Analytics
1/15/2013
07:43 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

AlienVault Unified Security Management Platform Provides Security Visibility For Amazon EC2

Release 4.1 simplifies and speeds SIEM deployment

San Mateo, Calif., January 15, 2012 - AlienVault, the leading Unified Security Management provider committed to making security visibility complete, simple and affordable, announced today its latest 4.1 release, which aims to resolve the biggest challenges associated with traditional SIEM solutions including cost, complexity and difficult deployments. AlienVault Unified Security Management&trade (AV-USM&trade) platform 4.1 simplifies and speeds SIEM deployments and provides intelligent security incident response guidance.

AV-USM 4.1 also extends AlienVault's best-of-breed security monitoring capabilities to Amazon EC2 to enable greater control over hybrid environments.

"Lack of security visibility and control is a primary concern when businesses move workloads to the cloud," said Russ Spitler, VP of Product Management at AlienVault. "Traditional SIEM solutions are extremely limited in their ability to monitor cloud environments, leaving companies with siloed assets and glaring holes in their security risk posture. By enabling the AV-USM platform to monitor Amazon EC2, AlienVault customers can lower their costs, optimize their IT environments and get security wherever they need it to be, without sacrificing visibility in their own private datacenters or the public cloud."

New features in the AlienVault Unified Security Management platform 4.1 include:

• Support for Amazon EC2: "Instant-on" essential security capabilities match the elasticity of the EC2 cloud environment and enable unified security monitoring whether assets are in the cloud or data center.

• Auto-Deploy: Automatically identifies potential data sources upon deployment with integrated discovery capabilities and removes the "guesswork" common with traditional SIEM deployments.

• Dynamic Incident Response Templates: Extends SIEM functionality past the alert by providing customized, contextually relevant workflow-driven response procedures so that analysts know exactly what to do next.

• Suricata IDS Profile: Provides an alternative to the SNORT IDS engine with enhanced threat detection, analysis and performance.

Based on the open source project OSSIM, the AV-USM platform combines more than 30 of the best security technologies and provides security analysts with five essential security capabilities including asset detection, vulnerability assessment, threat detection, behavioral monitoring and security intelligence capabilities in a single, unified solution and management console. The AlienVault Open Threat Exchange&trade is the largest community sourced threat database and intelligence feed, and is built into the AV-USM platform and OSSIM to provide security analysts with real-time collaborative defense.

"Since our business is completely built on IaaS providers, we need to find a way to get reliable security visibility in this environment," said Fredrick Lee, Lead Security Engineer for Twilio. "A lot of traditional security solutions fall short when facing the challenges of deploying in the cloud. AlienVault USM provides a great way to deploy the security capabilities I find essential - IDS, vulnerability assessment, SIEM - quickly and completely."

AlienVault has also launched a new documentation portal, the AlienVault Repository of Knowledge (ARK), which complements the support forum and provides access to interactive assets, product documents and how-to videos for the larger OSSIM community.

The latest version of the AlienVault Unified Security Management platform 4.1 is available now.

Online Resources

• Watch "What's New in 4.1" & "OSSIM for EC2" demo videos

• Access AlienVault Repository of Knowledge

• Learn more about AlienVault's Unified Security Management platform

• Visit AlienVault's Open Minds Exchange

• Download OSSIM or participate in the OSSIM Community

About AlienVault

AlienVault's Unified Security Management&trade platform (AV-USM&trade) provides a fast and cost effective way for organizations with limited security staff and budget to address compliance and threat management needs. With all of the essential security controls built-in, the AVUSM puts enterprise-class security visibility within fast and easy reach of smaller security teams who need to do more with less. AlienVault's Open Threat Exchange&trade, a system for sharing threat intelligence among OSSIM users and AlienVault customers, ensures AV-USM always stays ahead of threats. AlienVault is a privately held company headquartered in Silicon Valley and backed by Kleiner Perkins Caufield & Byers, Sigma, Trident Capital and Adara Venture Partners. For more information visit www.AlienVault.com or follow us on Twitter.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Experienced reindeers wanted
Current Issue
Five Things Every Business Executive Should Know About Cybersecurity
Don't get lost in security's technical minutiae - a clearer picture of what's at stake can help align business imperatives with technology execution.
Flash Poll
Dark Reading Strategic Security Report: The Impact of Enterprise Data Breaches
Dark Reading Strategic Security Report: The Impact of Enterprise Data Breaches
Social engineering, ransomware, and other sophisticated exploits are leading to new IT security compromises every day. Dark Reading's 2016 Strategic Security Survey polled 300 IT and security professionals to get information on breach incidents, the fallout they caused, and how recent events are shaping preparations for inevitable attacks in the coming year. Download this report to get a look at data from the survey and to find out what a breach might mean for your organization.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
Security researchers are finding that there's a growing market for the vulnerabilities they discover and persistent conundrum as to the right way to disclose them. Dark Reading editors will speak to experts -- Veracode CTO and co-founder Chris Wysopal and HackerOne co-founder and CTO Alex Rice -- about bug bounties and the expanding market for zero-day security vulnerabilities.