![]() ![]() The AlienVault Approach Security Intelligence Ĭoordinated a nalysis, a c:onable g uidance § Weekly updates to coordinated rule sets: § Network IDS § Host IDS § Asset discovery / inventory database § Vulnerability database § Event correla:on § Report modules and templates § Incident response templates / “how to” guidance for each alarm § Plug-‐ins to accommodate new data sourcesĪlienVault Server to aggregate data and manage the deploymentĪlienVault Logger for long term storage and reportingĪlienVault Sensor to collect data from the infrastructureĪlienVault All-in-One to collect, aggregate, and store data as well as manage Network IDS Host IDS Wireless IDS File Integrity Monitoring $30M Series D GGV Capital lead Virtual appliance & USM free trial launched April OTX expands to 8k+ contributors, >140 countries USM 4.4Īctive Network Scanning Passive Network Scanning Asset Inventory Host-based Software Inventory Trident Capital discovers a diamond in the rough ![]() OSSIM unchallenged as the de-facto standard Open Source SIEMĪlienVault founded to support key customers: EADS, Spanish Govt, and Telefonica ![]() ![]() USM 4.0 & 4.1 MSSP analysts overwhelmed with data OSSIM is battle-tested in MSSP operations ! AlienVault is the leading provider of Unified Security Management and crowd-sourced threat intelligence technology required to detect and act on today’s advanced cyber threats.īuilt by Security Practitioners, For Security Practitioners 1996Įstablishes MSSP in Spain, assembles top team of “ethical hackers” Source: Verizon 2013 Data Breach Investigations Report Source: 2013 Cost of Cyber Crime Study: United States, Ponemon Institute October 2013Ħ6% of Breaches Go Undiscovered for Months Response = otx.Unified Security Management and Open Threat Exchange RICHARD KIRK SENIOR VICE PRESIDENT 11 SEPTEMBER 2014Īgenda ! A quick intro to AlienVault Unified Security Management (USM) ! Overview of the AlienVault Open Threat Exchange (OTX) ! How threat intelligence is gathered and vetted ! Examples of the types of threats you can identify with OTX ! How to use the threat data provided by OTX free services ! Questions? Jupyter notebook howto_use_python_otx_api.ipynb Example
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |