Identify Bash Vulnerabilities and Detect Active Attacks

Deploy AlienVault Unified Security Management™ (USM) and in less than one hour, you can:

  • Discover and inventory your network assets automatically
  • Scan for thousands of vulnerabilities, including Bash
  • Detect attacks and activity with known malicious hosts
  • Prioritize risks with correlated vulnerability and threat data

Download a Free Trial

See how you can use USM to identify vulnerable network assets and attacks against them.

How AlienVault USM™ Detects Bash Vulnerabilities and Active Attacks

Continuous, up-to-date threat intelligence provide by
AlienVault Labs and delivered to USM

Vulnerability Assessment

Scans assets for vulnerabilities, including Bash and enables continuous monitoring with unlimited scans.

Threat Detection

Includes IDS signatures to detect attackers attempting to exploit the Bash vulnerability.

Security Intelligence

Includes new correlation rules for Bash to alarm you of attempted and successful attacks on vulnerable systems.

The Unified Security Management™ Difference

5 Essential Security Capabilities in a Single Console

The AlienVault Unified Security Management™ (USM) platform provides five essential security capabilities in a single console, giving you everything you need to manage both compliance and threats. Understanding the sensitive nature of IT environments, we include active, passive and host-based technologies so that you can match the requirements of your particular environment.

Asset Discovery

  • Active Network Scanning
  • Passive Network Monitoring
  • Asset Inventory
  • Host-based Software Inventory

Asset Discovery

Vulnerability Assessment

  • Network Vulnerability Testing
  • Continuous Vulnerability Monitoring

Vulnerability Assessment

Threat Detection

  • Network IDS
  • Host IDS
  • Wireless IDS
  • File Integrity Monitoring

Threat Detection

Behavioral Monitoring

  • Log Collection
  • Netflow Analysis
  • Service Availability Monitoring
  • Full packet capture

Behavioral Monitoring

Security Intelligence

  • SIEM Correlation
  • Incident Response
  • Reporting and Alarms

Security Intelligence

Download a Free Trial

Take a Product Tour.

Each alarm provides detailed and customized instructions on how to respond and investigate.
Executive dashboards provide overviews and click-through details about your security and compliance posture.
All you need to know about an asset for incident response and investigations – in one window.
Automated asset discovery provides granular details on all discovered devices in your network.
Targeted guidance eliminates the guesswork associated with integrating data sources and provides precise suggestions for improving visibility.
Built-in network flow analysis provides all the data you need for in-depth investigations – including full packet capture.
Secure storage of raw event data satisfies regulatory compliance requirements while an easy-to-use interface allows for quick searches.
Identify malicious actors attempting to interact with your network using our dynamic IP reputation data.
Real-time security intelligence identifies attackers and their methods for effective incident response.
Centralized, integrated "how to" documentation for all you need to know about USM.
Built-in network IDS, host-based IDS, and wireless IDS results in more accurate event correlation, faster deployment and simpler management.
Built-in vulnerability assessment simplifies security monitoring and speeds remediation.

Watch a Demo ›
GET PRICE FREE TRIAL