SlideShare a Scribd company logo
1 of 12
About AlienVault
Founded in 2007 and headquartered in San Mateo, CA with
offices in:
• Madrid, Spain (Sales & Support)
• Austin, Texas (Dev, Engineering, Sales & Support)
• Cork, Ireland (Sales & Support)
Over 14,500 active implementations
Over 1,900 customers
Only company to be named “Visionary” in the Gartner
Magic Quadrant in 2013 and 2014
Backed by Premier Investors including GGV Capital, KPCB,
Trident Capital, and Intel Capital
• Closed on Series D funding in December 2013
Agenda
Threat Landscape
OMB / OPM Government-wide 30-Day Sprint
5 Essential Security Capabilities for Unified Controls
AlienVault Open Threat Exchange – What is it and how do Federal users
benefit?
Solution Architecture
Demonstration – Victor Obando
Q&A
Threat Landscape - Our New Reality
The Public Sector experienced nearly 50 times more
cyber incidents than any other industry in 2014 and it’s
not slowing down into 2015.
Federal CIO’s cannot simply rely on traditional
boundary protection anymore and recruiting top-talent
for cyber security remains a core challenge.
Continuous Monitoring / Diagnostics and Mitigation
(CDM) got off to a fast start, but in order for it to
flourish, it must be a priority for the agency from a
budget and resource perspective
84%
of organizations breached
had evidence of the
breach in their log files…
-2015 Verizon Data Breach Investigations Report
30-Day Sprint - Security “Asks” for Fed Agencies
① Protecting Data: Better protect data at rest and in transit
② Improving Situational Awareness: Improve indication and warning
③ Increasing Cybersecurity Proficiency: Ensure a robust capacity to recruit and retain
cybersecurity personnel
④ Increase Awareness: improve overall risk awareness by all users
⑤ Standardizing and Automating Processes: Decrease time needed to manage
configurations and patch vulnerabilities
⑥ Controlling, Containing, and Recovering from Incidents: Contain malware proliferation,
privilege escalation, and lateral movement. Quickly identify and resolve events and
incidents
⑦ Strengthening Systems Lifecycle Security: Increase inherent security of platforms by
buying more secure systems and retiring legacy systems in a timely manner
⑧ Reducing Attack Surfaces: Decrease complexity and number of things defenders need to
protect
Built-In, Essential Security Capabilities
USM Platform
ASSET DISCOVERY
• Active Network Scanning
• Passive Network Scanning
• Asset Inventory
• Host-based Software Inventory
VULNERABILITY
ASSESSMENT
• Continuous
Vulnerability Monitoring
• Authenticated /
Unauthenticated Active
Scanning
BEHAVIORAL MONITORING
• Log Collection
• Netflow Analysis
• Service Availability Monitoring
SIEM
• SIEM Event Correlation
• Incident Response
INTRUSION DETECTION
• Network IDS
• Host IDS
• File Integrity Monitoring
The ONLY Unified Security Management Solution
AlienVault is the only security vendor that provides the five
essential capabilities in one, pre-integrated solution
Delivers rapid time to visibility and value
Open Threat Exchange:
World’s Largest Crowd-sourced IP Reputation Alerting Platform
• Real-time insights on known,
validated malicious IP addresses and
incidents affecting others globally
• AlienVault Labs reacts to the
emerging threat and publishes new
correlation rules to all of our users
• Every AlienVault USM installation
receives the ThreatExchange update
and protects against potential
attacks
OTX facilitates secure collaboration to identify emerging
threats and prevent compromise. Providing the broadest
based Reputation Feed in the world.
Coordinated Analysis, Actionable Guidance
AlienVault Labs Threat Intelligence:
Weekly updates that cover all
coordinated rulesets:
Network and host-based IDS
signatures – detects the
latest threats in your
environment
Asset discovery signatures
– identifies the latest OS’es,
applications, and device types
Vulnerability assessment
signatures – dual database
coverage to find the latest
vulnerabilities on all your
systems
Correlation rules – translates
raw events into
actionable remediation tasks
Reporting modules –
provides new ways of viewing
data about your environment
Dynamic incident response
templates – delivers
customized guidance on how
to respond to each alert
Newly supported data
source plug-ins – expands
your monitoring footprint
9
AlienVault Solution Architecture – 3 Components
USM Server
• Forensic Console
• Reporting Engine
• Event Correlation
• Vulnerability Management
• Availability Monitoring
• Incident Management
• Policy based Event Filtering
Sensor
• Event Collection/Normalizer
• Threat Detection
• Vulnerability Scanner
• Netflow Protocol Analysis
Logger
• Forensic Event Storage
• Digitally Time-Stamped Raw Logs
• Fully Searchable
DEMO
888.613.6023
ALIENVAULT.COM
CONTACT US
HELLO@ALIENVAULT.COM
Now for some Questions..
Questions? Hello@AlienVault.com
Twitter : @alienvault
Test Drive AlienVault USM
Download a Free 30-Day Trial
http://www.alienvault.com/free-trial
Check out our 15-Day Trial of USM for AWS
https://www.alienvault.com/free-trial/usm-for-aws
Try our Interactive Demo Site
http://www.alienvault.com/live-demo-site

