Skip to main content
TrustRadius
AlienVault USM

AlienVault USM

Overview

What is AlienVault USM?

AlienVault® Unified Security Management® (USM) delivers threat detection, incident response, and compliance management in one unified platform. It is designed to combine all the essential security capabilities needed for effective security monitoring across cloud and on-premises environments, including SIEM, intrusion detection, vulnerability management, as…

Read more
Recent Reviews

TrustRadius Insights

Users have found AlienVault USM to be a valuable SIEM solution for centralizing and searching log data from a large number of network …
Continue reading

MSSP Review

8 out of 10
October 04, 2021
AlienVault offers a different experience as opposed to other SIEM tools where it can be set up and configured properly in a shorter amount …
Continue reading
Read all reviews

Awards

Products that are considered exceptional by their customers based on a variety of criteria win TrustRadius awards. Learn more about the types of TrustRadius awards to make the best purchase decision. More about TrustRadius Awards

Popular Features

View all 7 features
  • Centralized event and log data collection (8)
    8.5
    85%
  • Correlation (8)
    8.5
    85%
  • Event and log normalization/management (8)
    8.0
    80%
  • Custom dashboards and workspaces (8)
    7.0
    70%

Reviewer Pros & Cons

View all pros & cons
Return to navigation

Pricing

View all pricing

Essentials

$1,075

Cloud
per month

Standard

$1,695

Cloud
per month

Premium

$2,595

Cloud
per month

Entry-level set up fee?

  • Setup fee optional
For the latest information on pricing, visithttps://www.alienvault.com/products/pri…

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services
Return to navigation

Features

Security Information and Event Management (SIEM)

Security Information and Event Management is a category of security software that allows security analysts to look at a more comprehensive view of security logs and events than would be possible by looking at the log files of individual, point security tools

8
Avg 7.8
Return to navigation

Product Details

What is AlienVault USM?

AlienVault® Unified Security Management® (USM) delivers threat detection, incident response, and compliance management in one unified platform. It is designed to combine all the essential security capabilities needed for effective security monitoring across cloud and on-premises environments, including SIEM, intrusion detection, vulnerability management, as well as continuous threat intelligence updates. The vendor states that even for resource-limited IT security teams, AlienVault USM can be affordable, fast to deploy, and easy to use. It eliminates the need to deploy, integrate, and maintain multiple point solutions in the data center.

Smart, automated data collection & analysis: USM Anywhere automatically collects and analyzes data across the attack surface, helping to quickly gain centralized security visibility without the complexity of multiple disparate security technologies.

Automated threat detection powered by AT&T Alien Labs: With threat intelligence provided by AT&T Alien Labs, USM Anywhere is updated automatically to stay on top of evolving and emerging threats, so the security team can focus on responding to alerts.

Incident response orchestration with AlienApps: USM Anywhere supports a growing ecosystem of AlienApps, enabling the user to orchestrate and automate actions towards other security technologies, able to respond to incidents quickly and easily.

AlienVault USM Features

Security Information and Event Management (SIEM) Features

  • Supported: Centralized event and log data collection
  • Supported: Correlation
  • Supported: Event and log normalization/management
  • Supported: Deployment flexibility
  • Supported: Integration with Identity and Access Management Tools
  • Supported: Custom dashboards and workspaces
  • Supported: Host and network-based intrusion detection

Additional Features

  • Supported: AlienVault Open Threat Exchange

AlienVault USM Screenshots

Screenshot of USM Anywhere NIDS Dashboard

AlienVault USM Videos

AlienVault USM Competitors

AlienVault USM Technical Details

Deployment TypesSoftware as a Service (SaaS), Cloud, or Web-Based
Operating SystemsUnspecified
Mobile ApplicationNo
Supported CountriesGlobal

Frequently Asked Questions

Splunk Cloud and Fortinet on IBM Cloud are common alternatives for AlienVault USM.

Reviewers rate Deployment flexibility highest, with a score of 8.6.

The most common users of AlienVault USM are from Mid-sized Companies (51-1,000 employees).
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(735)

Community Insights

TrustRadius Insights are summaries of user sentiment data from TrustRadius reviews and, when necessary, 3rd-party data sources. Have feedback on this content? Let us know!

