Asset Discovery | AlienVault

Asset Discovery

Discover all the assets in your cloud and on-premises environments in minutes and get visibility into the vulnerabilities and active threats against them.

Watch a 90-Second Demo

AlienVault® understands that security practitioners and IT professionals have enough to worry about, and more than enough work to do. The first thing to worry about is what’s connected to your network and what instances are running in your cloud environments.

Within minutes of installing AlienVault® USM Anywhere™ or USM Appliance™, the built-in asset discovery will find and provide you visibility into the assets in your AWS, Azure, and on-premises environments. You will be able to discover all the IP-enabled devices on your network, determining what software and services are installed on them, how they’re configured, any potential vulnerabilities and active threats being executed against them. If you have cloud infrastructure, USM Anywhere’s built-in asset discovery capability will find and provide you visibility into the assets in your AWS and Azure environments.

With USM Anywhere or USM Appliance, you'll be able to quickly answer questions such as:

  • What instances are running in my cloud environments?
  • What devices are on my physical and virtual networks?
  • What vulnerabilities exist on the assets in my cloud and network?
  • What are my users doing?
  • Are there known attackers trying to interact with my cloud and network assets?
  • Are there active threats on my cloud and network assets?

download a free trial

Reviews of AlienVault Unified Security Management™ on  Software Reviews on TrustRadius

Correlate Asset Info with Threat & Vulnerability Data

Know What’s In Your Cloud Environment and On Your Network

It's a problem when you don't know what’s on your cloud and network environment and how the assets within those environments are configured. Wouldn't you prefer certainty?

Automated asset discovery and scanning can start you on the path to certainty. The AlienVault USM platform combines core discovery and inventory technologies to give you full visibility into the devices that show up on your network and the instances running in your cloud environments.

learn more about usm anywhere

learn more about usm appliance

Network Asset Discovery

USM Anywhere and USM Appliance gently scan your environment to gather information about your device. These responses provide clues that help identify the device, the OS, running services, and the software installed on it. They can also often identify the software vendor and version without having to send any credentials to the asset to run a more invasive scan.

Passive Network Monitoring

USM Appliance utilizes passive network monitoring techniques to evaluate network communications and identify information about assets that are on the network.

  • IP and hardware MAC address pairings for use in asset inventory and to detect MAC spoofing
  • IP header analysis to identify operating systems and running software packages
  • TCP/IP traffic analysis for OS fingerprinting and basic network topography

Cloud Asset Discovery

USM Anywhere hooks directly into cloud infrastructure providers’ APIs to give you immediate visibility into your cloud environment within minutes of installation. USM Anywhere leverages native cloud services like AWS CloudWatch and Azure Insights to collect data from your cloud environments and begin detecting threats.

Take a Product Tour.

Targeted guidance eliminates the guesswork associated with integrating data sources and provides precise suggestions for improving visibility.
Built-in network flow analysis provides all the data you need for in-depth investigations – including packet capture.
Secure storage of raw event data satisfies regulatory compliance requirements while an easy-to-use interface allows for quick searches.
Identify malicious actors attempting to interact with your network using our dynamic IP reputation data.
Centralized, integrated "how to" documentation for all you need to know about USM.
Built-in network IDS and host IDS results in more accurate threat detection and event correlation, faster deployment and simpler management.
Built-in vulnerability assessment simplifies security monitoring and speeds remediation.
Real-time threat intelligence utilizes kill-chain taxonomy to identify attackers, their victims, their methods and their intents.
Each alarm provides detailed and customized instructions on how to investigate and respond to malicious activity.
Customizable executive dashboards provide overviews and click-through details about your security and compliance posture.
All you need to know about an asset for incident investigation and response – in one window.
Automated asset discovery provides granular details on all devices in your network.
Watch a Demo ›
GET PRICE FREE TRIAL CHAT