More Related Content

What's hot

AWS Security Best Practices for Effective Threat Detection & Response
AWS Security Best Practices for Effective Threat Detection & ResponseAWS Security Best Practices for Effective Threat Detection & Response
AWS Security Best Practices for Effective Threat Detection & Response
AlienVault
 
Automating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and ComplianceAutomating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and Compliance
Qualys
 

What's hot (20)

IDS for Security Analysts: How to Get Actionable Insights from your IDS
IDS for Security Analysts: How to Get Actionable Insights from your IDSIDS for Security Analysts: How to Get Actionable Insights from your IDS
IDS for Security Analysts: How to Get Actionable Insights from your IDS
 
Insider Threats: How to Spot Trouble Quickly with AlienVault USM
Insider Threats: How to Spot Trouble Quickly with AlienVault USMInsider Threats: How to Spot Trouble Quickly with AlienVault USM
Insider Threats: How to Spot Trouble Quickly with AlienVault USM
 
Simplify PCI DSS Compliance with AlienVault USM
Simplify PCI DSS Compliance with AlienVault USMSimplify PCI DSS Compliance with AlienVault USM
Simplify PCI DSS Compliance with AlienVault USM
 
Malware detection how to spot infections early with alien vault usm
Malware detection how to spot infections early with alien vault usmMalware detection how to spot infections early with alien vault usm
Malware detection how to spot infections early with alien vault usm
 
How to Solve Your Top IT Security Reporting Challenges with AlienVault
How to Solve Your Top IT Security Reporting Challenges with AlienVaultHow to Solve Your Top IT Security Reporting Challenges with AlienVault
How to Solve Your Top IT Security Reporting Challenges with AlienVault
 
Demo how to detect ransomware with alien vault usm_gg
Demo  how to detect ransomware with alien vault usm_ggDemo  how to detect ransomware with alien vault usm_gg
Demo how to detect ransomware with alien vault usm_gg
 
Open Source IDS Tools: A Beginner's Guide
Open Source IDS Tools: A Beginner's GuideOpen Source IDS Tools: A Beginner's Guide
Open Source IDS Tools: A Beginner's Guide
 
Creating Correlation Rules in AlienVault
Creating Correlation Rules in AlienVaultCreating Correlation Rules in AlienVault
Creating Correlation Rules in AlienVault
 
How to Detect a Cryptolocker Infection with AlienVault USM
How to Detect a Cryptolocker Infection with AlienVault USMHow to Detect a Cryptolocker Infection with AlienVault USM
How to Detect a Cryptolocker Infection with AlienVault USM
 
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
 
Six Steps to SIEM Success
Six Steps to SIEM SuccessSix Steps to SIEM Success
Six Steps to SIEM Success
 
Improve Threat Detection with OSSEC and AlienVault USM
Improve Threat Detection with OSSEC and AlienVault USMImprove Threat Detection with OSSEC and AlienVault USM
Improve Threat Detection with OSSEC and AlienVault USM
 
How to Detect SQL Injections & XSS Attacks with AlienVault USM
How to Detect SQL Injections & XSS Attacks with AlienVault USM How to Detect SQL Injections & XSS Attacks with AlienVault USM
How to Detect SQL Injections & XSS Attacks with AlienVault USM
 
AWS Security Best Practices for Effective Threat Detection & Response
AWS Security Best Practices for Effective Threat Detection & ResponseAWS Security Best Practices for Effective Threat Detection & Response
AWS Security Best Practices for Effective Threat Detection & Response
 