Users have found AlienVault USM to be a valuable SIEM solution for centralizing and searching log data from a large number of network attached devices. This platform is being used for various use cases such as vulnerability management, scanning, malware detection, and monitoring malicious network traffic. It is considered a good SIEM solution for organizations new to security operational logging or those with a smaller staff and budget. The product has been praised for its integrated feature sets, including HIDS, NIDS, FIM, and security alerting capabilities. The inclusion of features like vulnerability scanning and file integrity monitoring has extended its value for organizations in the early stages of cybersecurity program development. Many users have experienced real-time alerts, enabling them to respond to security incidents and compromised passwords more quickly. Furthermore, AlienVault is used for a range of functions such as SIEM, vulnerability scanning, asset discovery, and investigations. It provides organizations with a centralized log collection site, allowing them to monitor and address new problems more effectively. The platform has been effective in helping organizations meet regulatory compliance requirements and improve SOC operations. Additionally, AlienVault is used to analyze network traffic, Windows Event Logs, and other security events, helping organizations improve network security and protect their customers. It solves security challenges related to device and software visibility, monitoring for anomalous events, and ensuring patch management. Users appreciate the simplicity of deployment and the robustness of the interface. The support team is highly responsive and knowledgeable.

AlienVault USM Anywhere is used by organizations to easily identify security incidents happening across their infrastructure and comply with PCI-DSS compliance requirements. MSSPs utilize AlienVault USM Anywhere to provide their customers with best-in-class threat monitoring and response services. It is also used to monitor cloud environments, scanning and alerting for any known vulnerabilities or activity on servers. AlienVault helps organizations with auditing purposes by monitoring cloud permissions and changes to security. Additionally, it is deployed to customers for monitoring and is used by NSOCs to monitor their networks. AlienVault has been implemented across organizations, covering server assets and providing granular logging on systems and networks. It helps in raising alarms/alerts and mitigating network-related activities. AlienVault collects and alerts on network and system activity across the entire organization, making it easy to filter for important data. The product centralizes log data and helps perform vulnerability analysis and threat detection. It assists in security patching and monitoring within AWS environments. Users appreciate the ease of use and configuration of the cloud-based panel. AlienVault is implemented and managed for clients as a recommended SIEM solution, collecting and normalizing logs from various data sources. It is used throughout organizations to gain insight into network and server events, manage and correlate logs, and recognize anomalous activity. Users have been able to set up alerts for specific events and policies, effectively managing systems and alerts in place, monitoring multiple client environments, and identifying issues that clients may have missed.

AlienVault USM Anywhere is praised for its cost-effectiveness compared to other SIEM solutions on the market. Users appreciate its threat intelligence capabilities, ease of use, user-friendly interface, and simplicity of deployment. The built-in correlation rules require minimal setup and provide high-quality results. Asset management and scanning features help users stay on top of monitoring assets, including dynamic and static asset lists. The integration of OTX into USM Anywhere allows for up-to-date threat intelligence and pulse subscriptions.

The software plays a crucial role in monitoring and alerting when anomalies occur, aiding in threat detection, compliance management, log collection, and vulnerability scanning. It helps organizations stay up to speed on new vulnerabilities and supports agile business initiatives by aiding analysts in identifying cyber threats and providing access to threat cross-referencing data. AlienVault USM Anywhere is deployed to monitor AWS cloud environments, attain compliance, identify threats, and facilitate auditing of non-emergency configuration changes and vulnerability monitoring.

Overall, AlienVault USM Anywhere provides centralized security monitoring, incident response capabilities, compliance reporting features, vulnerability assessment tools, real-time SIEM functionality, as well as asset discovery and user activity monitoring capabilities. It has been widely adopted across various industries for enhancing security posture and gaining comprehensive visibility into network activities.

Based on user recommendations, AlienVault USM receives the following common recommendations:

  1. AlienVault USM is recommended for cost-conscious companies and small to medium businesses due to its affordability and effectiveness. Users find it to be a great tool for analyzing and reacting to threats, offering excellent value for the price.

  2. Users suggest exploring alternative SIEM choices and discussing functionality and configuration requirements. Logrhythm is mentioned as a possible alternate SIEM choice, especially for high-end functionality needs. It is advised to compare features and select the SIEM system that offers the best cost for desired features.

  3. To maximize the experience with AlienVault USM, users recommend taking advantage of training opportunities provided by AlienVault. Joining official training sessions allows users to learn best practices from other users and gain comprehensive knowledge of the product. Users also recommend utilizing forums, support, webinars, and videos offered by AlienVault to enhance understanding and achieve optimal results.

Overall, AlienVault USM is regarded as a cost-effective solution suitable for organizations with data privacy and security priorities. The product's flexibility, community-created intelligence, and continual improvement are also highlighted by users. While some mention areas for improvement, such as support stability and module quality, the general consensus is that AlienVault USM delivers reliable security enhancements and cost savings.

