Empowering Security Zenith with Unified Vigilance.
June 03, 2023

Empowering Security Zenith with Unified Vigilance.

Anonymous | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User

Software Version

USM Anywhere (SaaS)

Overall Satisfaction with AlienVault USM

As an IT researcher at a university, we use AlienVault USM for centralized security monitoring, threat detection, incident response, compliance reporting, and vulnerability assessment to enhance our security posture. The scope includes network infrastructure, servers, and critical systems.
  • Unified Security Monitoring and Threat Detection.
  • Integrated Incident Response.
  • Compliance Management and Reporting.
  • User Interface and Ease of Use.
  • Customization and Flexibility.
  • Enhanced Automation and Orchestration.
  • Unified Security Monitoring.
  • Incident Response and Forensics.
  • Vulnerability Assessment.
  • Improved Threat Detection and Incident Response.
  • Streamlined Security Operations.
  • Enhanced Compliance & Audit Readiness.

Do you think AlienVault USM delivers good value for the price?

Yes

Are you happy with AlienVault USM's feature set?

Yes

Did AlienVault USM live up to sales and marketing promises?

I wasn't involved with the selection/purchase process

Did implementation of AlienVault USM go as expected?

Yes

Would you buy AlienVault USM again?

Yes

AlienVault USM is well-suited for scenarios such as small to medium-sized businesses (SMBs) with limited resources, compliance-driven environments, and organizations with dedicated Security Operations Centers (SOCs). It simplifies security operations for SMBs, aids in compliance monitoring and reporting, and streamlines activities for security teams in SOCs.However, there are scenarios where AlienVault USM may be less appropriate. These include large enterprises with complex environments that require more specialized and scalable solutions, organizations with extensive existing security infrastructure, and highly customized environments where out-of-the-box capabilities may not align perfectly with unique requirements.

AlienVault USM Feature Ratings

Centralized event and log data collection
8
Correlation
8
Event and log normalization/management
7
Deployment flexibility
8
Integration with Identity and Access Management Tools
7
Custom dashboards and workspaces
7
Host and network-based intrusion detection
7