Page 50 - GS180601
P. 50

NewProduct





                                                                    and orchestrate security responses and alarms. The
                                                                    cloud-based solution can readily scale with growing
                                         Company: AlienVault Inc.   IT environments and evolving threat detection needs.
                                                                    Users can add and remove software sensors, cloud ser-
                                         Product: USM Anywhere      vices and log management as businesses change. The
                                         Website: www.alienvault.com  USM Anywhere subscription model uses tiered pric-
                                         Contact: hello@alienvault.com  ing based on log consumption levels. Each subscrip-
                                                                    tion includes at least one AlienVault USM Anywhere
                                                                    standard sensor, support and maintenance, AlienVault
                                                                    Labs threat intelligence and up to 12 months of cold
                                                                    storage, with the ability to extend storage capacity as
        Unified security management,                                needed.

                                                                AlienVault noted that the service provides the following
        compliance solution                                     capabilities and protections:

                                                                   •  Asset discovery: API-powered asset discovery; net-
                  lienVault Inc., a global security solutions com-    work asset discovery; software and services discov-
                  pany with U.S. offices in  Austin, Texas, and       ery
                  San Mateo, Calif., launched USM  Anywhere,       •  Vulnerability assessment:  Network vulnerability
        A a security management solution designed to                  scanning; cloud vulnerability scanning; cloud in-
        improve threat detection, incident response and compli-       frastructure assessment
        ance management across cloud, on-premise and hybrid
        environments. The  unified platform combines  continu-     •  Intrusion detection: Cloud, network, host environ-
        ous threat intelligence with asset discovery, vulnerability   ment; file integrity monitoring
        management, intrusion detection, behavioral monitoring,    •  Behavioral monitoring: Asset access logs monitor-
        security information and event management, and log            ing; cloud access and activity logs (Azure Monitor,
        management, company representatives stated. "In today's       AWS: CloudTrail, CloudWatch, S3, ELB); AWS VPC
        chaotic security environment, organizations of all sizes      flow monitoring; VMware ESXi access logs
        can easily find themselves trapped in a 'threat cycle,'    •  SIEM and log management: Event correlation; log
        continually adding point solutions to deal with new and       management and retention; incident response; in-
        emerging threats," stated John Maguire, Vice President        tegrated threat intelligence via the AlienVault Labs
        of Business Development at AlienVault. "USM Anywhere          Security Team and AlienVault Open Threat Ex-
        simplifies the process by combining all of the essential      change (OTX)
        security capabilities you need to gain visibility into your
        full infrastructure – whether it is on-premises or in the   Global network, crowdsourced intelligence
        cloud."
                                                                The AlienVault Labs Security Research Team continually
        Maguire additionally noted that USM Anywhere can be     updates USM Anywhere based on ongoing research and
        rapidly deployed into cloud and on-site environments.   analysis of various attack vectors, emerging threats, vul-
        The platform's cloud-based service natively monitors    nerabilities and exploits, the company said. The team le-
        Amazon Web Services (AWS) and Microsoft Azure cloud     verages community-sourced threat intelligence from the
        environments and other cloud applications. Its on-site so-  AlienVault OTX, which aggregates data from more than
        lutions use lightweight virtual sensors that run on Micro-  65,000 participants and more than 140 countries.  Alien-
        soft Hyper-V and VMware ESXi to monitor virtual private   Vault Labs analyzes raw OTX data from approximately
        cloud and physical IT infrastructures, he noted.        14 million threat indicators per day. The AlienVault Labs'
                                                                discovery engine and validation engine bring additional
        Single SaaS platform, multiple capabilities             granularity to threat analysis by continually curating the
                                                                database and certifying results, AlienVault representa-
        USM Anywhere aggregates multiple protections into a     tives stated.
        single, simplified software-as-a-service solution. USM
        Anywhere can be installed in three steps in both cloud   AlienVault recently added ISO 27001 reporting templates
        and on-premise environments, the company stated. Users   to USM Anywhere, to help organizations prepare for the
        can initiate the process by entering a unique sensor autho-  European Union's General Data Protection Regulation.
        rization code in a dedicated USM Anywhere URL. Once     AlienVault attributes its growth and development to an
        inside the secure user portal, the installation wizard will   extended network of channel partners, which includes
        identify the log sources and network segments to be moni-  value-added resellers, systems integrators and merchant
        tored and begin monitoring for threats and malicious ac-  service providers. These partners sell and support Alien-
        tivities. AlienVault representatives said the platform can   Vault solutions throughout the global marketplace, the
        be configured for any type or size of business. Users can   company added.
        schedule vulnerability scans, search and analyze data

        50
   45   46   47   48   49   50   51   52   53   54   55