read Brian W. Caldwell BIT | MIS's full review
No photo available
Score 9 out of 10
Vetted Review
Verified User
Review Source

Usability

7
Once you are able to navigate the different panels, finding what you need is quite easily. Before getting used it it can be a bit of challenge .

Each panel is quite well laid out and the filtering search capabilities are quite strong.
Read this authenticated review
No photo available
Score 9 out of 10
Vetted Review
Reseller
Review Source

Usability

9
It is easy to use and very flexible. It has a tons of security features that can be used for different purposes. It has several wizards that can make the configuration task a easy task.
Read this authenticated review
No photo available
Score 9 out of 10
Vetted Review
Verified User
Review Source

Usability

8
The dashboard for alarms is extremely useful for a quick glance at what is going on in the environment. It also allows you to drill into an alarm to get more granular details on what generated it. Reporting and flexibility of dashboards could use some improvements, but overall a very useful tool.
Read this authenticated review
No photo available
Score 7 out of 10
Vetted Review
Verified User
Review Source

Usability

9
Navigating the platform is really easy and quite intuitive . Reporting him scheduled reporting is easy to use and to set up with many options for report export; however, there are some limitations as to what type of grouping can be done within the premade report templates .
Read this authenticated review
No photo available
Score 6 out of 10
Vetted Review
Verified User
Review Source

Usability

5
Alienvault can easily be summarized quite easily - over-engineered. The UI is convoluted, requiring too many steps to perform simple day to day and menial tasks. The amount of work that is necessary to set up simple alarms is irritating. I wish that they provided more out of the box functionality and require less user configuration for these simple alarms.
Read this authenticated review
No photo available
Score 6 out of 10
Vetted Review
Verified User
Review Source

Usability

7
The base product is easy to understand, but configuring feeds to the SIEM can be a challenge.

Also, we still have not successfully set up Nagios monitoring inside the USM, even though we have had a working standalone Nagios for years.
Read this authenticated review
No photo available
November 30, 2017

AlienVault Review

Score 7 out of 10
Vetted Review
Verified User
Review Source

Usability

7
I give the rating because there is a lacking of understanding what AlienVault is capable of and you need training to get a better understanding.
Read this authenticated review
James Ellsworth profile photo
Score 8 out of 10
Vetted Review
Verified User
Review Source

Usability

7
The product once properly configured seems to offer a wealth of information but has it's issues. I feel that the initial setup/ installation should include technical support to get up and running. My personal experience from the configuration as installed indicates that the network adaptors are not properly configured to read information. The network ports where configured to only ready 1/2 the network?? So having help to get the system up and running should be part of the initial purchase.
Read James Ellsworth's full review
Jeremy Wanamaker profile photo
Score 9 out of 10
Vetted Review
Reseller
Review Source

Usability

8
Good product. It's a significant improvement in UI from AlienVault's previous offer. It could use more polish. The feature set also needs to improve. There are features that existed in AlienVault's previous product that are not included in this product. I understand the developers are rapidly adding features. We expect this product will mature into a best-in-class offering.
Read Jeremy Wanamaker's full review
Danny Santiago profile photo
Score 10 out of 10
Vetted Review
Verified User
Review Source

Usability

10
I tried out other SEIM engines and have to say AlienVault beat them all and went beyond. Their simple to use and read interface as well as updated analytics makes doing my job easy. Not only did I catch active breaches but were able to stop them before any data was lost. That was just during out trail of the AlienVault USM product. Support has been amazing as well as the sales staff. I can't imagine running a datacenter with AlienVault there to help me sleep at night. Thank You AlienVault. You not only made my team look like rock stars we feel like it too!
Read Danny Santiago's full review

Feature Scorecard Summary

Centralized event and log data collection (1)
8
Correlation (1)
8
Event and log normalization (1)
8
Deployment flexibility (1)
7
Custom dashboards and views (1)
6
Host and network-based intrusion detection (1)
7

About AlienVault USM

AlienVault USM Anywhere is a cloud-based security management solution that promises to accelerate and centralize threat detection, incident response, and compliance management for cloud, hybrid cloud, and on-premises environments. The vendor says that USM Anywhere includes purpose-built cloud sensors that natively monitor your Amazon Web Services (AWS) and Microsoft Azure cloud environments. On premises, lightweight virtual sensors run on Microsoft Hyper-V and VMware ESXi to monitor your virtual private cloud and physical IT infrastructure.

USM Anywhere aims to help you rapidly deploy sensors into your cloud and on-premises environments while centrally managing data collection, security analysis, and threat detection from the AlienVault Secure Cloud.

Five Essential Security Capabilities in a Single SaaS Platform

AlienVault says that USM Anywhere provides five essential security capabilities, giving you everything you need for threat detection, incident response, and compliance management, within one platform. With USM Anywhere, you can focus on finding and responding to threats, not managing software. USM Anywhere can readily scale to meet your threat detection needs as your hybrid cloud environment changes and grows.

  1. Asset Discovery
  2. Vulnerability Assessment
  3. Intrusion Detection
  4. Behavioral Monitoring
  5. SIEM

Try USM Anywhere in your environment—free for the first 14 days.
www.alienvault.com/products/usm-anywhere/free-trial

AlienVault USM Features

Security Information and Event Management (SIEM) Features
Has featureCentralized event and log data collection
Has featureCorrelation
Has featureEvent and log normalization
Has featureDeployment flexibility
Has featureIntegration with Identity and Access Management Tools
Has featureCustom dashboards and views
Has featureHost and network-based intrusion detection
Additional Features
Has featureAlienVault Open Threat Exchange

AlienVault USM Screenshots

AlienVault USM Videos (2)

Watch AlienVault USM Anywhere: Five Essential Cloud Security Capabilities in a Single SaaS Platform

Watch See How We're Pushing the Outer Limits of Security

AlienVault USM Downloadables

Pricing

Has featureFree Trial Available?Yes
Has featureFree or Freemium Version Available?Yes
Has featurePremium Consulting/Integration Services Available?Yes
Entry-level set up fee?Optional

AlienVault USM Support Options

 Free VersionPaid Version
Phone
Email
Forum/Community
FAQ/Knowledgebase
Social Media
Video Tutorials / Webinar

AlienVault USM Technical Details

Deployment Types:SaaS
Operating Systems: Unspecified
Mobile Application:No
Supported Countries:Global