MSSP Review
October 04, 2021

MSSP Review

Anonymous | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User

Software Version

USM Anywhere (SaaS)

Overall Satisfaction with AlienVault USM

AlienVault offers a different experience as opposed to other SIEM tools where it can be set up and configured properly in a shorter amount of time. The built-in correlation rules are of great quality with little-to-no setup required to switch on. Asset management and scanning is a great feature to keep on top of the list of assets to monitor, as well as dynamic and static asset lists. OTX is one of the best features to implement directly into USM Anywhere, with up-to-date threat intelligence as well as pulses to subscribe to.
  • Threat intelligence look-ups
  • Asset management
  • Vulnerability scanning
  • Better UI/workflow for alarms
  • Better alarm management (add notes/set status)
  • OTX threat intelligence
  • Asset management
  • Asset scanning
  • Compliance
  • Threat detection
  • Easy asset management
  • Save on vulnerability scanning
I have used Splunk and QRadar which are quite manual and resource-intensive to get set up. On the other hand, AlienVault USM seems to have everything you need out of the box to get set up.

Do you think AlienVault USM delivers good value for the price?

Yes

Are you happy with AlienVault USM's feature set?

Yes

Did AlienVault USM live up to sales and marketing promises?

Yes

Did implementation of AlienVault USM go as expected?

Yes

Would you buy AlienVault USM again?

Yes

AlienVault is a great all-in-one SIEM appliance to apply to both small and large-scale environments. Asset management and vulnerability scanning as built-in features are useful tools to keep on top of asset management. OTX threat intelligence is a highly valuable feature to correlate with threat alarms, providing up-to-date threat intel.

AlienVault USM Feature Ratings

Centralized event and log data collection
7
Correlation
8
Event and log normalization/management
6
Deployment flexibility
5
Integration with Identity and Access Management Tools
6
Custom dashboards and workspaces
5
Host and network-based intrusion detection
5