Hotline:+254-722-955831 NHIF Building, 2nd Floor, Ragati Road, Upper Hill, Nairobi
IT Security Risk Management

You are here

Home / Our Services / IT Security Risk Management

The Unified Security Management Difference

We leverage on commercial open source solutions to provide our clients with world class IT secirity solutions. We are a certified (Managed Security Services Provider (MSSP) Partner  for Alien Vault. Alien Vault Unified Security Management (USM) is the leading open source security management solution, providing the best network security visibility within hours of installation.  AlienVault Unified Security Management (USM) builds all of the essential security capabilities you need into a single platform that is affordable, easy to use and easy to deploy. That makes it a perfect fit for mid-market enterprises and organizations with limited budget and few in-house resources.

5 Essential Security Capabilities in a Single Console

The AlienVault Unified Security Management (USM) platform provides five essential security capabilities in a single console, giving you everything you need to manage both compliance and threats. Understanding the sensitive nature of IT environments, we include active, passive and host-based technologies so that you can match the requirements of your particular environment.

Overall: Threat Intelligence.

Security Information and Event Management (SIEM)

Correlate and analyze security event data from across your network

  • Log Management
  • Event Correlation
  • Incident Response
  • Reporting and Alarms

Vulnerability Assessment

Identify systems on your network that are vulnerable to exploits

  • Network Vulnerability Testing
  • Continuous Vulnerability Monitoring

Intrusion Detection

Detect malicious traffic on your network

  • Network IDS
  • Host IDS
  • File Integrity Monitoring (FIM)

Asset Discovery

Find all assets on your network before a bad actor does

  • Active Network Scanning
  • Passive Network Monitoring
  • Asset Inventory
  • Software Inventory

Behavioral Monitoring

Identify suspicious behavior and potentially compromised systems

  • Netflow Analysis
  • Service Availability Monitoring
  • Full packet capture

For more information, please go to Alien Vault