Network Vulnerability Scanner | AlienVault

Network Vulnerability Scanner

AlienVault Unified Security Management (USM) delivers a built-in network vulnerability scanner to monitor your cloud, on-premises, and hybrid environments for vulnerabilities and configuration issues.

A Network Vulnerability Scanner for All Environments

The dynamic nature of today’s cloud, on-premises, and hybrid network environments requires continuous network vulnerability scanning to defend against the evolving threat landscape. Constant application updates and changes to application and system configurations can introduce vulnerabilities and leave you susceptible to an attack, even if you are keeping your security controls up to date.

AlienVault® Unified Security Management® (USM) helps you detect and remediate the vulnerabilities in your environment before attackers exploit them. AlienVault USM delivers vulnerability scanning software as part of a unified platform that also includes asset discovery, intrusion detection, behavioral monitoring, SIEM event correlation, and log management.

Stay on Schedule

Deploying and configuring a traditional security solution for network vulnerability scanning can be difficult and time-consuming. Often, IT teams conduct a scan only as a procedural ‘check the box’ measure, either in reaction to an incident or so infrequently that it has almost no measureable impact.

AlienVault USM addresses this pain point by providing a unified and easy-to-use platform that includes both asset discovery and network vulnerability scanning tools. The USM platform makes it simple to schedule regular asset and vulnerability scans, so you can ensure continuous vulnerability assessment without having to manage the process manually.

AlienVault USM allows you to stay aware of your vulnerabilities with these advanced features:

Easy Configuration and Scheduling of Vulnerability Scans

  • Easily set up vulnerability assessment scans targeting individual assets, asset groups, or even entire networks
  • Schedule vulnerability assessement scans to run automatically at regular intervals so you don't have to manage your scanning routine manually

Intuitive Dashboard and Analytics Interface

  • Leverage at-a-glance analysis of top assets and networks affected by discovered vulnerabilities
  • Use pre-built reports and customizable data views to organize threats and vulnerabilities by severity, so you can better prioritize your response

Regular Updates to Vulnerability-related Threat Intelligence Delivered

  • Receive continuously updated vulnerability signatures from the AlienVault Labs Security Research Team
  • Identify the history of vulnerabilities on assets and the availability of any patches
  • Investigate vulnerabilities and threats deeper with links to CVE reports in the Open Threat Exchange® (OTX™)
Reviews of AlienVault Unified Security Management™ on  Software Reviews on TrustRadius

Easy Configuration and Scheduling of Vulnerability Scans

Traditional approaches to network vulnerability scanning and analysis rarely focus on usability and can seem unapproachable by those in IT wearing multiple hats. This leads to frustration, infrequent and inconsistent analysis, and the risk of total project abandonment. Unfortunately, threat actors are all too familiar with this behavior and use it to their advantage by exploiting flaws in new additions to the victim’s environment.

When time and simplicity are of the essence, you need a security solution that automates your network vulnerability scanning, and that accelerates the time to detect and respond to detected vulnerabilities.

AlienVault USM delivers comprehensive vulnerability scanning software plus asset discovery in a single console. AlienVault USM provides rich context on detected vulnerabilities, including historical data on the asset, available patches, and more.

In addition, the USM platform provides easy scheduling of vulnerability scans, allowing you to easily manage your network vulnerability scanning program as well as minimize disruption of critical services during peak time.

Intuitive Dashboard and Analytics Interface

Once you’ve scanned your assets for vulnerabilities, you need to develop a response plan that describes the vulnerabilities and their potential impact to your environment, and then decide which issues to remediate first. Doing this efficiently requires expert knowledge of not only the exploit methods but the affected systems as well.

AlienVault USM's web interface provies a rich, graphical display of vulnerabilities discovered as well as the affected services, systems, and environments. An interactive dashboard shows your most vulnerable assets, vulnerabilities by asset group, a view into the mix of vulnerabilities by their severity (high, medium, and low), and a list of the latest scanning jobs. You can also re-run scans, modify scanning schedules, or even delete jobs – all from within the AlienVault USM user interface.

The data and analytics produced from the network vulnerability scanner contain rich, actionable intelligence, including detailed descriptions of vulnerability, the severity of the vulnerability, the affected software, and the availability of any patches. In most cases, links to references are provided to the CVE detail within the Open Threat Exchange (OTX) for continued research.

alienvault labs

Actionable Threat Intelligence Delivered Directly to You

Most teams don’t have unlimited resources to research the latest threats in the wild. That’s why the AlienVault Labs Security Research Team works on your behalf to scour the global threat landscape for emerging latest attack methods, bad actors, and vulnerabilities that could impact your security. This team analyzes hundreds of thousands of threat indicators daily and delivers continuous threat intelligence updates automatically to your USM environment, in the form of actionable IDS signatures, correlation rules, remediation guidance, and more. With this integrated threat intelligence subscription, you always have the most up-to-date threat intelligence as you monitor your environment for emerging threat.

To provide deeper and wider insight into attack trends and bad actors, the AlienVault Labs Security Research Team leverages the power of the Open Threat Exchange® (OTX™)—the world’s first truly open threat intelligence community. This community of security researchers and IT professionals collaborate and share millions of threat artifacts as they emerge “in the wild,” so you get global insight into attack trends and bad actors that could impact your operations.

Learn More About Threat Intelligence ›

Watch a Demo ›