Automating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and ComplianceAutomating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and Compliance
 
Beginner's Guide to SIEM
Beginner's Guide to SIEM Beginner's Guide to SIEM
Beginner's Guide to SIEM
 
Watering Hole Attacks: Detect End-User Compromise Before the Damage is Done
Watering Hole Attacks: Detect End-User Compromise Before the Damage is DoneWatering Hole Attacks: Detect End-User Compromise Before the Damage is Done
Watering Hole Attacks: Detect End-User Compromise Before the Damage is Done
 
Safeguard your enterprise against ransomware
Safeguard your enterprise against ransomwareSafeguard your enterprise against ransomware
Safeguard your enterprise against ransomware
 
How to Simplify Audit Compliance with Unified Security Management
How to Simplify Audit Compliance with Unified Security ManagementHow to Simplify Audit Compliance with Unified Security Management
How to Simplify Audit Compliance with Unified Security Management
 
Otx introduction sw
Otx introduction swOtx introduction sw
Otx introduction sw
 

Viewers also liked

Viewers also liked (10)

Improve Security Visibility with AlienVault USM Correlation Directives
Improve Security Visibility with AlienVault USM Correlation DirectivesImprove Security Visibility with AlienVault USM Correlation Directives
Improve Security Visibility with AlienVault USM Correlation Directives
 
Security operations center 5 security controls
 Security operations center 5 security controls Security operations center 5 security controls
Security operations center 5 security controls
 
New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever
 New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever
New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever
 
Science of Security: Cyber Ecosystem Attack Analysis Methodology
Science of Security: Cyber Ecosystem Attack Analysis MethodologyScience of Security: Cyber Ecosystem Attack Analysis Methodology
Science of Security: Cyber Ecosystem Attack Analysis Methodology
 
Alien vault sans cyber threat intelligence
Alien vault sans cyber threat intelligenceAlien vault sans cyber threat intelligence
Alien vault sans cyber threat intelligence
 
The State of Incident Response - INFOGRAPHIC
The State of Incident Response - INFOGRAPHICThe State of Incident Response - INFOGRAPHIC
The State of Incident Response - INFOGRAPHIC
 
Advanced OSSEC Training: Integration Strategies for Open Source Security
Advanced OSSEC Training: Integration Strategies for Open Source SecurityAdvanced OSSEC Training: Integration Strategies for Open Source Security
Advanced OSSEC Training: Integration Strategies for Open Source Security
 
PCI DSS Implementation: A Five Step Guide
PCI DSS Implementation: A Five Step GuidePCI DSS Implementation: A Five Step Guide
PCI DSS Implementation: A Five Step Guide
 
Insider Threat Detection Recommendations
Insider Threat Detection RecommendationsInsider Threat Detection Recommendations
Insider Threat Detection Recommendations
 
HP ArcSight
HP ArcSight HP ArcSight
HP ArcSight
 

Similar to Improve Situational Awareness for Federal Government with AlienVault USM

SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
Norm Barber
 

Similar to Improve Situational Awareness for Federal Government with AlienVault USM (20)

TIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentTIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
 
Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.
 
CSO CXO Series Breakfast
CSO CXO Series BreakfastCSO CXO Series Breakfast
CSO CXO Series Breakfast
 
Managed Security Operations Centre Alternative - Managed Security Service
Managed Security Operations Centre Alternative - Managed Security Service Managed Security Operations Centre Alternative - Managed Security Service
Managed Security Operations Centre Alternative - Managed Security Service
 
AlienVault MSSP Overview - A Different Approach to Security for MSSP's
AlienVault MSSP Overview - A Different Approach to Security for MSSP'sAlienVault MSSP Overview - A Different Approach to Security for MSSP's
AlienVault MSSP Overview - A Different Approach to Security for MSSP's
 
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
 
Marlabs cyber threat management
Marlabs cyber threat managementMarlabs cyber threat management
Marlabs cyber threat management
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
 
Managed security services
Managed security servicesManaged security services
Managed security services
 
Managing security threats in today’s enterprise
Managing security threats in today’s enterpriseManaging security threats in today’s enterprise
Managing security threats in today’s enterprise
 
