How it Works

Unified Security Management™:
Complete, Simple, & Affordable

AlienVault’s Unified Security Management™ (USM) platform provides a way for organizations with limited security staff and budget to address complex compliance and threat management needs. With all of the essential security controls built-in, and continuous threat intelligence updates from AlienVault Labs, USM provides unparalleled security visibility.

Awareness and visibility within minutes

As soon as AlienVault USM™ is installed within your network, it starts collecting data. Moments later, you’ll start to see essential information about devices, applications, user activity, and network traffic. Most customers can begin to identify policy violations and potential threats within just a few minutes after the installation is complete.

AlienVault’s USM is composed of a modular, scalable, three-tier architecture. There are three core components: Sensor, Server, and Logger. You can deploy them as stand-alone products or integrated in an All-in-One device. These core components provide the real-time threat detection, event correlation, and security intelligence to stay ahead of the threat – and your auditor.

Sensors

Sensors

Deployed throughout your network to collect logs and provide the five essential security capabilities you need for complete visibility.
Learn More >

Server

Server

Aggregates and correlates information gathered by the Sensors, and provides single pane-of-glass management, reporting and administration.
Learn More >

Logger

Logger

Securely archives raw event log data for forensic investigations and compliance mandates.
Learn More >

All-in-One

All-in-One

Combines the Sensors, Server, and Logger components into a single system.

Step One: Connect to the Network

So USM can see the traffic and learn about your environment

Step Two: Scan Your Network

So USM can find devices, services, and vulnerabilities

Step Three: Monitor Servers & Networks

So USM can detect known threats and malicious behavior

Step Four: Collect Logs

So USM can capture behavioral baselines and spot anomalies

Step Five: Analyze & Respond

So you can contain threats and investigate incidents

Integrate Data Source Plugins for Existing
Devices and Applications

In addition to the built-in, essential security controls within the AlienVault USM platform, there are also hundreds of plugins available for you to integrate data from your existing devices and applications. We partner with leading security and networking vendors to extend the effectiveness of your USM platform to detect, prioritize, and respond to threats.

The AlienVault USM plugin library provides source-optimized data collection for a complete range of products, from network and security devices to databases and enterprise applications.

Click here to see the most recent list of plugins for the USM platform. The list is growing weekly, so if you don’t see your device on the list, read the Plugin Request KB Article and see how to request yours, now!

See All Technology Partners >

Explore Our Deployment Options

   

Virtual Machine Requirements

USM All-in-One

USM Standard

All Models

Remote Sensor

Server

Logger

Sensor

      
      
      
      
Total Cores
8
4
8
RAM (GB)
16
8
24
Storage (TB)
Compressed / Uncompressed
5.0 / 1.0
6.0 / 1.2
9.0 / 1.8
6.0 / 1.2
Virtualization Environment
VMware ESXi4.0+
VMware ESXi4.0+
Get Price Free Trial Chat