Great system to meet FINRA's Cyber Security Requirements
Updated November 02, 2017

Great system to meet FINRA's Cyber Security Requirements

Mikhail Suleymanov | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User

Software Version

USM Anywhere (SaaS)

Overall Satisfaction with AlienVault USM

We use AlienVault to be in compliance with FINRA's cyber security regulations. We monitor our traffic, our users logins, and systems to make sure we don't have any unauthorized entries. It is used by our IT Dept primarily, periodically compliance logs in as well. It is a great system and I am happy we went with AlienVault for our cyber security needs.
  • It has great reports that are able to be generated
  • A lot of functionality
  • The intrusion and detection system is particularly useful for us
  • It is not easy to use for non IT professionals
  • The set up process is very tedious and difficult
I have not used any other cyber security software to compare to alienvault.
It is great for individuals and institutions in the financial space especially broker dealers. It is a great way to satisfy FINRA's cyber security regulations and be compliant with them.

Using AlienVault USM

2 - Our IT department, particularly our cyber security manager uses alienvault.
2 - Individuals that use alien vault or want to use alien vault must posses IT skills and networking knowledge. A technical background is needed to setup and use the software. That particularly becomes useful when things need to be resolved or troubleshooted.
  • Meet FINRA Cybersecurity Regulations
  • Network activity monitoring
  • Intrusion detection
  • We use alienvault as we were trained by the alienvault team
  • Alienvault is particularly useful when we need to monitor user access and break in attempts.
It is a very well built software and solution for meeting our cybersecurity needs. The staff is always very well responsive with any issues that we have and it is perfect for satisfying FINRA's cybersecurity regulations.

Evaluating AlienVault USM and Competitors

  • Price
  • Product Features
  • Product Usability
  • Product Reputation
  • Third-party Reviews
Product features and usability were the most important factors when we were making the decision. Features differentiate products in the same class as alienvault.
There is nothing I would change with our selection process as we are fully satisfied with the decision we made. We did a demo of the software which I believe is the single most important thing that must be done when selecting any kind of provider.

AlienVault USM Implementation

It required us to make a lot of changes and use a decent amount of manpower in order to implement the software.
Change management was minimal
  • It had a lot of steps involved that had to do with dealing with our server and data providers
  • Involved a lot of man power to get it fully functional.

AlienVault USM Support

I have not had a single issue with the alienvault support staff. Any issue or question that we had, especially in the beginning during the installation phase the support staff was readily available via phone and email to help us. I am very happy with the decision we made to go with alienvault.
ProsCons
Quick Resolution
Good followup
Knowledgeable team
Problems get solved
Kept well informed
No escalation required
Immediate help available
Support understands my problem
Support cares about my success
Quick Initial Response
None
No - We do not need it at this time as we have a experienced IT person in house to help us with any issues that may arise with alienvault.
We had an issue with our intrusion detection system and the support staff identified the issue and suggested a solution on how to resolve it. He even went above and beyond and offered to do a screen share to guide us through what to do on our alienvault platform.

Using AlienVault USM

The system is great in turns of functionality but in terms of being user friendly and usability for the average person it is very hard to understand and wil take a lot of training.
ProsCons
Like to use
Relatively simple
Easy to use
Well integrated
Consistent
Convenient
Requires technical support
Slow to learn
Feel nervous using
Lots to learn
  • The compliance reports are easy to use.
  • The threat detection system results is easy to understand.
  • The setup process was difficult
  • When a vulnerability is found, it is difficult to understand what it is.