Interactive Demo

Watch 3-minute video tour

Simplify GLBA Compliance

AlienVault Unified Security Management (USM) provides a fast, cost-effective way for teams with limited security staff and budget to meet their GLBA compliance needs.

See below how AlienVault USM helps you cover key GLBA requirements, or download the GLBA Compliance Solution Brief.

Unify your defenses and simplify GLBA compliance.

Banks, credit unions, and other financial services firms have a legal obligation to protect consumer information. The Gramm-Leach-Bliley Act (GLBA) of 1999 outlines these specific responsibilities in the interest of consumer privacy. These requirements mandate that US-based financial institutions create an information security program to:

  • Ensure the security and confidentiality of customer information;
  • Protect against any anticipated threats or hazards to the security or integrity of such information; and
  • Protect against unauthorized access to or use of customer information that could result in substantial harm or inconvenience to any customer.

The Federal Financial Institutions Examination Council (FFIEC) supports this mission by providing extensive, evolving guidelines for compliance. The FFIEC IT handbook outlines these specific requirements, and we’ve mapped these against AlienVault’s Unified Security Management capabilities.

Achieving compliance with GLBA is far from trivial. It requires implementing essential security controls for asset configuration, vulnerability assessment, threat detection, behavioral monitoring and log management. And that’s not all. IT staff then needs to monitor these controls and correlate the data being produced by them - across the entire network, in real-time. Traditional security products only perform one or two of these functions, leaving the security analyst left with figuring out how to make these disparate tools work together to provide a single, unified view into the security posture.

AlienVault’s Unified Security Management (USM) platform provides an alternative. One that delivers a fast and cost-effective way for financial services firms with limited security staff and budget to address their GLBA compliance needs. Leveraging field-proven open source technologies, AlienVault USM provides users with an automated offering for Asset Discovery, Vulnerability Assessment, Behavioral Monitoring, Threat Detection and Security Intelligence & Event Correlation. With all of the essential security controls built-in, AlienVault USM puts complete security visibility within fast and easy reach of smaller security teams who need to do more with less.

