Personal Information
Organization / Workplace
San Francisco Bay Area, CA United States
Industry
Technology / Software / Internet
Website
About
AlienVault is fanatical about putting our customers first in everything we do. We want to make it easy for you to start detecting threats on day one, without any frustration. As a result, we’ve packaged our tools and intelligence into beautiful products that are easy to use, simple to set up, and place the information you need right at your fingertips. Plus, you can choose the deployment option that is right for you – on-premise, in the cloud, or as a service through our MSSP partners.
AlienVault Unified Security Management (USM) – combines 5 key security capabilities with expert threat intelligence that is updated every 30 minutes with data from the Open Threat Exchange (OTX).
Contact Details
Tags
alienvault
siem
information security
threat detection
security information and event management
ossim
unified security management
threat intelligence
security
pci dss
incident response
usm
alienvault usm
compliance
log management
vulnerability management
open threat exchange
malware
pci compliance
open source threat intelligence
pci
it security
ids
open source
vulnerability assessment
security visibility
threat intelligence feed
sans institution
spiceworks
security operations center
ntop
ossim siem open source security mangement sim snor
infosec
log correlation
unified security management platform
soc
information technology
vulnerability scanning
ossec
intrusion detection system
open source security
27001
sem
logger
openvas
cyber security
computer security
snort
security operations center best practices
hipaa
threat landscape
threat alerts
mike rothman
system compromise security
it compliance
security breach
ransomware
log collection and analysis
threat detection strategy
alienvualt
data exfiltration methods
security monitoring
data exfiltration detection
open source threat intelligence feed
security operation center processes
designing a security operation center
nessus
open source security software
open source security tools
iso
xss attacks
sql injections
asset detection
system compromise
data exfiltration
brute force attacks
nagios
asset discovery
otx
sans
bash
shell shock
pci dss implementation
pci compliance software
hids
ip reputation
ip address
insider thereat
open source siem
types of malware
host-based ids systems
sans incident response
logrhythm
privacy
webinar
demo
apts
log analysis
alerts
arpwatch
kismet
p0f
nmap
pads
storage
forensics
netflow
sim
monitori
information
managent
27002
network
events
dss
ossimnet
hackers
open t
domain reputation
cif
marquette
opensource
network security
mobile security
byod
zero day
it
vulnerability scanner
nids
nfsen
wids
tcptrack
wireless
alienvaultcom
aws security
how malware works
insider threat detection tools
insider threat detection monitoring
insider threat
insider threat detection
2016 it security predictions
2016 predictions
intrusion detection tools
ids tools
network ids
open source intrusion detection
rootkit
rat
malware detection
backdoor
payment card industry security standards
pci dss compliance
pci compliance checklist
pci implementation guide
pci implementation
pci dss implementation guide
security incident investigation
federal government
cpu
spectre
meltdown
alienvault labs
wannacry
hipaa compliance
nist
host botnet detection
botnets
static botnet detection
command and control server detection
botnet detection
network botnet detection
behavioral botnet detection
point of sale malware
pos security software
point of sale
pos security
point of sale security
pos malware
open source intrusion detection tools
open source ids tools
siem for beginners
heartbleed bug
heartbleed exploit
roger thronton
sc magazine
jaime blasco
securosis
open threat intelligence
pci reporting requirements
glba
audit and it compliance
cryptowall vulnerability
cryptowall detection
watering hole attack
wateringhole attacks
managed security services provider
mssp
cryptolocker
security compliance
owasp
roi
heartbleed
windows xp
log aggregation
conrad constantine
aws security best practices
higher education
correlation directives
amazon web services
aws
ossim siem open source security mangement
security best practices
security analysts
cyber threat intelligence
cuispa 2015
red team and blue team
security collaboration
essential security controls
secur
incident response capabilities
intrusion prevention system
ips
data breaches
it security analysis
building a security operation center
network security operation center
system compromise threat
building a security operations center
heartbleed vulnerability
See more
- Presentations
- Documents
- Infographics