Find, Verify, & Remove Vulnerabilities Rapidly

Vulnerability Assessment Software

Watch Vulnerability Assessment Best Practices

AlienVault Unified Security Management™ (USM) provides built-in vulnerability assessment with the essential capabilities you need for complete security visibility and threat intelligence, all in one easy-to-use console.

This page will help you understand how AlienVault USM™ enables you to:

  • Get built-in vulnerability assessment capabilities
  • Scan and monitor for new vulnerabilities continuously
  • Prioritize and remediate vulnerabilities more effectively
  • Gain complete security visibility and threat detection
  • Detect the latest threats with continuous threat intelligence
Download A Free Trial

Get Immediate Results on Day One

  • Deploy quickly: Go from download to detection in less than one hour
  • Auto-discover asset information: Collect device, software, configuration, vulnerability, and active threat data
  • Get actionable, relevant threat intelligence: See prioritized threats, detailed context, and remediation guidance

2 Million
records were put at risk in a breach involving keylogging
software. The attack affected at least 93,000 websites –
including brand names like ADP, Facebook, Gmail,
LinkedIn, Twitter, Yahoo, and more.

Vulnerability Assessment Built-In

Detect, Prioritize, and Remediate Security Risk Fast

Vulnerability Assessment starts with Asset Discovery, which is essential to have for overall visibility of your network. It also helps you target the range of IPs for your vulnerability scan. You can granularly define the vulnerability scan to specific network segments and assets of interest. Scans can be either done ad-hoc or scheduled on regular intervals. With the number of network security events rising every year, it is essential for you to prioritize your remediation efforts and deploy the most important patches and security updates first. AlienVault USM can report on scanning results regularly to management to assist in documenting remediation progress. USM’s built-in vulnerability assessment filters through the noise of false positives and vulnerabilities that are less important and allows you to focus on risks that truly matter to your business.

Understand your network before scanning

USM provides auto-discovered, detailed asset information to help you visualize your entire network. You should focus your Vulnerability scans, at a minimum, on externally accessible assets that are the most important to the health of your business.

Scanning and reporting can be done on-demand, in response to an incident, or scheduled

USM allows you to schedule vulnerability scans to meet your requirements, such as hourly, weekly or monthly. In addition, you can scan more important network segments or groups more regularly. USM also provides flexible reporting, which can be done ad-hoc, or on a scheduled basis and sent to email addresses you specify.

Vulnerability scanning needs to provide you actionable information

Finding, verifying, and fixing vulnerabilities is a constant battle for IT. AlienVault USM helps accelerate that task by providing not only vulnerability scanning and assessment, but also details about the vulnerabilities themselves. The ability to see external threat information, such as communication with known malicious hosts via the community-powered Open Threat Exchange™ data delivered automatically into USM, helps prioritize your remediation efforts. In addition, AlienVault’s USM integrated Host and Network IDS and SIEM provide rich contextual information to help with incident response.

Vulnerability information adds context for security incident response

As new threats enter the security landscape, you will be able to run vulnerability scans on-the-fly to help determine if you are vulnerable to new exploits. You will also be able to see the last scan results across your assets, to assist in incident response. You can see vulnerability and asset information conveniently displayed in a single console with USM.