How it Works

Unified Security Management:
Complete, Simple, & Affordable

AlienVault’s Unified Security Management™ (USM) platform provides a way for organizations with limited security staff and budget to address complex compliance and threat management needs. With all of the essential security controls built-in, and continuous threat intelligence updates from AlienVault Labs, USM provides unparalleled security visibility.

Awareness and visibility within minutes.

As soon as AlienVault USM™ is installed within your network, it starts collecting data. Moments later, you’ll start to see essential information about devices, applications, user activity, and network traffic. Most customers can begin to identify policy violations and potential threats within just a few minutes after the installation is complete.

AlienVault’s USM is composed of a modular, scalable, three-tier architecture. There are  three core components: Sensor, Server, and Logger. You can deploy them as stand-alone products or integrated in an All-in-One device. These core components provide the real-time threat detection, event correlation, and security intelligence to stay ahead of the threat – and your auditor.

Sensors

Sensors

Deployed throughout your network to collect logs and provide the five essential security capabilities you need for complete visibility.
Learn More >

Server

Server

Aggregates and correlates information gathered by the Sensors, and provides single pane-of-glass management, reporting and administration.
Learn More >

Logger

Logger

Securely archives raw event log data for forensic investigations and compliance mandates.
Learn More >

All-in-One

All-in-One

Combines the Server, Sensor, and Logger components into a single system.

Step One: Connect to the Network

So USM can see the traffic and learn about your environment

Step Two: Scan Your Network

So USM can find devices, services, and vulnerabilities

Step Three: Monitor Servers & Networks

So USM can detect known threats and malicious behavior

Step Four: Collect Logs

So USM can capture behavioral baselines and spot anomalies

Step Five: Analyze & Respond

So you can contain threats and investigate incidents

Explore Our Deployment Options.

     

Virtual Machine Requirements

USM All-in-One

USM Standard

All Models

Remote Sensor

Server

Logger

Sensor

           
           
           
           
Total Cores
8
4
8
RAM (GB)
16
8
24
Storage (TB)
Compressed / Uncompressed
5.0 / 1.0
6.0 / 1.2
9.0 / 1.8
6.0 / 1.2
Virtualization Environment
VMware ESXi4.0+
VMware ESXi4.0+
Free Trial Demo Get Price ChatNeed help?