Follow AlienVault on their other social channels!
About Us
Company Size:
201-500 employees
Company Type:
AlienVault is simplifying the way organizations detect and respond to today’s ever evolving threat landscape. Our unique, award-winning approach combines the essential security controls of our all-in-one Unified Security Management platform with the power of AlienVault’s Open Threat Exchange, ...
Read more
Promoted Content
2018 GDPR Compliance Report
How to Detect Cryptomining in your Environment with AlienVault
Thursday, August 16, 2018 - 8:00am PT / 10:00am CT - Register NowCryptominers are built to turn computing power into revenue. To make cryptomining a profitable venture, cyber criminals are writing and distributing malware to steal computing resources to mine for cryptocurrencies like Bitcoin and Monero by attacking victims' endpoints, public cloud accounts, and websites. Through various attack vectors, cyber attackers can turn compromised systems into a silent zombie army of cryptocurrency miner ...
AlienVault® USM vs. OSSIM™
Watch Now!This OSSIM vs USM video provides an overview of the differences and similarities between the two, as well as an explanation of their core capabilities.OSSIM, AlienVault’s Open Source Security Information and Event Management (SIEM) product, provides you with a feature-rich open source SIEM complete with event collection, normalization and correlation.For more advanced functionality, AlienVault’s USM platform puts built-in, essential security controls and threat intelligence into th ...
AlienVault USM vs. AlienVault OSSIM: A Comparison of Open Source vs. Commercial
Read Now!AlienVault® Open Source Security Information and Event Management (AlienVault OSSIM™) provides event collection, normalization, and correlation. For more advanced functionality, the AlienVault Unified Security Management® (USM) platform builds on AlienVault OSSIM with these additional capabilities:Monitoring of cloud and on-premises environments from one fully integrated solutionLog management, including 12 months of log storage for compliance requirementsExtensive library of pre-bu ...
Endpoint Detection & Response: The First Line of Defense
Watch Now!In this 2-minute video, AlienVault's Javvad Malik explains why endpoint detection and response (EDR) is an essential part of a robust security and compliance program. AlienVault USM Anywhere includes EDR capabilities as part of the Unified Security Management (USM) platform.Watch Now!
Detect Advanced Threats with Endpoint Detection and Response (EDR)
Read Now!As malicious actors target endpoints with new types of attacks designed to evade traditional antivirus tools, security teams are looking to endpoint detection and response (EDR) solutions for an additional layer of security.In this solution brief, you will learn how AlienVault’s approach to delivering advanced EDR capabilities enables you to:Automate threat hunting and detect evasive threats that traditional antivirus can’tAccelerate compliance efforts with built-in File Integrity M ...
Improving Threat Detection with MSSPs
Watch Now!This short video discusses the IT challenges SMB and mid-market organizations face in combating cybersecurity. Listen to the benefits of outsourcing your security monitoring to a Managed Security Service Provider (MSSP) for threat detection, response and compliance.Watch Now!
Beginner’s Guide to SIEM
Get Your Free Copy Now!Need a crash course on SIEM? No problem.Security Information and Event Management (SIEM) platforms provide real-time correlation of events generated from network security controls. Our security gurus will explain what SIEM is (and isn’t) and how to get up and running with it quickly and painlessly.You'll learn everything you need to know about:Critical information stored in your logs and how to leverage it for better securityRequirements to effectively perform log collec ...
Working with MSSPs
Watch Now!AlienVault VP of Global Channels Mike LaPeters talks to ISMG about the industry skills shortage and how MSSPs can help companies react and respond to security threats.Watch Now!
How to Simplify PCI DSS Compliance with a Unified Approach to Security
Register Now!Demonstrating compliance with PCI DSS is far from a trivial exercise. The 12 requirements of PCI DSS often translate into a lot of time and effort to access the necessary data and reports from many different systems and tools. And, after an audit is complete many teams struggle to maintain compliance. In this webcast, you'll hear from Jacques Lucas, a Qualified Security Assessor (QSA) with Terra Verde, and Sanjay Ramnath, VP of Product Marketing at AlienVault, sharing best prac ...
How to Secure Your Business: Getting Back to the Basics
Watch Now!Roger Thornton, Chief Technology Officer of AlienVault, discusses why it is so important to start with cyber security basics and master that before adding all the latest shiny objects available in the InfoSec industry.Video highlights:Detection and response of a breach is key to effectively mitigate risk for organizations of all sizes.Democratizing data sharing through Open Threat Exchange to find the bad actors more quickly.There are different strategic imperatives based on company si ...

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play

Support Cybrary

Donate Here to Get This Month's Donor Badge

Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?