As soon as AlienVault USM™ is installed within your network, it starts collecting data. Moments later, you’ll start to see essential information about devices, applications, user activity, and network traffic. Most customers can begin to identify policy violations and potential threats within just a few minutes after the installation is complete.
AlienVault’s USM is composed of a modular, scalable, three-tier architecture. There are three core components: Sensor, Server, and Logger. You can deploy them as stand-alone products or integrated in an All-in-One device. These core components provide the real-time threat detection, event correlation, and security intelligence to stay ahead of the threat – and your auditor.
Deployed throughout your network to collect logs and provide the five essential security capabilities you need for complete visibility.
Aggregates and correlates information gathered by the Sensors, and provides single pane-of-glass management, reporting and administration.
Securely archives raw event log data for forensic investigations and compliance mandates.
Combines the Sensors, Server, and Logger components into a single system.
In addition to the built-in, essential security controls within the AlienVault USM platform, there are also hundreds of plugins available for you to integrate data from your existing devices and applications. We partner with leading security and networking vendors to extend the effectiveness of your USM platform to detect, prioritize, and respond to threats.
The AlienVault USM plugin library provides source-optimized data collection for a complete range of products, from network and security devices to databases and enterprise applications.
Click here to see the most recent list of plugins for the USM platform. The list is growing weekly, so if you don’t see your device on the list, read the Plugin Request KB Article and see how to request yours, now!
Virtual Machine Requirements
Compressed / Uncompressed
6.0 / 1.2