AlienVault USM (from AT&T Cybersecurity) Features
What are the features of AlienVault USM (from AT&T Cybersecurity)?
Response
- Threat Intelligence
Records
- Incident Logs
- Incident Reports
- Resource Usage
Management
- Incident Alerts
Network Management
- Activity Monitoring
- Asset Management
- Log Management
Incident Management
- Event Management
- Automated Response
- Incident Reporting
Security Intelligence
- Threat Intelligence
- Vulnerability Assessment
- Advanced Analytics
- Data Examination
Top Rated AlienVault USM (from AT&T Cybersecurity) Alternatives
(41)
4.7 out of 5
Visit Website
Sponsored
AlienVault USM (from AT&T Cybersecurity) Categories on G2
Filter for Features
Response
Resolution Automation | Diagnose and resolve incidents without the need for human interaction. This feature was mentioned in 14 AlienVault USM (from AT&T Cybersecurity) reviews. | 86% (Based on 14 reviews) | |
Resolution Guidance | As reported in 15 AlienVault USM (from AT&T Cybersecurity) reviews. Guide users through the resolution process and give specific instructions to remedy individual occurrences. | 89% (Based on 15 reviews) | |
System Isolation | Cuts off network connection or temporarily inactivate applications until incidents are remedied. 12 reviewers of AlienVault USM (from AT&T Cybersecurity) have provided feedback on this feature. | 90% (Based on 12 reviews) | |
Threat Intelligence | Gathers information related to threats in order to gain further information on remedies. This feature was mentioned in 18 AlienVault USM (from AT&T Cybersecurity) reviews. | 92% (Based on 18 reviews) |
Records
Incident Logs | Information on each incident is stored in databases for user reference and analytics. This feature was mentioned in 17 AlienVault USM (from AT&T Cybersecurity) reviews. | 92% (Based on 17 reviews) | |
Incident Reports | Produces reports detailing trends and vulnerabilities related to their network and infrastructure. 17 reviewers of AlienVault USM (from AT&T Cybersecurity) have provided feedback on this feature. | 92% (Based on 17 reviews) | |
Resource Usage | Analyzes recurring incidents and remedies to ensure optimal resource usage. 17 reviewers of AlienVault USM (from AT&T Cybersecurity) have provided feedback on this feature. | 90% (Based on 17 reviews) |
Management
Incident Alerts | Based on 17 AlienVault USM (from AT&T Cybersecurity) reviews. Gives alerts when incidents arise. Some responses may be automated, but users will still be informed. | 94% (Based on 17 reviews) | |
Database Management | Adminstrators can access and organize data related to incidents to produce reports or make data more navigable. 15 reviewers of AlienVault USM (from AT&T Cybersecurity) have provided feedback on this feature. | 83% (Based on 15 reviews) | |
Workflow Management | Based on 15 AlienVault USM (from AT&T Cybersecurity) reviews. Administrators can organize workflows to guide remedies to specific situations incident types. | 88% (Based on 15 reviews) |
Network Management
Activity Monitoring | Based on 61 AlienVault USM (from AT&T Cybersecurity) reviews and verified by the G2 Product R&D team. Documents the actions from endpoints within a network. Alerts users of incidents and abnormal activities and documents the access point. | 89% (Based on 61 reviews) | |
Asset Management | Based on 57 AlienVault USM (from AT&T Cybersecurity) reviews and verified by the G2 Product R&D team. Keeps records of each network asset and its activity. Discovers new assets accessing the network. | 79% (Based on 57 reviews) | |
Log Management | Based on 61 AlienVault USM (from AT&T Cybersecurity) reviews and verified by the G2 Product R&D team. Provides security information and stores the data in a secure repository for reference. | 89% (Based on 61 reviews) |
Incident Management
Event Management | Based on 60 AlienVault USM (from AT&T Cybersecurity) reviews and verified by the G2 Product R&D team. Alerts users of incidents and allows users to intervene manually or triggers an automated response. | 89% (Based on 60 reviews) | |
Automated Response | Based on 52 AlienVault USM (from AT&T Cybersecurity) reviews and verified by the G2 Product R&D team. Reduces time spent remedying issues manually. Resolves common network security incidents quickly. | 79% (Based on 52 reviews) | |
Incident Reporting | Based on 55 AlienVault USM (from AT&T Cybersecurity) reviews and verified by the G2 Product R&D team. Documents cases of abnormal activity and compromised systems. | 83% (Based on 55 reviews) |
Security Intelligence
Threat Intelligence | Based on 62 AlienVault USM (from AT&T Cybersecurity) reviews and verified by the G2 Product R&D team. Stores information related to common threats and how to resolve them once incidents occur. | 91% (Based on 62 reviews) | |
Vulnerability Assessment | Based on 60 AlienVault USM (from AT&T Cybersecurity) reviews and verified by the G2 Product R&D team. Analyzes your existing network and IT infrastructure to outline access points that can be easily compromised. | 84% (Based on 60 reviews) | |
