Ease the assessment of threats and vulnerabilities with AlienVault USM.
July 12, 2019

Ease the assessment of threats and vulnerabilities with AlienVault USM.

Anonymous | TrustRadius Reviewer
Score 7 out of 10
Vetted Review
Verified User

Software Version

USM Anywhere (SaaS)

Overall Satisfaction with AlienVault USM

We use AlienVault USM across our whole organisation. We monitor network traffic and asset vulnerabilities in both our company network and on multiple public cloud provider accounts. We're also tracking Office365 usage. Moreover, several logs (audit, web servers, etc.) are forwarded via syslog to the sensors allowing us to detect attacks.
  • Vulnerability scans on several different OS.
  • Intrusion/Attack detection.
  • No customisable patterns for log analysis.
  • Not friendly with autoscaling resources with no possibility to have auto-deletion of assets no more present after a certain amount of time.
I've tried OpenVAS. I've found AlienVault USM to have better usability and to be more up to date with the asset scan vulnerability database.
It's quite appropriate for scanning and detecting possible attacks via logs/events. Also, it's good for vulnerabilities analysis. It's not suited for docker container vulnerability scans as there is no easy way to do that. For that scenario, it is currently better to use offline scanning of the docker images.