Attribute Ratings

Reviews

(201-225 of 390)
Companies can't remove reviews or game the system. Here's why
Score 10 out of 10
Vetted Review
ResellerIncentivized
  • AlienVault USM Anywhere has a modern, user-friendly, and intuitive GUI, making it easy to use.
  • AlienVault USM Anywhere is a cloud-based solution that is easy to deploy and easy to scale as well.
  • On top of having built-in support with several technologies, AlienVault USM Anywhere has an API that allows you to develop additional plugins if necessary.
  • Although they use machine learning, the algorithms that they use are graph-based. Their AI/ML capabilities could be improved a bit.
  • The solution provides some compliance reports, but it does not generate reports with information such as... how many of what type of event happened this month. You can see this information on the dashboard, but it would be nice to be able to generate a report automatically.
Scott Holland | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
ResellerIncentivized
  • SIEM - Real time logs allow you to quickly drill down into current issues in your network and filter out any noise
  • Alarms - The alarms page shows all the current environmental awareness on the network and a quick report and ticketing system allows for ease of use. This again saves time and make you more effective at resolving issues and the ability to pass the tickets to the relevant department.
  • OTX - The open threat exchange integrations enables the USM to use all the latest threat indicators to correlate against incoming threats without the need to manually add rules to your USM.
  • Apps - AlienVault integrate with many apps already but there are plenty more to be added to allow further integration with other products.
  • More ability to filter logs form other security platforms
Score 7 out of 10
Vetted Review
Verified User
Incentivized
  • AlienVault Unified Security Management (USM) delivers a unified, simple and affordable solution for threat detection and compliance. Powered by the latest AlienVault Labs Threat Intelligence and the Open Threat Exchange the largest crowd-sourced threat intelligence exchange, USM enables mid-size organizations to defend against modern threats.
  • It is free. The best free SIEM out there. Possibly the only one.
  • Every upgrade is a possible chance for re-building the system. About 80% of the time, the upgrade will break something so badly, you need to re-install and start from scratch.
  • The system slows down considerably when a large number of events are fed in.
  • The community is weak and there is rarely any input from the developers on the community to help out. So a lot of people try it out and then go somewhere else.
  • While I think it is a great product, it seems to me like it is falling behind in the last few years. There are some more usable and better products in recent years that would make me buy them instead of AV USM.
Erlon Sousa Pinheiro | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
  • AlienVault enables integration with external technologies, thereby broadening its scope and possibilities.
  • AlienVault has a dashboard customization and reporting scheme that makes it flexible to query your data, allowing you to model the tool according to your needs.
  • AlienVault will make you forget the need to consult some information on AWS Cloudtrail. It extracts the data from there and delivers in a much more efficient way.
  • With a single tool you can monitor your cloud and on-premises environment.
  • Their commercial policy on stored data makes you need to filter out some information before it is stored.
  • Their new agent does not allow you to create local filters, which can easily lead to the overrun of monthly contracted storage limits.
  • It does not allow you to create log analysis plugins. If it were allowed, it would be possible, for example, to create a plugin for analyzing the logs of an application created by your company.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
  • SIEM - logging. AlienVault is easy to configure on the client side, and with a couple scripts, makes deployment a piece of cake.
  • Vulnerability scanning. AlienVault helps us track which systems are most vulnerable to security issues so we can prioritize patching.
  • Reporting. AlienVault generates useful and attractive reports.
  • Some of the documentation could be improved and go more into depth, but support is helpful when the documentation falls short.
Vladimir Finkinshtein | TrustRadius Reviewer
Score 6 out of 10
Vetted Review
Verified User
Incentivized
  • Deployment and Integration pretty easy and straightforward whether in AWS (Cloud) or the on-prem environment.
  • Log aggregation, collection rules/Jobs easy to create.
  • Notification s component working very well
  • AWS Integration: in particular, monitoring of AWS resources is far away from ideal
  • Vulnerabilities scanner requires root and administrative privilege in localhost, which is not acceptable.
  • The sensors themselves generate millions of requests, which creates a lot of unnecessary noise to the systems and eventually "eating" traffic and expensive storage space
Score 9 out of 10
Vetted Review
Verified User
  • All in one view where you can see all of your assets.
  • Logs and alarms.
  • Detecting systems in your environment.
  • Control of updates - nice to do it in maintenance window.
  • More custom dashboards.
Score 6 out of 10
Vetted Review
Verified User
Incentivized
  • AlienVault's correlation engine is really well designed and it understands a large number of log types.
  • AlienVault's open threat exchange is a great way to use the community to report new signatures for issues that are being seen in their environment.
  • AlienVault's main screen UI is well designed and makes it very clear as to what issues need to be addressed first.
  • AlienVaults published development to-do-list is a great feature that more companies need to employ. It is great seeing that features are being worked on and they do take input as to what features need to be added next.
  • AlienVault's on-premise and cloud platforms use a completely separate software base and they don't seem to be getting the same attention from developers. They need to bring the two platforms together into one code base.
  • AlienVault needs to enable integration with third-party utilities for ticketing and asset management. Neither the ticket system nor the asset management system is well featured, as such, they need to be able to integrate with other systems that have more features.
  • AlienVault needs to add a true compliance scanner like Openscap.
  • AlienVault needs to get their cloud solution Fedramp compliant.
AJ Gumataotao | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
  • Up to this point, I have had no issues integrating with a system we currently have in production. while AlienVault stays on top with plugin updates.
  • Te dashboard is very informative when you figure out how to navigate around it and tweaked to your organization needs.
  • Correlation of events is probably my favorite as I normally only need to jump on the AlienVault dashboard to hammer down on network traffic/activity details.
  • At times I do find navigating the dashboard for very specific functions to be difficult.
  • For entry level security analysts or administrators I feel can get overwhelmed with the amount of data available from a single platform (in a good way)
  • helpful to understand Linux for certain tasks
April 05, 2018

