Identify Bash Vulnerabilities and Detect Active Attacks
Deploy AlienVault Unified Security Management™ (USM) and in less than one hour, you can:
See how you can use USM to identify vulnerable network assets and attacks against them.
Scans assets for vulnerabilities, including Bash and enables continuous monitoring with unlimited scans.
Includes IDS signatures to detect attackers attempting to exploit the Bash vulnerability.
Includes new correlation rules for Bash to alarm you of attempted and successful attacks on vulnerable systems.
The AlienVault Unified Security Management™ (USM) platform provides five essential security capabilities in a single console, giving you everything you need to manage both compliance and threats. Understanding the sensitive nature of IT environments, we include active, passive and host-based technologies so that you can match the requirements of your particular environment.