Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Network Security

AlienVault Updates Security Management Platform

Armed with an extra $22.4 million in its pocket following a Series C financing round announced just over a week ago, AlienVault, the San Mateo, California-based company behind open source SIEM, OSSIM, and the AlienVault Open Threat Exchange, today announced the latest version of its suite of security management products.

Armed with an extra $22.4 million in its pocket following a Series C financing round announced just over a week ago, AlienVault, the San Mateo, California-based company behind open source SIEM, OSSIM, and the AlienVault Open Threat Exchange, today announced the latest version of its suite of security management products.

AlientVaultBased on OSSIM, the AlienVault Unified Security Management platform (AV-USM) combines more than 30 security tools that provide users with security capabilities including asset discovery, vulnerability assessment, threat detection, behavioral monitoring, and security intelligence, into a single management console.

The company says this latest update of the AV-USM platform offers significant enhancements in scalability, performance and usability, and brings more than 200 enhancements and new features including:

AlienVault Center: An web interface that centralizes configuration, monitoring and management of all AlienVault security tools and components.

Dynamic Asset Inventory: Enhanced forensic visibility into dynamic environments for improved incident response; deep historical insight into the state and configuration of assets, including details on which services were running, what users were authenticated and the configuration of network interfaces.

Enhanced Event Processing and Storage: Up to 3x improvement in event throughput for improved correlation and up to 6x increase in time window of event storage for better forensic investigation.

Additionally, while not a new feature, the AlienVault Open Threat Exchange, a community-sourced threat database and intelligence feed, is built into the AV-USM platform and OSSIM to provide users with real-time collaborative defense.

“It is the combination of real-time monitoring, context like threat, vulnerability, user, asset, data and application and ‘smart eyeballs’ that will improve a company’s chances of early breach detection beyond the current 15% success rate,” said Mark Nicolett, research vice president, Gartner, Inc. in his report, Using SIEM for Targeted Attack Detection, published March 2012. “A unified approach for SIEM is more effective when management processes have been implemented and there is some degree of role-based access control.”

The company also recently launched a new community forum to provide OSSIM and AlienVault users with an online resource for technical support, product guides and discussion on security threats and trends.

Advertisement. Scroll to continue reading.

“Our unified security management platform brings together all of the necessary components for deep visibility across the enterprise,” said Russ Spitler, VP of Product Management at AlienVault. “In conjunction with our threat intelligence service, we’ve made it easy for any organization to establish a sophisticated and comprehensive security program without the overhead and deployment challenges that come with multiple complicated, disconnected tools.”

AlienVault says that it is experiencing rapid growth, noting in a recent announcement that it has added over 60 new customers during the first half of 2012, and more than doubling in revenue.

The latest version of the AlienVault Unified Security Management platform is available now.

Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Mike Dube has joined cloud security company Aqua Security as CRO.

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

More People On The Move

Expert Insights

Related Content

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Network Security

A zero-day vulnerability named HTTP/2 Rapid Reset has been exploited to launch some of the largest DDoS attacks in history.

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...