Featured White Paper

Vulnerability Management: Think Like an Attacker

Our security experts give you the attacker's perspective so you can more effectively identify, prioritize, and manage vulnerabilities in your environment.
Get the Guide Now
Stop Malware in its Tracks

How to Use Crowd-Sourced Threat Intelligence

Learn how you can use Open Threat Exchange (OTX) to stop malware in its tracks, as well as best practices to investigate and mitigate threats.
Watch Now
The One-Man SOC

Habits of Highly Effective Security Practitioners

Get expert advice on daily routines to more efficiently manage your environment, prioritize tasks, investigate incidents, and respond when the inevitable occurs.
Watch Now
Featured White Paper

2014 Magic Quadrant for SIEM

Access the report for Gartner's complete analysis of each SIEM vendor with strengths, cautions, ratings, and more.
Get the Report Now
Featured Webcast

How to Detect System Compromise & Data Exfiltration

Learn how bad guys get control of a system and see a real-world example of how to catch, analyze, and stop an attack in its tracks.
Watch Now
Featured Webcast

SANS Ask the Expert: An Incident Response Playbook

Improve your incident response playbook with expert advice on monitoring, security operations, and response strategies for the most common types of incidents.
Watch Now
PCI DSS 3.0 Deadline Approaches

Simplify and Accelerate PCI DSS Compliance with AlienVault USM

Version 3.0 goes into effect in the new year. Learn what you need to know about PCI DSS and how to simplify compliance with a unified approach to security.
Watch It Now
Featured Webcast

How to Detect SQL Injection & XSS Attacks with AlienVault

SQL injection and cross-site scripting (XSS) attacks impact thousands of web applications every year. Learn how they work and how to spot them quickly with AlienVault USM.
Watch Now

