Best Software for 2025 is now live!
By AT&T
Save to My Lists
Claimed
Claimed

AlienVault USM (from AT&T Cybersecurity) Features

What are the features of AlienVault USM (from AT&T Cybersecurity)?

Response

  • Threat Intelligence

Records

  • Incident Logs
  • Incident Reports
  • Resource Usage

Management

  • Incident Alerts

Network Management

  • Activity Monitoring
  • Asset Management
  • Log Management

Incident Management

  • Event Management
  • Automated Response
  • Incident Reporting

Security Intelligence

  • Threat Intelligence
  • Vulnerability Assessment
  • Advanced Analytics
  • Data Examination

Top Rated AlienVault USM (from AT&T Cybersecurity) Alternatives

Filter for Features

Response

Resolution Automation

Diagnose and resolve incidents without the need for human interaction. This feature was mentioned in 14 AlienVault USM (from AT&T Cybersecurity) reviews.
86%
(Based on 14 reviews)

Resolution Guidance

As reported in 15 AlienVault USM (from AT&T Cybersecurity) reviews. Guide users through the resolution process and give specific instructions to remedy individual occurrences.
89%
(Based on 15 reviews)

System Isolation

Cuts off network connection or temporarily inactivate applications until incidents are remedied. 12 reviewers of AlienVault USM (from AT&T Cybersecurity) have provided feedback on this feature.
90%
(Based on 12 reviews)

Threat Intelligence

Gathers information related to threats in order to gain further information on remedies. This feature was mentioned in 18 AlienVault USM (from AT&T Cybersecurity) reviews.
92%
(Based on 18 reviews)

Records

Incident Logs

Information on each incident is stored in databases for user reference and analytics. This feature was mentioned in 17 AlienVault USM (from AT&T Cybersecurity) reviews.
92%
(Based on 17 reviews)

Incident Reports

Produces reports detailing trends and vulnerabilities related to their network and infrastructure. 17 reviewers of AlienVault USM (from AT&T Cybersecurity) have provided feedback on this feature.
92%
(Based on 17 reviews)

Resource Usage

Analyzes recurring incidents and remedies to ensure optimal resource usage. 17 reviewers of AlienVault USM (from AT&T Cybersecurity) have provided feedback on this feature.
90%
(Based on 17 reviews)

Management

Incident Alerts

Based on 17 AlienVault USM (from AT&T Cybersecurity) reviews. Gives alerts when incidents arise. Some responses may be automated, but users will still be informed.
94%
(Based on 17 reviews)

Database Management

Adminstrators can access and organize data related to incidents to produce reports or make data more navigable. 15 reviewers of AlienVault USM (from AT&T Cybersecurity) have provided feedback on this feature.
83%
(Based on 15 reviews)

Workflow Management

Based on 15 AlienVault USM (from AT&T Cybersecurity) reviews. Administrators can organize workflows to guide remedies to specific situations incident types.
88%
(Based on 15 reviews)

Network Management

Activity Monitoring

Based on 61 AlienVault USM (from AT&T Cybersecurity) reviews and verified by the G2 Product R&D team. Documents the actions from endpoints within a network. Alerts users of incidents and abnormal activities and documents the access point.
89%
(Based on 61 reviews)

Asset Management

Based on 57 AlienVault USM (from AT&T Cybersecurity) reviews and verified by the G2 Product R&D team. Keeps records of each network asset and its activity. Discovers new assets accessing the network.
79%
(Based on 57 reviews)

Log Management

Based on 61 AlienVault USM (from AT&T Cybersecurity) reviews and verified by the G2 Product R&D team. Provides security information and stores the data in a secure repository for reference.
89%
(Based on 61 reviews)

Incident Management

Event Management

Based on 60 AlienVault USM (from AT&T Cybersecurity) reviews and verified by the G2 Product R&D team. Alerts users of incidents and allows users to intervene manually or triggers an automated response.
89%
(Based on 60 reviews)

Automated Response

Based on 52 AlienVault USM (from AT&T Cybersecurity) reviews and verified by the G2 Product R&D team. Reduces time spent remedying issues manually. Resolves common network security incidents quickly.
79%
(Based on 52 reviews)

Incident Reporting

Based on 55 AlienVault USM (from AT&T Cybersecurity) reviews and verified by the G2 Product R&D team. Documents cases of abnormal activity and compromised systems.
83%
(Based on 55 reviews)

Security Intelligence

Threat Intelligence

Based on 62 AlienVault USM (from AT&T Cybersecurity) reviews and verified by the G2 Product R&D team. Stores information related to common threats and how to resolve them once incidents occur.
91%
(Based on 62 reviews)