GLBA Requirement AlienVault USM Capabilities Benefits of Unified Security Management
Security Process
  • Asset Discovery and Inventory
  • Vulnerability Assessment
  • Network Intrusion Detection (IDS)
  • Host-based Intrusion Detection (HIDS)
  • Wireless IDS (WIDS)
  • File Integrity Monitoring
  • Log Management
  • SIEM / event correlation
  • Executive dashboards and reports
  • Built-in asset discovery, vulnerability assessment, threat detection, behavioral monitoring, and security intelligence— provides a complete picture of your risk posture, within minutes of installation
  • Accurate and consolidated asset inventories combined with real-time vulnerability assessment data is essential for auditor reviews and assessments
  • Accelerated audit procedures because complete visibility begins as soon as you install Alienault USM™
Information Security Risk Assessment
  • Asset Discovery and Inventory
  • Vulnerability Assessment
  • Network Intrusion Detection (NIDS)
  • Host-based Intrusion Detection (HIDS)
  • Wireless IDS (WIDS)
  • File Integrity Monitoring
  • SIEM / event correlation
  • Behavioral Monitoring
  • Log Management
  • Executive dashboards and reports
  • Built-in asset discovery, vulnerability assessment, threat detection, behavioral monitoring, and security intelligence— reduces the cost and complexity of compliance
  • Unified log review and analysis, with triggered alerts for high risk systems
  • Customized, action-oriented alerts which tell you exactly what to do, rather than add to the noise
  • Dynamic threat intelligence backed by AlienVault Labs and the Open Threat Exchange (OTX™)
Information Security Strategy
  • Asset Discovery and Inventory
  • Vulnerability Assessment
  • Network Intrusion Detection (IDS)
  • Host-based Intrusion Detection (HIDS)
  • Wireless IDS (WIDS)
  • File Integrity Monitoring
  • SIEM / event correlation
  • Behavioral Monitoring
  • Log Management
  • Automatically discover all assets via built-in asset discovery—highlight high value assets based on available services, configuration and traffic generated
  • Validate effectiveness of layered controls through built-in essential security such as asset discovery, vulnerability assessment, file integrity monitoring, IDS, log management and more
  • Monitor changes to critical files with built-in File Integrity Monitoring
  • Securely store raw event log data for investigation and forensic analysis
Security Controls Implementation – Access Control
  • Asset Discovery and Inventory
  • Vulnerability Assessment
  • Network Intrusion Detection (IDS)
  • Host-based Intrusion Detection (HIDS)
  • Wireless IDS (WIDS)
  • File Integrity Monitoring
  • SIEM / event correlation
  • Behavioral Monitoring
  • Built-in, automated vulnerability assessment identifies the use of weak and default passwords
  • Built-in host-based intrusion detection (HIDS) and File Integrity Monitoring will signal when password files and other critical system files have been modified
  • Unified security intelligence connects critical, yet related events across systems such as a password change followed by exfiltration of data from the same device
  • Built-in network flow analysis monitors network traffic and protocols to identify anomalous activity and policy violations
Security Controls Implementation – Physical and Environmental Protection
  • Asset Discovery and Inventory
  • Log Management
  • Wireless IDS (WIDS)
  • SIEM / event correlation
  • Built-in and automated asset discovery will identify all IP-enabled physical security systems (keycard / proximity card devices)
  • AlienVault’s Logger will record all physical security access events logged by proximity card systems for correlation with other logical systems (access to servers in data center)
  • Built-in wireless IDS will identify unauthorized access attempts to wireless access points at each physical location (offices, data centers, etc.)
Security Controls Implementation – Encryption
  • Host-based Intrusion Detection (HIDS)
  • File Integrity Monitoring
  • Behavioral Monitoring / Netflow analysis
  • SIEM / event correlation
  • Built-in host-based IDS enforces server security policies including encryption for critical system files and sensitive data
  • File Integrity Monitoring monitors any changes to critical files including decryption and re-encryption
  • Unified netflow analysis and event correlation monitors traffic and issues alerts on unencrypted traffic to/from sensitive data resources
  • AlienVault’s USM™ will detect and alert when encryption or decryption procedures are not implemented correctly
Security Controls Implementation – Malicious Code Prevention
  • Asset Discovery and Inventory
  • Vulnerability Assessment
  • Network Intrusion Detection (IDS)
  • Host-based Intrusion Detection (HIDS)
  • Wireless IDS
  • File Integrity Monitoring
  • SIEM / event correlation
  • Behavioral Monitoring
  • Log Management
  • Situational Awareness
  • Built-in vulnerability assessment discovers hosts and applications that may be vulnerable to malware and other exploits
  • Built-in threat detection (IDS, HIDS, and Wireless IDS) detects and alerts on potential infections and exposures
  • File Integrity Monitoring alerts on changes to critical files which could signal malicious intent or malware infection
  • Unified essential security delivers the security intelligence required to respond to and contain malware outbreaks
Security Controls Implementation – Systems Development, Acquisition and Maintenance
  • Asset Discovery & Inventory
  • Vulnerability Assessment
  • Host-based Intrusion Detection (HIDS)
  • File Integrity Monitoring
  • Automated asset discovery provides a complete and dynamic asset inventory—critical for identifying all operational software including systems in development
  • Built-in vulnerability assessment identifies which systems require patches, updated software or re-configuration.
  • Host-based IDS and file integrity monitoring identify and alert on changes to critical software
Security Controls Implementation – Personnel Security
  • Asset Discovery & Inventory
  • Log Management
  • Behavioral Monitoring
  • SIEM / event correlation
  • Built-in asset discovery and inventory provides granular details on device configuration, installed software, and ownership details to track users with associated devices
  • Log management provides secure storage of raw event log data for detailed audit trails of user activity
  • Built-in behavioral monitoring identifies suspicious user activity and alerts on policy violations and potential insider threats
Security Controls Implementation – Data Security
  • Asset Discovery & Inventory
  • Vulnerability Assessment
  • Network Intrusion Detection (IDS)
  • Host-based Intrusion Detection (HIDS)
  • Log Management
  • File Integrity Monitoring
  • SIEM / event correlation
  • AlienVault USM provides continuous capture and real-time monitoring of a broad range of data, including: events/ logs; configuration data; asset data; vulnerability data; and network flow data
  • Built-in host-based IDS can be implemented on systems with highly sensitive data to ensure data integrity, availability and confidentiality
  • File Integrity Monitoring alerts on changes to critical files which could signal a threat
  • Built-in threat detection, behavioral monitoring and event correlation signals information leakage and other attacks in progress—for example, unauthorized access followed by additional security exposures such as sensitive data exfiltration
  • Centralized, role-based access control for audit trails and event logs preserves “chain-of-custody” for data forensics and investigations
Security Monitoring – Activity Monitoring
  • Network Intrusion Detection (IDS)
  • Host-based Intrusion Detection (HIDS)
  • File Integrity Monitoring
  • Log Management
  • SIEM / event correlation
  • Built-in HIDS will alert on policy violations such as attempted use of external storage media on critical systems (e.g. USB drives)
  • Built-in File Integrity Monitoring captures anomalous changes to critical files
  • Event correlation rules provide the situational awareness needed to identify potential data exfiltration
Security Monitoring – Condition Monitoring
  • Asset Discovery & Inventory
  • Vulnerability Assessment
  • Service Availability Monitoring
  • Built-in asset discovery provides dynamic inventory of all devices on the network and all software installed
  • Continuous vulnerability monitoring identifies all vulnerabilities targeting critical systems, servers, applications and network devices
  • Built-in service availability monitoring detects critical service interruptions that could signal a threat
Security Monitoring – Analysis and Response
  • Asset Discovery & Inventory
  • Vulnerability Assessment
  • Network Intrusion Detection (NIDS)
  • Host-based Intrusion Detection (HIDS)
  • Wireless IDS
  • File Integrity Monitoring
  • SIEM / event correlation
  • Behavioral Monitoring
  • Log Management
  • Dynamic Incident Response Templates
  • Built-in asset discovery, vulnerability assessment, threat detection, behavioral monitoring, and security intelligence— accelerates the incident response process
  • Unified log review and analysis, with triggered alerts for high risk systems
  • Customized, action-oriented alerts which tell you exactly what to do next when responding to incidents
  • Integrated threat data backed by AlienVault Labs and the Open Threat Exchange (OTX™)
Security Process Monitoring and Updating
  • Asset Discovery & Inventory
  • Vulnerability Assessment
  • Network Intrusion Detection (NIDS)
  • Host-based Intrusion Detection (HIDS)
  • Wireless IDS
  • File Integrity Monitoring
  • SIEM / event correlation
  • Behavioral Monitoring
  • Log Management
  • Executive dashboards and reports
  • Built-in asset discovery provides dynamic inventory of all devices on the network and all software installed
  • Continuous vulnerability monitoring identifies all vulnerabilities targeting critical systems, servers, applications and network devices
  • Unified security management enables continuous monitoring and process improvement through alerts, assessments, executive dashboards and reports

Next Steps

Test Drive

Free Trial

Download your free 30-day trial
Live Demo

Live Demo

Request a live demo and get your questions answered
Learn More

Learn More

Learn more about AlienVault Unified Security Management
Contact Us

Contact Us

1.855.425.4367
sales@alienvault.com