Looking for product documentation? USM Documentation | USM for AWS Documentation

Solution Brief AlienVault Unified Security Management for AWS AlienVault Unified Security Management for AWS 1418076720 59 Solution Brief AlienVault USM & FortiGate UTM: Bringing Unified Security Management to Unified Threat Management AlienVault USM & FortiGate UTM: Bringing Unified Security Management to Unified Threat Management 1414709880 62 Solution Brief Simplify Your Migration to the Public Services Network (PSN) Simplify Your Migration to the Public Services Network (PSN) 1410817320 66 Solution Brief AlienVault and Splunk: Bringing the Power of Threat Detection & Incident Response to Big Data AlienVault and Splunk: Bringing the Power of Threat Detection & Incident Response to Big Data 1410364380 51 Solution Brief Detecting CryptoLocker with AlienVault USM Detecting CryptoLocker with AlienVault USM 1402617300 78 Solution Brief Automate GLBA Compliance Automate GLBA Compliance 1367894580 158 Solution Brief Simplify NERC CIP Compliance Simplify NERC CIP Compliance 1367894040 159 Solution Brief Affordable Protective Monitoring for GPG 13 Compliance Affordable Protective Monitoring for GPG 13 Compliance 1365519720 160 Solution Brief Reduce the Cost of ISO 27002 Compliance Reduce the Cost of ISO 27002 Compliance 1365519660 100 Solution Brief The Perfect Rx for HIPAA Compliance Perfect Rx for HIPAA Compliance 1365519600 99 Solution Brief Unify Your Defenses and Accelerate PCI Compliance Unify Your Defenses and Accelerate PCI Compliance 1365519480 101 Analyst Report Security Spending and Preparedness in the Financial Sector: A SANS Survey Security Spending and Preparedness in the Financial Sector: A SANS Survey 1435076280 3 Analyst Report Cloud Security Spotlight Report: Exploring Cloud Security Issues & Solutions Cloud Security Spotlight Report: Exploring Cloud Security Issues & Solutions 1427401020 34 Analyst Report Cyber Threat Intelligence: Who’s Using it and How? Cyber Threat Intelligence: Who’s Using it and How? 1423592340 48 Analyst Report SANS 2014 Security Analytics & Intelligence Survey SANS 2014 Security Analytics & Intelligence Survey 1413228240 64 Analyst Report SANS Incident Response Survey: How to Fight Back SANS Incident Response Survey: How to Fight Back 1408050900 68 Analyst Report 2014 Magic Quadrant for SIEM 2014 Magic Quadrant for SIEM 1403884200 112 Analyst Report SANS Higher Education Survey: Balancing Accessibility with Security SANS Higher Education Survey: Balancing Accessibility with Security 1403205780 73 Data Sheet AlienVault Unified Security Management (USM) AlienVault Unified Security Management (USM) 1364512920 142 Data Sheet AlienVault Server AlienVault Server 1364512920 154 Data Sheet AlienVault Sensor AlienVault Sensor 1364512860 151 Data Sheet AlienVault Logger AlienVault Logger 1364512680 152 Data Sheet AlienVault Threat Intelligence AlienVault Threat Intelligence 1364512680 153 Data Sheet AlienVault Open Threat Exchange AlienVault Open Threat Exchange 1364512620 163 Case Study Council Rock School District Case Study Council Rock School District Case Study 1430845740 26 Case Study Crosskey Case Study Crosskey Case Study 1425937920 41 Case Study Save Mart Supermarkets Case Study Save Mart Supermarkets Case Study 1423722300 113 Case Study TrustNet Case Study TrustNet Case Study 1421083140 168 Case Study Sedara Case Study Sedara Case Study 1421082300 167 Case Study Randall & Quilter Investment Holdings Case Study Randall & Quilter Investment Holdings Case Study 1421082000 165 Case Study Florida Orthopaedic Institute Case Study Florida Orthopaedic Institute Case Study 1421081880 169 Case Study Olympic Regional Development Authority Case Study Olympic Regional Development Authority Case Study 1421081700 25 Case Study Cegeka Case Study Cegeka Case Study 1421081640 164 Case Study Afognak Case Study Afognak Case Study 1421081220 166 White Paper Approaches to AWS Intrusion Detection (IDS) Approaches to AWS Intrusion Detection (IDS) 1435075560 5 White Paper 5 Steps to Implement & Maintain PCI DSS Compliance 5 Steps to Implement & Maintain PCI DSS Compliance 1433371860 12 White Paper Remediation Steps for Threat Alerts in Spiceworks Remediation Steps for Threat Alerts in Spiceworks 1432850280 13 White Paper Practical Threat Management for Educational Institutions Practical Threat Management for Educational Institutions 1432044960 17 White Paper Practical Threat Management for Healthcare Organizations Practical Threat Management for Healthcare Organizations 1432044240 18 White Paper Practical Threat Management for Government Entities Practical Threat Management for Government Entities 1431984540 19 White Paper Ethics, Security and Getting the Job Done Ethics, Security and Getting the Job Done 1431522000 21 White Paper Beginner’s Guide to Open Source Intrusion Detection Tools Beginner’s Guide to Open Source Intrusion Detection Tools 1426220940 40 White Paper OSSIM vs USM: A Comparison of Open Source vs Commercial OSSIM vs USM: A Comparison of Open Source vs Commercial 1424455320 46 White Paper Don’t Panic! 