Excellent USM

Score 9 out of 10
Vetted Review
Verified User
Incentivized
  • It is easy to understand and use
  • AlienVault USM is a product that works well for companies that do not have personal security insurance
  • The system processes them in real time, correlates events and alerts
  • The best thing about AlienVault USM is that it has all the tools in one place, vulnerability scanner, netflow, hides ..
  • Unable to obtain information sometimes
  • The limitation of reports
Score 10 out of 10
Vetted Review
ResellerIncentivized
  • Ease of Initial Installation
  • Range of products covered
  • Cloud Alert Console
  • Relevancy of Data/Alerting
  • Adding additional plugins and applications can be difficult
  • Extensive customization required to clear out white noise
March 27, 2018

AlienVault USM Review

Karl Spaeth | TrustRadius Reviewer
Score 7 out of 10
Vetted Review
ResellerIncentivized
  • Threat detection. AlienVault uses respected open source tools to detect threats.
  • Threat intelligence. AlienVault constantly updates their threat intelligence feeds so they are never out of date.
  • Complete visibility. AlienVault helps monitor the main 5 areas of security visibility.
  • User interface can be very buggy and difficult to use.
  • Many features seem unrefined as if they were implemented to be functioning good enough to use but are not fully tested or refined.
  • Reporting is very underwhelming. They are not very configurable in terms of useful data and the design can be difficult to look at.
March 27, 2018

AlienVault USM Review

Score 8 out of 10
Vetted Review
ResellerIncentivized
  • SIEM
  • Easy to navigate UI
  • Training classes to get you up to speed fast on the product
  • Value "progress over perfection" seen very prominently in bugs while using the software
  • Training classes do not properly prepare for the ASCE exam that is recommended for MSSPs to take
  • Technical questions about deployment in a distributed environment not easily available. Normally have to schedule technical calls that can take a week to resolve.
Score 8 out of 10
Vetted Review
Verified User
Incentivized
  • The SIEM does a good job of correlating network data from multiple sources along with the Data from deployed HIDS
  • The Nmap scan is fast and non-invasive that defines devices on your network.
  • The vulnerability scanning has several options and reports to enable data to be available for compliance purposes.
  • Walking through all the devices after a Nmap or device discovery scan can be tedious to get the data correct
  • When deploying HIDS, it would be better if the system gave more detail as to the deployment error
  • Offline updating of licenses can be a little time-consuming
March 23, 2018