5 Steps to an Effective Vulnerability Management Program
5 Steps to an Effective Vulnerability Management Program5 Steps to an Effective Vulnerability Management Program
5 Steps to an Effective Vulnerability Management Program
 
OpenText Cyber Resilience Fastrak
OpenText Cyber Resilience FastrakOpenText Cyber Resilience Fastrak
OpenText Cyber Resilience Fastrak
 
8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf
 
8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx
 
Reveelium Smart Predictive Analytics - Datasheet EN
Reveelium Smart Predictive Analytics - Datasheet ENReveelium Smart Predictive Analytics - Datasheet EN
Reveelium Smart Predictive Analytics - Datasheet EN
 
Infrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathInfrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy Hiremath
 
seqrite-mssp-portal-datasheet.pdf
seqrite-mssp-portal-datasheet.pdfseqrite-mssp-portal-datasheet.pdf
seqrite-mssp-portal-datasheet.pdf
 
Tyler Technology Expo
Tyler Technology ExpoTyler Technology Expo
Tyler Technology Expo
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Improve Situational Awareness for Federal Government with AlienVault USM

  • 1.
  • 2. About AlienVault Founded in 2007 and headquartered in San Mateo, CA with offices in: • Madrid, Spain (Sales & Support) • Austin, Texas (Dev, Engineering, Sales & Support) • Cork, Ireland (Sales & Support) Over 14,500 active implementations Over 1,900 customers Only company to be named “Visionary” in the Gartner Magic Quadrant in 2013 and 2014 Backed by Premier Investors including GGV Capital, KPCB, Trident Capital, and Intel Capital • Closed on Series D funding in December 2013
  • 3. Agenda Threat Landscape OMB / OPM Government-wide 30-Day Sprint 5 Essential Security Capabilities for Unified Controls AlienVault Open Threat Exchange – What is it and how do Federal users benefit? Solution Architecture Demonstration – Victor Obando Q&A
  • 4. Threat Landscape - Our New Reality The Public Sector experienced nearly 50 times more cyber incidents than any other industry in 2014 and it’s not slowing down into 2015. Federal CIO’s cannot simply rely on traditional boundary protection anymore and recruiting top-talent for cyber security remains a core challenge. Continuous Monitoring / Diagnostics and Mitigation (CDM) got off to a fast start, but in order for it to flourish, it must be a priority for the agency from a budget and resource perspective 84% of organizations breached had evidence of the breach in their log files… -2015 Verizon Data Breach Investigations Report
  • 5. 30-Day Sprint - Security “Asks” for Fed Agencies ① Protecting Data: Better protect data at rest and in transit ② Improving Situational Awareness: Improve indication and warning ③ Increasing Cybersecurity Proficiency: Ensure a robust capacity to recruit and retain cybersecurity personnel ④ Increase Awareness: improve overall risk awareness by all users ⑤ Standardizing and Automating Processes: Decrease time needed to manage configurations and patch vulnerabilities ⑥ Controlling, Containing, and Recovering from Incidents: Contain malware proliferation, privilege escalation, and lateral movement. Quickly identify and resolve events and incidents ⑦ Strengthening Systems Lifecycle Security: Increase inherent security of platforms by buying more secure systems and retiring legacy systems in a timely manner ⑧ Reducing Attack Surfaces: Decrease complexity and number of things defenders need to protect
  • 6. Built-In, Essential Security Capabilities USM Platform ASSET DISCOVERY • Active Network Scanning • Passive Network Scanning • Asset Inventory • Host-based Software Inventory VULNERABILITY ASSESSMENT • Continuous Vulnerability Monitoring • Authenticated / Unauthenticated Active Scanning BEHAVIORAL MONITORING • Log Collection • Netflow Analysis • Service Availability Monitoring SIEM • SIEM Event Correlation • Incident Response INTRUSION DETECTION • Network IDS • Host IDS • File Integrity Monitoring
  • 7. The ONLY Unified Security Management Solution AlienVault is the only security vendor that provides the five essential capabilities in one, pre-integrated solution Delivers rapid time to visibility and value
  • 8. Open Threat Exchange: World’s Largest Crowd-sourced IP Reputation Alerting Platform • Real-time insights on known, validated malicious IP addresses and incidents affecting others globally • AlienVault Labs reacts to the emerging threat and publishes new correlation rules to all of our users • Every AlienVault USM installation receives the ThreatExchange update and protects against potential attacks OTX facilitates secure collaboration to identify emerging threats and prevent compromise. Providing the broadest based Reputation Feed in the world.
  • 9. Coordinated Analysis, Actionable Guidance AlienVault Labs Threat Intelligence: Weekly updates that cover all coordinated rulesets: Network and host-based IDS signatures – detects the latest threats in your environment Asset discovery signatures – identifies the latest OS’es, applications, and device types Vulnerability assessment signatures – dual database coverage to find the latest vulnerabilities on all your systems Correlation rules – translates raw events into actionable remediation tasks Reporting modules – provides new ways of viewing data about your environment Dynamic incident response templates – delivers customized guidance on how to respond to each alert Newly supported data source plug-ins – expands your monitoring footprint 9
  • 10. AlienVault Solution Architecture – 3 Components USM Server • Forensic Console • Reporting Engine • Event Correlation • Vulnerability Management • Availability Monitoring • Incident Management • Policy based Event Filtering Sensor • Event Collection/Normalizer • Threat Detection • Vulnerability Scanner • Netflow Protocol Analysis Logger • Forensic Event Storage • Digitally Time-Stamped Raw Logs • Fully Searchable
  • 11. DEMO
  • 12. 888.613.6023 ALIENVAULT.COM CONTACT US HELLO@ALIENVAULT.COM Now for some Questions.. Questions? Hello@AlienVault.com Twitter : @alienvault Test Drive AlienVault USM Download a Free 30-Day Trial http://www.alienvault.com/free-trial Check out our 15-Day Trial of USM for AWS https://www.alienvault.com/free-trial/usm-for-aws Try our Interactive Demo Site http://www.alienvault.com/live-demo-site

