AlienVault SIEM Platform

AlienVault Unified Security Management™ (USM) is an all-in-one platform designed and priced to ensure that mid-market organizations can effectively defend themselves against today’s advanced threats. Unlike traditional SIEM or security point products, AlienVault USM provides:

  • Unified, Coordinated Security Monitoring
  • Simple Security Event Management and Reporting
  • Continuous Threat Intelligence
  • Fast Deployment
  • Multiple Security Functions Without Multiple Consoles

Take a test drive of our all-in-one security platform and see how easy it can be to defend against today’s advanced threats.

Start Your Free Trial!


AlienVAult Security As a Service (SaaS)

More and more companies are getting breached on a daily basis. Regardless of the size of your business, if you don’t have a strong security posture, it’s not a question of IF you’ll get hacked, it’s a question of WHEN you’ll get hacked. NDM has selected the best technology partners in the industry including AlienVault™ for advanced security event monitoring, and we have some of the brightest minds in the Security Industry leveraging these tools. NDM Managed Security Services helps businesses gain visibility, meet compliance, and lower their overall IT Security costs.

There are four AlienVault USM All-in-One models,
find the one that fits your needs:

Model Capacity Perpetual Subscription*
USM All-in-One 25A Monitor up to 25 unique assets $3,900 $250/month
USM All-in-One 75A Monitor up to 75 unique assets Instant Quote Instant Quote
USM All-in-One 150A Monitor up to 150 unique assets Instant Quote Instant Quote
USM All-in-One UA Monitor more than 150 unique assets Instant Quote Instant Quote

Note: This is not a complete price list. If you need help determining which version is best for you please contact us.

FACT: In a recent SANS survey, 59% of respondents indicated that a lack of trained security staff and skills were the biggest challenges when it came to threat intelligence and detection / SIEM initiatives.
NDM's Managed Security Services (MSS) will augment your team's resources to help meet the ever growing demands from operations, compliance and security. We will deploy, tune, manage, monitor and operate your Alienvault solution remotely - 24x7x365 - to enable you to take full advantage of what Alienvault can deliver.
NDM's managed security services are not just here to save you money from having to build out an internal team, but also give you time back in your day. Our engineers will sift through the noise, recommend remediation steps if threats are legitimate, and even offer mitigation services as an optional service. We will enable to you focus on what means the most, your business, and leave the time consuming tasks to us.



5 Essential Security Capabilities in a Single Console

The AlienVault Unified Security Management™ (USM) platform provides five essential security capabilities in a single console, giving you everything you need to manage both compliance and threats. Understanding the sensitive nature of IT environments, we include active, passive and host-based technologies so that you can match the requirements of your particular environment.

Asset Discovery

Asset Discovery

Find all assets on your network before a bad actor does
  • Active Network Scanning
  • Passive Network Monitoring
  • Asset Inventory

Learn More

Behavioral Monitoring

Behavioral Monitoring

Identify suspicious behavior and potentially compromised systems
  • Netflow Analysis
  • Service Availability Monitoring
  • Full packet capture

Learn More

Vulnerability Assessment

Vulnerability Assessment

Identify systems on your network that are vulnerable to exploits
  • Network Vulnerability Testing
  • Continuous Vulnerability Monitoring

Learn More

Security Information & Event Management (SIEM)

Security Information & Event Management (SIEM)

Correlate and analyze security event data from across your network
  • Log Management
  • Event Correlation
  • Incident Response
  • Reporting and Alarms

Learn More

Threat Detection

Threat Detection

Detect malicious traffic on your network
  • Network IDS
  • Host IDS
  • File Integrity Monitoring (FIM)

Learn More


More Than Just a SIEM

Traditional SIEM solutions promise to provide what you need – but the path to get there is one most of us can’t afford. Traditional SIEM solutions integrate and analyze the data produced by other security technologies that are already deployed, but unfortunately most mid-market organizations don’t have those other technologies deployed yet! AlienVault USM provides a different path. In addition to all the functionality of a traditional SIEM, AlienVault USM also builds the essential security capabilities into a single platform with no additional feature charges. And AlienVault’s focus on ease of use and deployment makes it the perfect fit for mid-market enterprises and organizations with limited budget and few in-house resources.

Features

AlienVault USM

Traditional SIEM

Management:    
     Log Management
     Event Management
     Event Correlation
     Reporting
     Trouble Ticketing Built-In $$ (3rd-party)
Security Monitoring Technologies:    
     Asset Discovery Built-In $$ (3rd-party)
     Network IDS Built-In $$ (3rd-party)
     Host IDS Built-In $$ (3rd-party)
     Netflow Built-In $$ (3rd-party)
     Full Packet Capture Built-In $$ (3rd-party)
     File Integrity Monitoring Built-In $$ (3rd-party)
     Vulnerability Assessment Built-In $$ (3rd-party)
Additional Capabilities:    
     Continuous Threat Intelligence Built-In $$ (3rd-party)
     Unified Management Console Built-In $$ (3rd-party)

 


Take a Product Tour

  • Real-time threat intelligence utilizes kill-chain taxonomy to identify attackers, their victims, their methods and their intents.
  • Each alarm provides detailed and customized instructions on how to investigate and respond to malicious activity.
  • Customizable executive dashboards provide overviews and click-through details about your security and compliance posture.
  • All you need to know about an asset for incident investigation and response – in one window.
  • Automated asset discovery provides granular details on all devices in your network.
  • Targeted guidance eliminates the guesswork associated with integrating data sources and provides precise suggestions for improving visibility.
  • Built-in network flow analysis provides all the data you need for in-depth investigations – including packet capture.
  • Secure storage of raw event data satisfies regulatory compliance requirements while an easy-to-use interface allows for quick searches.
  • Identify malicious actors attempting to interact with your network using our dynamic IP reputation data.
  • Centralized, integrated "how to" documentation for all you need to know about USM.
  • Built-in network IDS and host IDS results in more accurate threat detection and event correlation, faster deployment and simpler management.
  • Built-in vulnerability assessment simplifies security monitoring and speeds remediation.