6 Steps to Surviving your First Breach Don’t Panic! 6 Steps to Surviving your First Breach 1423173240 43 White Paper Best Practices for AWS Security Best Practices for AWS Security 1421793600 57 White Paper Unified Security Management vs. SIEM: a Technical Comparison Unified Security Management vs. SIEM: a Technical Comparison 1412014200 65 White Paper Practical Threat Management & Incident Response for the SME Practical Threat Management & Incident Response for the SME 1402950780 76 White Paper Beginner’s Guide to SIEM Beginner’s Guide to SIEM 1398715200 53 White Paper Vulnerability Management: Think Like an Attacker to Prioritize Risks Vulnerability Management: Think Like an Attacker to Prioritize Risks 1398290460 81 White Paper Beginner’s Guide to Log Correlation Beginner’s Guide to Log Correlation 1398218040 82 White Paper The Value of Crowd-Sourced Threat Intelligence Value of Crowd-Sourced Threat Intelligence 1364513580 102 White Paper Practitioner’s Guide to a SOC Practitioner’s Guide to a SOC 1364513460 103 Product Review SC Magazine Review SC Magazine Review 1433187720 23 Product Review Bloor In-Depth Guide: AlienVault USM Bloor In-Depth Guide: AlienVault USM 1430162220 27 Product Review 451 Research Report: AlienVault USM - A Security Operations Center for the SMB 451 Research Report: AlienVault USM - A Security Operations Center for the SMB 1366054320 98 Infographic 6 Questions to Help You Plan for Integrating Cyber Threat Intelligence 6 Questions to Help You Plan for Integrating Cyber Threat Intelligence 1426718340 39 Infographic On the Front Lines of Incident Response On the Front Lines of Incident Response 1416323520 118 Infographic The Eternal Life of Malware Eternal Life of Malware 1365470460 161 Infographic The 2nd United Nations 2nd United Nations 1365470220 162 Video AlienVault Unified Security Management (USM) Overview AlienVault Unified Security Management (USM) Overview 1402549200 133 Video Scanning Your Assets for Vulnerabilities with AlienVault USM Scanning Your Assets for Vulnerabilities with AlienVault USM 1435015500 6 Video Using Asset Discovery in AlienVault USM Using Asset Discovery in AlienVault USM 1435015140 7 Video USM 5.0 Database Upgrade USM 5.0 Database Upgrade 1429723440 28 Video Got Milk? Got OTX 2.0? Got Milk? Got OTX 2.0? 1429116060 29 Video Spiceworks customer on integrated Threat Alerts in the Spiceworks dashboard Spiceworks customer on integrated Threat Alerts in the Spiceworks dashboard 1424459160 170 Video FortiGate and AlienVault Unified Security Management (USM) FortiGate and AlienVault Unified Security Management (USM) 1415121900 119 Video Bash and Shellshock Exploit Bash and Shellshock Exploit 1412181540 123 Video IDS Best Practices IDS Best Practices 1410212160 127 Video Alberto Yépez on the Changing Security Landscape Alberto Yépez on the Changing Security Landscape 1410207720 135 Video Barmak Meftah’s Keynote Presentation at the AGC Partners Conference Barmak Meftah’s Keynote Presentation at the AGC Partners Conference 1410207540 136 Video The Ethics and Politics of Threat Intelligence Strategies Ethics and Politics of Threat Intelligence Strategies 1410207480 134 Video Interview with MSSP partner, GoGrid Interview with MSSP partner, GoGrid 1410207360 137 Video Risk I/O on Customer Benefits of AlienVault Open Threat Exchange™ (OTX) Risk I/O on Customer Benefits of AlienVault Open Threat Exchange™ (OTX) 1410207240 128 Video Mike Rothman of Securosis Discusses Threat Detection with Jaime Blasco Mike Rothman of Securosis Discusses Threat Detection with Jaime Blasco 1410207120 139 Video Vulnerability Assessment Best Practices Vulnerability Assessment Best Practices 1409770740 129 Video The Easier, Faster Path to PCI DSS Compliance Easier, Faster Path to PCI DSS Compliance 1409160960 130 Video Attack vectors and campaigns in 2014 - SC Magazine Attack vectors and campaigns in 2014 - SC Magazine 1407938280 131 Video 2 Minutes on BrightTALK: Reactive Protection 2 Minutes on BrightTALK: Reactive Protection 1402948200 138 Video KPCB Security Salon KPCB Security Salon 1402947720 140 Video How to Detect Heartbleed Vulnerabilities & Attacks How to Detect Heartbleed Vulnerabilities & Attacks 1402549320 125 Video Let OTX tell you what known malicious hosts your systems are talking to Let OTX tell you what known malicious hosts your systems are talking to 1402549080 141 Video Which of your sys admins is using bit torrent in the data center? Which of your sys admins is using bit torrent in the data center? 1402548960 143 Video Identify Threats with AlienVault Unified Security Management (USM) Identify Threats with AlienVault Unified Security Management (USM) 1402548660 144 Video Asset identification in network security Asset identification in network security 1402548480 145 Video What is IP/Domain Reputation? What is IP/Domain Reputation? 1402548240 146 Video What is a Virtual Security Operations Center (VSOC)? What is a Virtual Security Operations Center (VSOC)? 