AlienVault

Jun 4, 2018
2007
San Mateo, CA, USA
Feb 21, 2019   |  By Kate Brew
Given you’re here, you’re likely new to this topic, so please be aware in that fileless malware, fileless malware attack, and fileless attack are different words for the same thing. With that clear, let’s jump in!
Feb 20, 2019   |  By Javvad Malik
Cybersecurity has three pillars of people, process, and technology. Enterprises have historically had a skewed focus towards the technology aspect of cyber security - installing another endpoint agent, or deploying another network monitoring device designed to seek out anomalys behaviour.
Feb 11, 2019   |  By Kate Brew
Faced with challenges such as the persistent cybersecurity skills gap, lack of 24x7 security coverage, increasing security threat pressure, and the cost and complexity of in-house security operations, many organizations are turning to outsourcing of cybersecurity processes and systems.
Feb 6, 2019   |  By Javvad Malik
Way back in around the 2010 / 2011 timeframe Wendy Nather coined the phrase "The Security Poverty Line" in which she hypothesised that organisations, for one reason or another (usually lack of funds), can't afford to reach an effective level of information security. Nearly a decade on, and while the term has sunk into frequent usage within the information security community, are we any better at solving the issue now that we've identified it?
Feb 5, 2019   |  By Devin Morrissey
Online trading is on the rise as many consumers take control of their own investments or work with brokers virtually rather than in person or over the phone. At the same time, cybersecurity attacks are on the rise as hackers also try to take advantage of gaps in the system, stealing identities and even money.
Oct 22, 2018   |  By AlienVault
Phenomenal security. Phenomenal partnership. At AlienVault, we understand that customers rely on your expertise to deliver world-class security solutions specifically designed to protect their unique business. We also know that vetting partnerships opportunities with security vendors is a critical component to delivering those outcomes.
Oct 22, 2018   |  By AlienVault
The Insider’s Guide to Incident Response gives you an in-depth look at the fundamental strategies of efficient and effective incident response for security teams that need to do more with less in today’s rapidly changing threat landscape.
Oct 1, 2018   |  By AlienVault
Get All 5 Chapters of AlienVault’s How to Build a Security Operations Center (On a Budget) in 1 eBook! You'll get an in-depth look at how organizations with limited resources can set up a successful operations center for monitoring, detecting, containing, and remediating IT threats across applications, devices, systems, networks, and locations.
Oct 1, 2018   |  By AlienVault
As organizations around the world shift their workloads to Amazon Web Services (AWS) and other popular cloud infrastructure-as-a-service (IaaS) providers, concerns about cloud security continue to rise. According to a 2018 Cloud Security Report from Cybersecurity Insiders, 91% of respondents are concerned about cloud security, an increase of 11% over last year’s report.
Sep 1, 2018   |  By AlienVault
Criminal organizations and hackers increasingly perceive regional banks and credit unions as attractive targets. That’s why we’ve created this primer—to help IT managers and executives at financial organizations understand not just the top threats they’re facing, but also what they can do to fend them off.
Dec 20, 2018   |  By AlienVault
Discover the power of the unified security platform approach to security at AlienVault® in this brief 10-minute introduction video.
Sep 6, 2018   |  By AlienVault
AlienVault USM simplifies threat detection and analysis. Our unified platform includes pre-integrated tools combined with up-to-the-minute threat intelligence and delivers an easy, effective way to accelerate your threat detection and response. Additionally, our Kill Chain Taxonomy allows you to focus your attention on the most important threats, with attacks classified into five categories and contextual information to help you understand attack intent and threat severity quickly.
Aug 22, 2018   |  By AlienVault
Russ Spitler, AlienVault SVP of Product, discusses how to effectively leverage crowd-sourced threat intelligence in detecting and responding to security threats.
Jul 30, 2018   |  By AlienVault
In this 2-minute video, AlienVault's Javvad Malik explains why endpoint detection and response (EDR) is an essential part of a robust security and compliance program. AlienVault USM Anywhere includes EDR capabilities as part of the Unified Security Management (USM) platform.
Jul 27, 2018   |  By AlienVault
This short video discusses the IT challenges SMB and mid-market organizations face in combating cybersecurity. Listen to the benefits of outsourcing your security monitoring to a Managed Security Service Provider (MSSP) for threat detection, response and compliance.