Editor's Notes

  1. A little background on AlienVault if you’re new to us. We were founded in 2007 with the purpose of simplifying security operations by consolidating separate point products to be managed from a single platform. We’re headquartered in San Mateo, CA where I’m sitting at today and currently have offices in Madrid, Austin, Cork, and the UK We’ll certainly talk more about the platform and how we’re assisting Federal organizations with improving Situational Awareness through this Unified approach later in the presentation, however just a quick summary… since 2007 the flagship USM platform has grown to integrate approximately two dozen separate security technologies that has been deployed in over 1,900 customer networks in North and South America, Europe, and Asia. With a pretty substantial footprint in the Federal space whether it be through Systems Integrators working on behalf of Federal agencies or within the various agencies you see on the right. These all represent active customers and how we’re solving the fundamental situational awareness challenge by providing folks with a comprehensive set of tools, operating on a single platform without the need for significant spend nor IT headcount to manage it all. We are on extremely solid financial footing, with backing from some of the most well-known VC in Silicon Valley. We closed our Series D funding at the end of 2013. And Gartner has named us ‘Visionary’ in their SIEM magic quadrant for two years in a row.
  2. So, a little about the threat landscape we’re faced with that inevitably and constantly changes. The 2015 Verizon Data Breach Investigations Report points out that the Public Sector experienced nearly 50 times more cyber incidents than any other industry in 2014. Not necessarily shocking considering the information that cyber criminals are seeking, but the important thing to take away is that More and more Federal agencies are finding themselves in the crosshairs of various bad actors. Whether it be through phishing campagins, engineered spam, or other external threats, the sophistication of attacks through multiple threat vectors has changed dramatically., and it’s tough to keep up.
  3. Most of you may be familiar with the 30-day sprint that was put in place by the Office of Management and Budget CIO Tony Scott, shortly after the OPM incident. This is a breakdown of the 8 priority areas he’s focusing on as government-wide security asks, giving agencies 30-days to shore up there systems and report back on where they’re gapped. The end goal of all of this will be to issue a Federal Civilian Cybersecurity Strategy based on their findings. Now when you look at this, some of you might be a little surprised as to how basic the asks are and some of you might be shaking your head in agreement. Things such as: protecting data, increase risk awareness, improve situational awareness
  4. ----- Meeting Notes (4/17/15 15:31) ----- These 5 essential capabilities are the strength of the platform Rename Threat Detection "Intrusion Detection"
  5. Open Threat Exchange: World’s Largest Crowd-sourced IP Reputation Alerting Platform