Analytics
1/15/2013
07:43 AM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

AlienVault Unified Security Management Platform Provides Security Visibility For Amazon EC2

Release 4.1 simplifies and speeds SIEM deployment

San Mateo, Calif., January 15, 2012 - AlienVault, the leading Unified Security Management provider committed to making security visibility complete, simple and affordable, announced today its latest 4.1 release, which aims to resolve the biggest challenges associated with traditional SIEM solutions including cost, complexity and difficult deployments. AlienVault Unified Security Management&trade (AV-USM&trade) platform 4.1 simplifies and speeds SIEM deployments and provides intelligent security incident response guidance.

AV-USM 4.1 also extends AlienVault's best-of-breed security monitoring capabilities to Amazon EC2 to enable greater control over hybrid environments.

"Lack of security visibility and control is a primary concern when businesses move workloads to the cloud," said Russ Spitler, VP of Product Management at AlienVault. "Traditional SIEM solutions are extremely limited in their ability to monitor cloud environments, leaving companies with siloed assets and glaring holes in their security risk posture. By enabling the AV-USM platform to monitor Amazon EC2, AlienVault customers can lower their costs, optimize their IT environments and get security wherever they need it to be, without sacrificing visibility in their own private datacenters or the public cloud."

New features in the AlienVault Unified Security Management platform 4.1 include:

• Support for Amazon EC2: "Instant-on" essential security capabilities match the elasticity of the EC2 cloud environment and enable unified security monitoring whether assets are in the cloud or data center.

• Auto-Deploy: Automatically identifies potential data sources upon deployment with integrated discovery capabilities and removes the "guesswork" common with traditional SIEM deployments.

• Dynamic Incident Response Templates: Extends SIEM functionality past the alert by providing customized, contextually relevant workflow-driven response procedures so that analysts know exactly what to do next.

• Suricata IDS Profile: Provides an alternative to the SNORT IDS engine with enhanced threat detection, analysis and performance.

Based on the open source project OSSIM, the AV-USM platform combines more than 30 of the best security technologies and provides security analysts with five essential security capabilities including asset detection, vulnerability assessment, threat detection, behavioral monitoring and security intelligence capabilities in a single, unified solution and management console. The AlienVault Open Threat Exchange&trade is the largest community sourced threat database and intelligence feed, and is built into the AV-USM platform and OSSIM to provide security analysts with real-time collaborative defense.

"Since our business is completely built on IaaS providers, we need to find a way to get reliable security visibility in this environment," said Fredrick Lee, Lead Security Engineer for Twilio. "A lot of traditional security solutions fall short when facing the challenges of deploying in the cloud. AlienVault USM provides a great way to deploy the security capabilities I find essential - IDS, vulnerability assessment, SIEM - quickly and completely."

AlienVault has also launched a new documentation portal, the AlienVault Repository of Knowledge (ARK), which complements the support forum and provides access to interactive assets, product documents and how-to videos for the larger OSSIM community.

The latest version of the AlienVault Unified Security Management platform 4.1 is available now.

Online Resources

• Watch "What's New in 4.1" & "OSSIM for EC2" demo videos

• Access AlienVault Repository of Knowledge

• Learn more about AlienVault's Unified Security Management platform

• Visit AlienVault's Open Minds Exchange

• Download OSSIM or participate in the OSSIM Community

About AlienVault

AlienVault's Unified Security Management&trade platform (AV-USM&trade) provides a fast and cost effective way for organizations with limited security staff and budget to address compliance and threat management needs. With all of the essential security controls built-in, the AVUSM puts enterprise-class security visibility within fast and easy reach of smaller security teams who need to do more with less. AlienVault's Open Threat Exchange&trade, a system for sharing threat intelligence among OSSIM users and AlienVault customers, ensures AV-USM always stays ahead of threats. AlienVault is a privately held company headquartered in Silicon Valley and backed by Kleiner Perkins Caufield & Byers, Sigma, Trident Capital and Adara Venture Partners. For more information visit www.AlienVault.com or follow us on Twitter.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Threat Intel Today
Threat Intel Today
The 397 respondents to our new survey buy into using intel to stay ahead of attackers: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-5242
Published: 2014-10-21
Directory traversal vulnerability in functions/suggest.php in Banana Dance B.2.6 and earlier allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the name parameter in a get_template action.

CVE-2012-5243
Published: 2014-10-21
functions/suggest.php in Banana Dance B.2.6 and earlier allows remote attackers to read arbitrary database information via a crafted request.

CVE-2012-5702
Published: 2014-10-21
Multiple cross-site scripting (XSS) vulnerabilities in dotProject before 2.1.7 allow remote attackers to inject arbitrary web script or HTML via the (1) callback parameter in a color_selector action, (2) field parameter in a date_format action, or (3) company_name parameter in an addedit action to i...

CVE-2013-7406
Published: 2014-10-21
SQL injection vulnerability in the MRBS module for Drupal allows remote attackers to execute arbitrary SQL commands via unspecified vectors.

CVE-2014-2531
Published: 2014-10-21
SQL injection vulnerability in xhr.php in InterWorx Web Control Panel (aka InterWorx Hosting Control Panel and InterWorx-CP) before 5.0.14 build 577 allows remote authenticated users to execute arbitrary SQL commands via the i parameter in a search action to the (1) NodeWorx , (2) SiteWorx, or (3) R...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.