1402548120 126 Video What are the most common types of malware? What are the most common types of malware? 1402547940 147 Video What is Event Log Correlation? What is Event Log Correlation? 1402547820 148 Video 5 Common Security Mistakes & How to Detect Them 5 Common Security Mistakes & How to Detect Them 1402547580 149 Webcast Get Complete Security Visibility with AlienVault USM Get Complete Security Visibility with AlienVault USM 1395942480 85 Webcast Improve Situational Awareness for Federal Government with AlienVault USM Improve Situational Awareness for Federal Government with AlienVault USM 1436425200 1 Webcast Detect Ransomware Before Its Too Late with AlienVault USM Detect Ransomware Before Its Too Late with AlienVault USM 1436425200 2 Webcast OSSIM Training: How to Get the Most Out of Policies & Actions OSSIM Training: How to Get the Most Out of Policies & Actions 1435087260 10 Webcast Improve Threat Detection for Education Organizations with AlienVault USM Improve Threat Detection for Education Organizations with AlienVault USM 1433955600 11 Webcast Find Threats Lurking on your Systems with Host-based Intrusion Detection and AlienVault USM Find Threats Lurking on your Systems with Host-based Intrusion Detection and AlienVault USM 1433877180 9 Webcast Improve Threat Detection for State & Local Government with AlienVault USM Improve Threat Detection for State & Local Government with AlienVault USM 1433274600 14 Webcast Improve Security Visibility with OSSIM Correlation Directives Improve Security Visibility with OSSIM Correlation Directives 1432710000 22 Webcast How Malware Actually Works? How Malware Actually Works? 1431500400 20 Webcast Six Steps to SIEM Success Six Steps to SIEM Success 1431468840 105 Webcast Unify your Defenses for More Effective Threat Detection & Investigation Unify your Defenses for More Effective Threat Detection & Investigation 1431456600 16 Webcast New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever 1430428980 31 Webcast New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever 1430345040 30 Webcast AWS Security: Best Practices for Effective Threat Detection & Response AWS Security: Best Practices for Effective Threat Detection & Response 1428505200 32 Webcast Improve Threat Detection with OSSEC and AlienVault USM Improve Threat Detection with OSSEC and AlienVault USM 1427986800 35 Webcast UTM + USM: All You Need for Complete Threat Management UTM + USM: All You Need for Complete Threat Management 1427843100 24 Webcast OSSIM Training: Best Practices for Configuring Your OSSIM Installation OSSIM Training: Best Practices for Configuring Your OSSIM Installation 1427295600 36 Webcast Ask the Experts: Everything you wanted to know about IDS, but were afraid to ask Ask the Experts: Everything you wanted to know about IDS, but were afraid to ask 1427212800 37 Webcast IDS for Security Analysts: How to Get Actionable Insights from your IDS IDS for Security Analysts: How to Get Actionable Insights from your IDS 1426604400 42 Webcast Level Up Your Security Strategy with Cyber Threat Intelligence Level Up Your Security Strategy with Cyber Threat Intelligence 1426105380 38 Webcast Insider Threats: How to Spot Trouble Quickly with AlienVault USM Insider Threats: How to Spot Trouble Quickly with AlienVault USM 1425571200 44 Webcast Prepare to Be Breached: How to Adapt your Security Controls to the “New Normal” Prepare to Be Breached: How to Adapt your Security Controls to the “New Normal” 1424275200 55 Webcast How to Detect System Compromise & Data Exfiltration with AlienVault USM How to Detect System Compromise & Data Exfiltration with AlienVault USM 1423167660 56 Webcast How to Simplify PCI DSS Compliance with AlienVault USM How to Simplify PCI DSS Compliance with AlienVault USM 1421781720 45 Webcast Planning your 2015 Threat Detection Strategy with a Broken Crystal Ball Planning your 2015 Threat Detection Strategy with a Broken Crystal Ball 1418755080 58 Webcast USM: Inteligencia de Seguridad Simplificada USM: Inteligencia de Seguridad Simplificada 1417456980 116 Webcast Get a Clue About IT Security Analysis - SIEM 101 Get a Clue About IT Security Analysis - SIEM 101 1415808000 117 Webcast The Evolution of IDS: Why Context is Key Evolution of IDS: Why Context is Key 1415222100 61 Webcast The Bash Vulnerability: Practical Tips to Secure your Environment Bash Vulnerability: Practical Tips to Secure your Environment 1414684800 54 Webcast Brute Force Attacks: Keeping the Bots at Bay with AlienVault USM Brute Force Attacks: Keeping the Bots at Bay with AlienVault USM 1412280780 122 Webcast Vulnerability Management: What you Need to Know to Prioritize Risk Vulnerability Management: What you Need to Know to Prioritize Risk 1410883200 109 Webcast How Attackers Move Stealthily Around Networks - And How To Detect Them How Attackers Move Stealthily Around Networks - And How To Detect Them 1409846460 121 Webcast Watering Hole Attacks: Detect End-User Compromise Before the Damage is Done Watering Hole Attacks: Detect End-User Compromise Before the Damage is Done 1407254400 69 Webcast