AlienVault Review

Score 8 out of 10
Vetted Review
Verified User
Incentivized
  • Log Correlation - continuously growing list of correlation rules to catch network and security concerns.
  • Log searching - quick sorting / searching through all of our security events.
  • HIDS - It is nice to be able to track multiple specific metrics or logs against servers using the HIDS agent.
  • Difficult to configure.
  • They include training when you purchase AlienVault - which I feel is necessary. The downside is the training is really split between implementation and use, where the value for end users is really just use. Staff probably need this training to get most out of implementation.
Kevin White | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
ResellerIncentivized
  • Provides a simple, customizable dashboard to easily see the most important things going on in your environment.
  • Goes beyond traditional SIEM by providing things like File Integrity Monitoring, IDS and Asset Management.
  • Very simple integration with common cloud services (AlienVault USM Anywhere only).
  • From a volume perspective, if you have a ton of log data, it isn't the best tool for traditional SIEM activities.
  • There is no migration from USM Appliance to USM Anywhere. You basically have to start over if you move some things to the cloud and want to capture that information.
Ivan Montilla Miralles | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
ResellerIncentivized
  • Compliance: For each compliance aspect in each standard, there's an AlienVault USM feature which helps compliance. For instance, in PCI DSS Compliance you require File Integrity Monitoring, and AlienVault USM has it. Every component of the standard gets covered by the product.
  • Data handling: Event management can become cumbersome if not well handled. AlienVault USM classifies event information properly where it belongs to the data it's useful to you. When you export a report, you can filter out easily what you don't need, so you only extract valuable information.
  • Asset availability: It is really handy to cover every aspect of your asset classification, events to come in, services each asset has, location, all of the information really helps to draw alarms properly.
  • Vulnerability Scanner reporting: The reporting from the integrated scanner (OpenVAS) are really difficult to read. They could have done a better job by scraping the report or creating a custom report from the data of the scan. However, leaving the default report template from OpenVAS makes the report somewhat useless.
  • Sometimes the local integration fails because of the scope of the tool. Let me elaborate on that: The OpenVAS scanner has certificated that expire within a year, and that makes the USM fail scans if you don't renew certificates yourself. They should have made them last at least 10 years. Same with Nagios, sometimes the integration fails and one doesn't know why unless you jailbreak it and find out in the logs for sure.
  • They do not provide a standalone installation of the product, because they modified so much the Linux distribution, that it must always be deployed as a virtual machine or appliance, but not on your own server.
Christian B. Caldarone | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
  • AlienVault USM is based on well-known Open Source components, which each for itself, represents a quasi industry standard
  • Integration into the existing infrastructure works like a charm. Basically you just need to roll-out an OSSEC client to each server or PC and you have already a pretty high coverage of security information and events. They immediately show up in the AlienVault Webinterface
  • Due to the countless plugins, it is very easy to add network devices like firewalls, router, switches, but also servers running apache and the alike. You will just need to forward syslog and it will all appear in your AlienVault Webinterface
  • The modular design of AlienVault USM in form of "deployable sensors", allows you to easily integrate different network segments, such as remote sites.
  • As regular vulnerability scans are a must to understand which CVEs your infrastructure is exposed at, this becomes an easy task with AlienVault. They provide you with a set-and-forget approach for running regular scans. Additionally there are helpful hints to how to get more secure.
  • Because AlienVault USM combines several well know components, you have to life with the fact, that they are not in their latest version, i.e. the integrated OSSEC, which should be replaced with the OSSEC-Wazuh fork instead.
  • Due to the all-in-one approach, the solution is quite resource hungry. You have to have a decent machine to run it.
  • The reporting module is nice, but sometimes it is quite a challenge to configure a custom report as you will only get the results you want after a trial and error run.
January 18, 2018

AlienVault USM

Score 8 out of 10
Vetted Review
Verified User
  • Shows all issues, vulnerabilities and attack on servers.
  • More customized dashboard view.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
  • Alerts are emailed to us for many types of configurable concerns. Such as intrusion attempts.
  • Network traffic can be monitored for PII that may be transferred across the network or off-site that is not authorized or that is sent unencrypted properly.
  • Key systems can be monitored for malware, intrusions, and network traffic.
  • The menu structure could be broken down by categories that make it easier to locate sub-menus.
December 28, 2017

Aliens to the rescue!

Farakh Hussain, CISSP, CISM, CEH, ISO LA, MCSA | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
  • Log correlation is excellent and on par with other more expensive solutions.
  • Ease of use is a big plus.
  • Initial setup was simple and quick.
  • The OTX threat intelligence is a great complement to our other threat intelligence feeds to ensure we have as many 'eyes' out there informing us of all the potentially malicious threat actors out there.
  • There are a couple of things that can only be done through the CLI and unless you're familiar with the CLI, there may be a large learning curve for some.
  • The vulnerability scanner lacks a number of advanced features that other solutions have which make it simpler and more efficient to manage.
  • Plugins are limited (although they are adding more as time goes on). If you need a plugin that is not available you will need to create one on your own which requires modification of a number of files and can be daunting for someone new to the platform.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
  • Alerting on correlated events - this has allowed us to capture malware ahead of time.
  • Ease of device logging - once the logs are sent through, the data is available instantly.
  • Actively reviewing and responding to vulnerabilities through an easy to use interface and schedule task format.
  • More functionality pushed through the web interface would be useful.
  • Asset management can be a little restricted when applying changes across a rule set.
Return to navigation