back to top

Trending Content:

Usman Khan units document for quickest double century in Listing A cricket

Pakistan's Usman Khan within the jersey of the nationwide...

17 Well-liked Houston Neighborhoods: The place to Reside in Houston in 2025

Nestled within the coronary heart of the Lone Star...

AlienVault vs Tenable for Steady Safety | Cybersecurity

As perimeter-based cyber safety falls to the wayside, a brand new breed of steady safety options are rising that mix conventional endpoint safety with newer applied sciences like safety info and occasion administration (SIEM) and crowdsourced risk intelligence. These subsequent era safety platforms try to handle the wants of each conventional on-premise information facilities in addition to organizations with whole IT infrastructures within the cloud. Two distributors—AlienVault and Tenable—have merchandise in the marketplace that fall on this class. Let’s examine how they stack up on this comparability.

Each AlienVault and Tenable’s safety platforms encompass a number of working elements that collectively type a layered safety providing. AlienVault’s Unified Safety Platform (USM) combines a digital equipment with each a community and host-based intrusion detection techniques (IDS), in addition to SIEM and steady risk intelligence.

The AlienVault USM Platform. Supply: Alienvault.com.

Equally, Tenable’s SecurityCenter Steady View (SCCV) combines agent-based vulnerability scanning with a number of safety information acquisition applied sciences like crowdsourced risk intelligence and vulnerability administration.

SCCV: Integrated Platform

 

AlienVault

AlienVault is maybe most generally identified for its Open Supply Safety Info Administration (OSSIM) challenge—an early SIEM platform that ultimately led to the formation of the corporate. AlienVault USM is basically a set of steady safety options developed across the OSSIM providing to reinforce its capabilities. Nonetheless, OSSIM pales compared the whole USM providing, which gives extra alongside the strains of enterprise options (e.g., long-term forensic storage of occasions), scalability, and help.  The corporate additionally has a secret weapon of types in its arsenal: the Open Risk Trade, purportedly the world’s largest crowdsourced safety database with over 26,000 individuals in 140 international locations sharing upwards of a million potential threats every day.

Tenable

Like AlienVault, Tenable’s declare to fame is the product it gives freed from cost, not its enterprise safety platform. On this case, its Nessus vulnerability scanner is—in line with sectools.org—the world’s hottest vulnerability scanner. Nessus continues to be out there freed from cost, however the supply code has been closed since 2005. Tenable’s SCCV contains Nessus alongside a bunch of different steady safety mechanisms together with malware detection, anomaly detection, and analytics.

Facet-by-Facet Scoring: AlienVault vs. Tenable1. Functionality Set

Each USM and SCCV try to deal with all of a company’s steady safety wants beneath one roof. AlienVault’s platform combines a number of instruments for SIEM, IDS (community and host-based), asset discovery, netflow evaluation, and vulnerability evaluation beneath one administration GUI and largely succeeds in providing a complete, unified platform for IT safety. SCCV can be a holistic safety providing that focuses on vulnerability scanning/administration and analytics, with strengths in compliance and configuration auditing in addition to anomaly and malware detection.  Each platforms succeed at providing a powerful set of capabilities for the value compared with comparable enterprise choices.

AlienVault
Tenable

4/5
4/5

2. Ease of Use

AlienVault USM is extensively identified for its intuitive, easy-to-use interface—every web page of the administration console is interactive and customizable. Equally, Tenable SCCV’s web-based interface is streamlined and easy to know. The platform’s coverage wizards particularly make organising particular monitoring use circumstances trivial. For instance, PCI DSS compliance and Home windows atmosphere malware scanning might be shortly configured with out-of-the-box insurance policies. 

AlienVault
Tenable

4/5
4/5

3. Safety Ranking

Cybersecurity’s VendorRisk platform is utilized by a whole lot of corporations to mechanically monitor their third-party distributors. We ran a fast floor scan on each AlienVault and Tenable, and located some attention-grabbing variations.

AlienVault 751 / 950

Tenable 817 / 950 

We are able to mechanically measure and monitor the safety of AlienVault, Tenable and all of your different third-party distributors.

To learn the way, get a demo of Cybersecurity Vendor Threat right now.

4. Group Assist

AlienVault is a extra distinguished title within the open supply neighborhood, having maintained the favored SIEM challenge OSSIM as an open supply initiative since its inception. Subsequently, neighborhood help assets for OSSIM are plentiful. However, Tenable closed the supply to its award-winning Nessus vulnerability scanner years in the past. Although appreciable neighborhood assets can nonetheless be had on-line, company help is by far a extra dependable help choice.

AlienVault
Tenable

4/5
2/5

5. Launch Price

AlienVault USM is presently on model 5, whereas Tenable SCCV’s present model is 5.3. AlienVault’s OSSIM has had 4 major-version releases since its preliminary launch in 2008; Tenable’s Nessus challenge was began in 1998 and is presently on model 6. Each merchandise see common releases and updates, regardless of the closing of Nessus’ supply code in 2005.

AlienVault
Tenable

4/5
4/5

6. Pricing and Assist

A monitoring system will not troubleshoot a configuration error. A configuration check script will.

