Asset Discovery
› API-powered asset discovery
› Network asset discovery
› Software and services discovery
Vulnerability Assessment
› Network vulnerability scanning
› Cloud vulnerability scanning
› Cloud infrastructure assessment
Intrusion Detection
› Cloud –, Network –, Host –
› File Integrity Monitoring
Behavioral Monitoring
› Asset access logs
› Cloud access and activity logs (Azure Monitor, AWS: CloudTrail, CloudWatch, S3, ELB)
› AWS VPC Flow monitoring
› VMware ESXi access logs
SIEM & Log Management
› Event correlation
› Log management, with at least 12 months log retention
› Incident response
› Integrated threat intelligence from the AlienVault Labs Security Team and the AlienVault Open Threat Exchange® (OTX™)
USM Anywhere Natively Monitors –
› AWS and Microsoft Azure public clouds
› Virtual on-premises IT on VMware / Hyper-V
› Physical IT infrastructure in your data center
› Other on-premises facilities (e.g., offices, retail stores, etc.)
› Cloud applications like Office 365 and G-Suite
The Digital Overwatch Difference
The CyberPros team are USM Anywhere experts. Our staff of professionals will:
design, configure, and deploy the sensors, log collectors, and storage platforms.
”Tune” the sensors to your specific environment to reduce the noise and false positives. Install and configure the many third-party “AlienApps” to work with your helpdesk, Incident Response team, or third-party service providers.
24*7 Monitoring of Security Alerts
We provide dedicated and highly trained Security Analysts to perform quick analysis of alerts, alarms, and Threats detected on a 24*7 basis. Threats are detected, validated and prioritized for action by the Incident Response team.
Incident Response
We provide a dedicated team to perform Full Incident Response activities, including Preparation-Detection-Analysis-Containment-Eradication-Recovery-Post Incident Report (Lessons Learned)
Penetration Testing
An External Penetration Test mimics the actions of an actual attacker exploiting weaknesses in the network security without the usual dangers. This test examines external IT systems for any weakness that could be used by an external attacker to disrupt the confidentiality, availability or integrity of the network, thereby allowing the organization to address each weakness.
- Network Vulnerability Scanning using multiple commercial and open source tools
- DNS Analysis & DNS Brute-forcing
- Port Scanning
- System Fingerprinting
- Services Probing
- Network and File Share Enumeration
- Password Strength Testing