Vulnerability Assessment

Based on 60 AlienVault USM (from AT&T Cybersecurity) reviews and verified by the G2 Product R&D team. Analyzes your existing network and IT infrastructure to outline access points that can be easily compromised.
84%
(Based on 60 reviews)

Advanced Analytics

Based on 32 AlienVault USM (from AT&T Cybersecurity) reviews and verified by the G2 Product R&D team. Allows users to customize analytics with granulized metrics that are pertinent to your specific resources.
84%
(Based on 32 reviews)

Data Examination

Based on 55 AlienVault USM (from AT&T Cybersecurity) reviews and verified by the G2 Product R&D team. Allows users to search databases and incident logs to gain insights on vulnerabilities and incidents.
84%
(Based on 55 reviews)

Prevention

Intrusion Prevention

Based on 13 AlienVault USM (from AT&T Cybersecurity) reviews. Enforces security paramaters to prevent unauthorized access.
83%
(Based on 13 reviews)

Firewall

As reported in 10 AlienVault USM (from AT&T Cybersecurity) reviews. Protects servers, data center infrastructure and information from a variety of attacks and malware threats.
87%
(Based on 10 reviews)

Encryption

Provide some level of encryption of information, protecting sensitive data while it exists within the data center.

Not enough data

Security hardening

Facilitates system and network security by identifying and remediating vulnerabilities This feature was mentioned in 12 AlienVault USM (from AT&T Cybersecurity) reviews.
88%
(Based on 12 reviews)

Cloud Data Protection

Based on 11 AlienVault USM (from AT&T Cybersecurity) reviews. Provides high quality and wide scope of in-cloud and offline data security capabilities.
88%
(Based on 11 reviews)

Detection

Intrusion Detection

Detects unauthorized access and use of privileged systems. This feature was mentioned in 14 AlienVault USM (from AT&T Cybersecurity) reviews.
87%
(Based on 14 reviews)

Security Monitoring

Detects anomalies in functionality, user accessibility, traffic flows, and tampering. 16 reviewers of AlienVault USM (from AT&T Cybersecurity) have provided feedback on this feature.
90%
(Based on 16 reviews)

Anti-Malware / Malware Detection

Provides multiple techniques and information sources to alert users of malware occurrences. This feature was mentioned in 15 AlienVault USM (from AT&T Cybersecurity) reviews.
87%
(Based on 15 reviews)

Administration

Compliance

Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards. This feature was mentioned in 15 AlienVault USM (from AT&T Cybersecurity) reviews.
90%
(Based on 15 reviews)

Administration Console -

Based on 16 AlienVault USM (from AT&T Cybersecurity) reviews. Provides a centralized console for administation tasks and unified control.
89%
(Based on 16 reviews)

API / integrations

As reported in 12 AlienVault USM (from AT&T Cybersecurity) reviews. Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications.
82%
(Based on 12 reviews)

Policy Enforcement

Allows administrators to set policies for security and data governance.

Not enough data

Auditing

Analyzes data associated with web traffic and site performance to provide vulnerability insights and best practices. This feature was mentioned in 10 AlienVault USM (from AT&T Cybersecurity) reviews.
82%
(Based on 10 reviews)

Workflow Management

Creates new or streamlines existing workflows to better handle IT support tickets and service.

Not enough data

Security

Compliance Monitoring

Monitors data quality and sends alerts based on violations or misuse.

Not enough data

Anomoly Detection

Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns.

Not enough data

Data Loss Prevention

Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest.

Not enough data

Cloud Gap Analytics

Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols.

Not enough data

Compliance

Governance

Allows users to create, edit, and relinquish user access privileges. This feature was mentioned in 10 AlienVault USM (from AT&T Cybersecurity) reviews.
92%
(Based on 10 reviews)

Data Governance

Ensures user access management, data lineage, and data encryption.

Not enough data

Sensitive Data Compliance

Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards.

Not enough data

Performance

Issue Tracking

Track issues as vulnerabilities are discovered. Documents activity throughout the resolution process.

Not enough data

Detection Rate

The rate at which scans accurately detect all vulnerabilities associated with the target.

Not enough data

False Positives

The rate at which scans falsely indicate detection of a vulnerability when no vulnerabilitiy legitimately exists.

Not enough data

Automated Scans

Runs pre-scripted vulnerability scans without requiring manual work.

Not enough data

Network

Compliance Testing

Allows users to scan applications and networks for specific compliance requirements.

Not enough data

Perimeter Scanning

Analyzes network devices, servers and operating systems for vulnerabilities.

Not enough data

Configuration Monitoring

Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance.

Not enough data

Application

Manual Application Testing

Allows users to perfrom hands-on live simulations and penetration tests.

Not enough data