AlienVault
Follow
3195 Followers
Follow AlienVault on their other social channels!
About Us
Founded:
2007
Company Size:
201-500 employees
Company Type:
Private
AlienVault is simplifying the way organizations detect and respond to today’s ever evolving threat landscape. Our unique, award-winning approach combines the essential security controls of our all-in-one Unified Security Management platform with the power of AlienVault’s Open Threat Exchange, ...
Read more
Promoted Content
Beginner’s Guide to Threat Intelligence
Follow
6
Computing Security: USM Anywhere™ a Complete Security Solution
Download Now!In their review of AlienVault® USM Anywhere™ in the September/October issue, Computing Security magazine highlights AlienVault’s all-in-one SaaS platform as delivering everything companies need for threat detection, incident response, compliance management, and providing excellent value to businesses of all sizes.Key features:  • Automatic asset discovery, IDS, vulnerability assessment, event correlation, endpoint detection and response (EDR), compliance reporting ...
Follow
8
Phenomenal Security With AlienVault®
Watch Now!Discover the power of the unified security platform approach to security at AlienVault® in this brief 10-minute introduction video.Watch Now!
Follow
11
How to Use NIST CSF to Drive Security and Compliance
Register Now!Security First, Compliance Next is a theme that is very relevant today. In practice, companies that prioritize the goal of being secure end up being more than compliant. When approached together, strategically, both can become easier.The NIST Cybersecurity Framework enables organizations — regardless of size, degree of cybersecurity risk, or cybersecurity sophistication — to apply the principles and best practices of risk management to improving security.  In this webc ...
Follow
8
Crowd-sourced Threat Intelligence and Response Guidance
Watch Now!Russ Spitler, AlienVault SVP of Product, discusses how to effectively leverage crowd-sourced threat intelligence in detecting and responding to security threats.Watch Now!
Follow
12
2018 Threat Intelligence Report
Download Now!Threat intelligence has become a significant weapon in the fight against cybersecurity threats, and a large majority of organizations have made it a key part of their security programs.This threat intelligence report, produced by Cybersecurity Insiders, explores how organizations are leveraging threat intelligence data, the benefits and most critical features of threat intelligence platforms, and the biggest cyber threats organizations are using their threat intelligence to combat.D ...
Follow
13
Compliance Reporting with AlienVault® USM™: 2-Minute Overview
Watch Now!Having the right technology and expertise to achieve compliance can be challenging for organizations of any size. Staying compliant with PCI, HIPAA and other regulations requires the right security monitoring tools and the ability to produce audit-ready reports. AlienVault USM simplifies these compliance with:Integrated security controls including asset discovery, vulnerability assessment, file integrity monitoring and SIEM12-month log retention for cloud and on-premises assets— ...
Follow
27
SOC 2 Compliance with AlienVault® USM
Read Now!SOC 2 is a highly-desired certification for any organization that delivers services, including SaaS-delivered solutions. However, many IT security teams find it difficult to successfully implement the many IT security controls needed to comply with the SOC 2 Security Principle. Purchasing each required technology can be costly, and successfully deploying, configuring, and performing daily management and monitoring of all the security controls can easily overwhelm many organizations, par ...
Follow
17
AlienVault® USM Anywhere™
Read Now!Powerful Threat Detection and Incident Response for All Your Critical InfrastructureRead Now!
Follow
18
Defending Against Zero-Day Attacks with AlienVault USM Anywhere
IntroductionRecently, an AlienVault customer reached out to ask how AlienVault handles the detection of zero-day attacks, which are exploits against previously unknown vulnerabilities. In this blog, I shed light on how we approach this.Modern security products rely on some definition of threats, whether that definition is as specific as a signature that identifies a unique strain of malware or as general as a behavior pattern that threat actors employ broadly across different strains of mal ...
Follow
31
Practitioner’s Guide to Building a Security Operations Center
Get Your Copy Now!The purpose of a Security Operations Center (SOC) is to identify, investigate, prioritize, and resolve issues that could affect the security of an organization’s critical infrastructure and data. A well-developed and well-run SOC can perform real-time threat detection and incident response, with SOC analysts that can deliver rapid security intelligence to stakeholders and senior management, identifying when an attack starts, who is attacking, how the attack is being conducted ...

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel