Kapcsolat

mail@gemini-theme.com
+ 001 0231 123 32

Kövesse

Info

Minden bemutató tartalom csak mintaként szolgál, egy élő webhely képviseletére. Kérjük, használja a RocketLauncher alkalmazást a demo megfelelőjének telepítéséhez, az összes kép lecserélésre kerül mintaképekre.

Teljes biztonsági láthatóság percek alatt


USM Anywhere központosított biztonsági felügyeletet biztosít a felhő, a helyszíni és a hibrid informatikai környezetek számára, beleértve a végpontokat és a felhőalkalmazásokat, mint például az Office 365 és a G Suite. Több alapvető biztonsági képességgel, egyetlen platformon, USM Anywhere leegyszerűsíti és felgyorsítja a fenyegetések észlelését, az eseményekre való reagálást és a megfelelőség kezelését a mai erőforrás-korlátozott informatikai biztonsági csapatok számára.

Please choose your language / Bitte wählen Sie Ihre Sprache

enfrdehutr

ill cloud platform

Detect threats anywhere

USM Anywhere centralizes security monitoring of networks and devices in the cloud, on premises, and in remote locations, helping you to detect threats virtually anywhere.


Focus on actual threats, starting on day one

46% of users see security alerts within the first hour

Smart, automated data collection & analysis

Automated threat detection powered by AT&T Alien Labs

Incident response orchestration with AlienApps

USM Anywhere automatically collects and analyzes data across your attack surface, helping you to quickly gain centralized security visibility without the complexity of multiple disparate security technologies. With threat intelligence provided by AT&T Alien Labs, USM Anywhere is updated automatically to stay on top of evolving and emerging threats, so your team can focus on responding to alerts. USM Anywhere supports a growing ecosystem of AlienApps, enabling you to orchestrate and automate actions towards other security technologies so you can respond to incidents quickly and easily.

felhő ikonra

USM Anywhere Secure Cloud

USM Anywhere centralizes threat detection, incident response, and compliance management across all of your environments. A cloud-hosted service, USM Anywhere collects and analyzes log data transferred through the USM Anywhere Sensors and AlienVault Agents over an encrypted connection. Log data is stored long-term in the AlienVault Secure Cloud for compliance and forensics requirements, eliminating the challenges and expense of on-premises log storage.


sensor icon

USM Anywhere Sensors & AlienVault Agents

USM Anywhere uses lightweight sensors and endpoint agents deployed in your cloud and on-premises environments to collect and normalize log data and other security-related data. This data is sent to the USM Anywhere service, hosted in the AlienVault Secure Cloud. Each sensor is purpose-built to fully leverage the native data collection methods of each environment: AWS, Azure, and on-premises physical and virtual infrastructure deployed on Hyper-V or VMware. AlienVault Agents collect data from your Windows and Linux endpoints. These are the only components deployed in your environment.


felhő ikonra

USM Anywhere Secure Cloud

USM Anywhere centralizes threat detection, incident response, and compliance management across all of your environments. A cloud-hosted service, USM Anywhere collects and analyzes log data transferred through the USM Anywhere Sensors and AlienVault Agents over an encrypted connection. Log data is stored long-term in the AlienVault Secure Cloud for compliance and forensics requirements, eliminating the challenges and expense of on-premises log storage.

Get multiple security capabilities in one unified platform

Discover

  • Network asset discovery
  • Software & services discovery
  • AWS asset discovery
  • Azure asset discovery

Felismerni

  • Cloud intrusion detection (AWS, Azure)
  • Network intrusion detection (NIDS)
  • Host intrusion detecion (HIDS)
  • Endpoint Detection and Response (EDR)

Értékeljük

  • Vulnerability scanning
  • Cloud infrastructure assessment
  • User & asset configuration
  • Dark web monitoring

Elemez

  • SIEM event correlation, auto-prioritized alarms
  • Felhasználói tevékenység figyelése
  • 90 days of online, searchable events

Reagálni

  • Forensics querying
  • Automate & orchestrate response
  • Notifications and ticketing

Jelentés

  • Pre-built compliance reporting templates
  • Pre-built event reporting templates
  • Customizable views and dashboards
  • Log storage