AlienVault targets everybody from the SMB to the enterprise, whereas Tenable clearly has its eyes set on the enterprise. That is actually mirrored within the platforms’ respective value factors: USM might be had for round $5,000, whereas Tenable SCCV can run upwards of $20,000. Each provide customary company help choices for a value.

AlienVault
Tenable

5/5
3/5

7. API and Extensibility

Tenable gives a RESTful API for integrating SCCV with different platforms and customized internet purposes; AlienVault has no such API for integrating/customizing its USM Platform however does provide an API written in Golang for its OTX crowdsourced intelligence platform. USM may also be prolonged by means of a collection of Third-party datasource plugins out there in its USM plugin library.

AlienVault
Tenable

3/5
4/5

8. Third Get together Integrations

Apparently, AlienVault’s OSSIM is in reality made up of a sequence of open supply integrations: Snort for IDS, Nagios for monitoring, OpenVAS for vulnerability evaluation, amongst others. USM additionally integrates with quite a few safety gadgets and—as talked about beforehand—gives Third-party datasource plugins from its plugin library.

Tenable’s enviable record of integrations are detailed on its company web site and has all the things from AirWatch mobility administration integration to FireEye and Fortinet gadget auditing. Moreover, nessus might be simply built-in with the vast majority of well-liked patch administration techniques in the marketplace.

AlienVault
Tenable

3/5
5/5

9. Corporations that Use It

Each AlienVault USM and Tenable SCCV are in use by quite a few organizations small and enormous—together with most of the Fortune 500s. Subaru, Focus Manufacturers, Hulu, and the U.S. Air Pressure are amongst a few of AlienVault’s extra notable clients whereas Tenable is in use by Starwood, the U.S. Division of Protection, and Healthdirect Australia, amongst others.

AlienVault
Tenable

5/5
5/5

10. Studying Curve

AlienVault USM’s wizard-driven arrange and intuitive administration console makes getting on top of things with the platform quite a bit simpler than different comparable options in the marketplace. Tenable SCCV additionally sports activities a contemporary, streamlined internet interface; that stated, configuring and gaining proficiency with the platform requires considerably extra effort than USM. And due to its modular nature, every of SCCV’s elements should be put in and configured individually.

AlienVault
Tenable

5/5
3/5

Scoreboard and Abstract

 
AlienVault 
Tenable

Functionality set
4/5
4/5

Ease of use
4/5
4/5

Safety score
751/950
817/950

Group help
4/5
2/5

Launch charge
4/5
4/5

Pricing and help
5/5
3/5

API and extensibiltiy
3/5
4/5

Third celebration integrations
3/5
5/5

Corporations that use it
5/5
5/5

Studying curve
5/5
4/5

Complete
4.1/5
4/5

Briefly, each AlienVault USM and Tenable SCCV provide complete cyber safety within the type of layered safety mechanisms working in live performance: SIEM, IDS, vulnerability scanning, and the like. From a value and implementation perspective, USM is mostly a extra accessible safety platform than SCCV for SMBs. However, SCCV—with its REST API, strong policy-driven options, and considerably increased value level—is an providing according to the wants of right now’s enterprise.

Latest

Chef vs Puppet | Cybersecurity

Puppet and Chef have each developed considerably—suffice to say,...

How you can Enhance MySQL Safety: Prime 11 Methods | Cybersecurity

Within the pantheon of open supply heavyweights, few applied...

What’s Social Engineering? Definition + Assault Examples | Cybersecurity

Social Engineering, within the context of cybersecurity, is the...

5 Issues You Have to Know About Third-Celebration Danger in 2024 | Cybersecurity

It is now not sufficient to easily be certain...

Newsletter

spot_img

Don't miss

Champions Trophy 2025: ICC ‘happy’ over PCB preparations for mega occasion

The ICC Champions Trophy on the trophy tour. — AFP/FileCT25...

Vendor Threat Assessments: An Final Information | Cybersecurity

A vendor threat evaluation is a important component of...

Examine your Amazon S3 permissions. Somebody will. | Cybersecurity

Practically all massive enterprises use the cloud to host...

Russia calls off pleasant match with Pakistan over time constraints, group situation

The Pakistan soccer group pictured throughout a match. —...

Pak vs Ind: Pakistan Shaheens lose to India A by 7 runs

Pakistan Shaheens' captain Mohammad Haris (L) and his Indian...
spot_imgspot_img

What’s Spear Phishing? | Cybersecurity

Spear phishers search for goal who may lead to monetary acquire or publicity of commerce secrets and techniques for company espionage, personally identifiable info (PII) for identification...

Chef vs Puppet | Cybersecurity

Puppet and Chef have each developed considerably—suffice to say, we’re lengthy overdue in revisiting these two heavy-hitters. On this article we’ll take a recent...

How you can Enhance MySQL Safety: Prime 11 Methods | Cybersecurity

Within the pantheon of open supply heavyweights, few applied sciences are as ubiquitous because the MySQL RDBMS. Integral to standard software program packages like...

LEAVE A REPLY

Please enter your comment!
Please enter your name here