Advanced Analytics | Based on 32 AlienVault USM (from AT&T Cybersecurity) reviews and verified by the G2 Product R&D team. Allows users to customize analytics with granulized metrics that are pertinent to your specific resources. | 84% (Based on 32 reviews) | |
Data Examination | Based on 55 AlienVault USM (from AT&T Cybersecurity) reviews and verified by the G2 Product R&D team. Allows users to search databases and incident logs to gain insights on vulnerabilities and incidents. | 84% (Based on 55 reviews) |
Prevention
Intrusion Prevention | Based on 13 AlienVault USM (from AT&T Cybersecurity) reviews. Enforces security paramaters to prevent unauthorized access. | 83% (Based on 13 reviews) | |
Firewall | As reported in 10 AlienVault USM (from AT&T Cybersecurity) reviews. Protects servers, data center infrastructure and information from a variety of attacks and malware threats. | 87% (Based on 10 reviews) | |
Encryption | Provide some level of encryption of information, protecting sensitive data while it exists within the data center. | Not enough data | |
Security hardening | Facilitates system and network security by identifying and remediating vulnerabilities This feature was mentioned in 12 AlienVault USM (from AT&T Cybersecurity) reviews. | 88% (Based on 12 reviews) | |
Cloud Data Protection | Based on 11 AlienVault USM (from AT&T Cybersecurity) reviews. Provides high quality and wide scope of in-cloud and offline data security capabilities. | 88% (Based on 11 reviews) |
Detection
Intrusion Detection | Detects unauthorized access and use of privileged systems. This feature was mentioned in 14 AlienVault USM (from AT&T Cybersecurity) reviews. | 87% (Based on 14 reviews) | |
Security Monitoring | Detects anomalies in functionality, user accessibility, traffic flows, and tampering. 16 reviewers of AlienVault USM (from AT&T Cybersecurity) have provided feedback on this feature. | 90% (Based on 16 reviews) | |
Anti-Malware / Malware Detection | Provides multiple techniques and information sources to alert users of malware occurrences. This feature was mentioned in 15 AlienVault USM (from AT&T Cybersecurity) reviews. | 87% (Based on 15 reviews) |
Administration
Compliance | Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards. This feature was mentioned in 15 AlienVault USM (from AT&T Cybersecurity) reviews. | 90% (Based on 15 reviews) | |
Administration Console - | Based on 16 AlienVault USM (from AT&T Cybersecurity) reviews. Provides a centralized console for administation tasks and unified control. | 89% (Based on 16 reviews) | |
API / integrations | As reported in 12 AlienVault USM (from AT&T Cybersecurity) reviews. Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications. | 82% (Based on 12 reviews) | |
Policy Enforcement | Allows administrators to set policies for security and data governance. | Not enough data | |
Auditing | Analyzes data associated with web traffic and site performance to provide vulnerability insights and best practices. This feature was mentioned in 10 AlienVault USM (from AT&T Cybersecurity) reviews. | 82% (Based on 10 reviews) | |
Workflow Management | Creates new or streamlines existing workflows to better handle IT support tickets and service. | Not enough data |
Security
Compliance Monitoring | Monitors data quality and sends alerts based on violations or misuse. | Not enough data | |
Anomoly Detection | Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns. | Not enough data | |
Data Loss Prevention | Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest. | Not enough data | |
Cloud Gap Analytics | Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols. | Not enough data |
Compliance
Governance | Allows users to create, edit, and relinquish user access privileges. This feature was mentioned in 10 AlienVault USM (from AT&T Cybersecurity) reviews. | 92% (Based on 10 reviews) | |
Data Governance | Ensures user access management, data lineage, and data encryption. | Not enough data | |
Sensitive Data Compliance | Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards. | Not enough data |
Performance
Issue Tracking | Track issues as vulnerabilities are discovered. Documents activity throughout the resolution process. | Not enough data | |
Detection Rate | The rate at which scans accurately detect all vulnerabilities associated with the target. | Not enough data | |
False Positives | The rate at which scans falsely indicate detection of a vulnerability when no vulnerabilitiy legitimately exists. | Not enough data | |
Automated Scans | Runs pre-scripted vulnerability scans without requiring manual work. | Not enough data |
Network
Compliance Testing | Allows users to scan applications and networks for specific compliance requirements. | Not enough data | |
Perimeter Scanning | Analyzes network devices, servers and operating systems for vulnerabilities. | Not enough data | |
Configuration Monitoring | Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance. | Not enough data |
Application
Manual Application Testing | Allows users to perfrom hands-on live simulations and penetration tests. | Not enough data |