SANS Ask the Expert: An Incident Response Playbook: From Monitoring to Operations SANS Ask the Expert: An Incident Response Playbook: From Monitoring to Operations 1406743200 70 Webcast How to Use Crowd-Sourced Threat Intelligence to Stop Malware in its Tracks How to Use Crowd-Sourced Threat Intelligence to Stop Malware in its Tracks 1406044800 124 Webcast How to Detect a Cryptolocker Infection with AlienVault USM How to Detect a Cryptolocker Infection with AlienVault USM 1405008000 71 Webcast How to Simplify Audit Compliance with Unified Security Management How to Simplify Audit Compliance with Unified Security Management 1403643960 132 Webcast PCI DSS Reporting Requirements for People Who Hate PCI DSS Reporting PCI DSS Reporting Requirements for People Who Hate PCI DSS Reporting 1403107260 74 Webcast Higher Education: Open and Secure? A SANS Survey Higher Education: Open and Secure? A SANS Survey 1403028480 75 Webcast Practical Threat Management & Incident Response for the SME Practical Threat Management & Incident Response for the SME 1402678980 77 Webcast Security Operations Center (SOC) Essentials for the SME Security Operations Center (SOC) Essentials for the SME 1401984000 79 Webcast SANS Institute: Best Practices for Leveraging Security Threat Intelligence SANS Institute: Best Practices for Leveraging Security Threat Intelligence 1401915600 80 Webcast Reduce the Attacker’s ROI with Collaborative Threat Intelligence Reduce the Attacker’s ROI with Collaborative Threat Intelligence 1400611980 150 Webcast The One-Man SOC: Habits of Highly Effective Security Practitioners One-Man SOC: Habits of Highly Effective Security Practitioners 1399491000 52 Webcast How to Detect the Heartbleed Vulnerability using AlienVault USM™ How to Detect the Heartbleed Vulnerability using AlienVault USM™ 1397746800 83 Webcast Cover your Assets: How to Limit the Risk of Attack on your XP Assets Cover your Assets: How to Limit the Risk of Attack on your XP Assets 1397590740 84 Webcast Battling savvy cyber thieves Battling savvy cyber thieves 1394568480 86 Webcast How to leverage log data for effective threat detection How to leverage log data for effective threat detection 1392849540 87 Webcast SIEM-plifying security monitoring: A different approach to security visibility SIEM-plifying security monitoring: A different approach to security visibility 1392316740 155 Webcast Stop Attackers in Their Tracks with Threat Alerts in Spiceworks Stop Attackers in Their Tracks with Threat Alerts in Spiceworks 1391558880 110 Webcast Detect Brute Force Attacks & APTs in Less That 1 Hour with AlienVault Detect Brute Force Attacks & APTs in Less That 1 Hour with AlienVault 1389283200 156 Webcast Threat Detection and Incident Response: What’s New for 2014 Threat Detection and Incident Response: What’s New for 2014 1387312200 88 Webcast Threat Intelligence: The Key to a Complete Vulnerability Management Strategy Threat Intelligence: The Key to a Complete Vulnerability Management Strategy 1386266400 89 Webcast Safety in Numbers: The Value of Crowd-Sourced Threat Intelligence Safety in Numbers: The Value of Crowd-Sourced Threat Intelligence 1386198420 90 Webcast PCI DSS v3.0: How to Adapt Your Compliance Strategy PCI DSS v3.0: How to Adapt Your Compliance Strategy 1384272000 91 Webcast Using Crowd-Sourced Threat Intelligence to Stay Ahead of Exploits Using Crowd-Sourced Threat Intelligence to Stay Ahead of Exploits 1383843600 157 Webcast Whose Logs, What Logs, Why Logs - Your Quickest Path to Security Visibility Whose Logs, What Logs, Why Logs - Your Quickest Path to Security Visibility 1381867080 92 Webcast Advanced OSSEC Training: Integration Strategies for Open Source Security Advanced OSSEC Training: Integration Strategies for Open Source Security 1380038400 93 Webcast SANS Institute Ask The Expert Webcast: Preparing for Effective Threat Detection and Response SANS Institute Ask The Expert Webcast: Preparing for Effective Threat Detection and Response 1377298140 95 Webcast The Lazy Attacker: Defending Against Broad-based Cyber Attacks with Unified & Collaborative Defenses Lazy Attacker: Defending Against Broad-based Cyber Attacks with Unified & Collaborative Defenses 1371139200 96 Webcast Preparing for a Security Breach Preparing for a Security Breach 1368723540 97 Webcast Expect More From Your SIEM Expect More From Your SIEM 1362728640 104 Webcast Using IP Reputation Data to Stay Ahead of the Threat Using IP Reputation Data to Stay Ahead of the Threat 1360689840 106 Webcast Securing the ‘Wild Wild West’: Unified Security Management for Colleges and Universities Securing the ‘Wild Wild West’: Unified Security Management for Colleges and Universities 1360094640 107 Webcast Practitioners Guide to a SOC Practitioners Guide to a SOC 1350619200 108 Live Demo Upcoming Live Product Demos
July 9, 2015 at 8:00 am PST
Upcoming Live Product Demos
July 9, 2015 at 8:00 am PST
1436454000 0
Bundle SANS Security Research Triple Pack SANS Security Research Triple Pack 1420911720 115

Free Trial Demo Get Price ChatNeed help?