AlienVault SIEM Platform
AlienVault Unified Security Management™ (USM) is an all-in-one platform designed and priced to ensure that mid-market organizations can effectively defend themselves against today’s advanced threats. Unlike traditional SIEM or security point products, AlienVault USM provides:
- Unified, Coordinated Security Monitoring
- Simple Security Event Management and Reporting
- Continuous Threat Intelligence
- Fast Deployment
- Multiple Security Functions Without Multiple Consoles
Take a test drive of our all-in-one security platform and see how easy it can be to defend against today’s advanced threats.
AlienVAult Security As a Service (SaaS)
More and more companies are getting breached on a daily basis. Regardless of the size of your business, if you don’t have a strong security posture, it’s not a question of IF you’ll get hacked, it’s a question of WHEN you’ll get hacked. NDM has selected the best technology partners in the industry including AlienVault™ for advanced security event monitoring, and we have some of the brightest minds in the Security Industry leveraging these tools. NDM Managed Security Services helps businesses gain visibility, meet compliance, and lower their overall IT Security costs.
There are four AlienVault USM All-in-One models,
find the one that fits your needs:
Model | Capacity | Perpetual | Subscription* |
USM All-in-One 25A | Monitor up to 25 unique assets | $3,900 | $250/month |
USM All-in-One 75A | Monitor up to 75 unique assets | Instant Quote | Instant Quote |
USM All-in-One 150A | Monitor up to 150 unique assets | Instant Quote | Instant Quote |
USM All-in-One UA | Monitor more than 150 unique assets | Instant Quote | Instant Quote |
Note: This is not a complete price list. If you need help determining which version is best for you please contact us.



5 Essential Security Capabilities in a Single Console
The AlienVault Unified Security Management™ (USM) platform provides five essential security capabilities in a single console, giving you everything you need to manage both compliance and threats. Understanding the sensitive nature of IT environments, we include active, passive and host-based technologies so that you can match the requirements of your particular environment.
Asset Discovery
- Active Network Scanning
- Passive Network Monitoring
- Asset Inventory
Behavioral Monitoring
- Netflow Analysis
- Service Availability Monitoring
- Full packet capture
Vulnerability Assessment
- Network Vulnerability Testing
- Continuous Vulnerability Monitoring
Security Information & Event Management (SIEM)
- Log Management
- Event Correlation
- Incident Response
- Reporting and Alarms
Threat Detection
- Network IDS
- Host IDS
- File Integrity Monitoring (FIM)
More Than Just a SIEM
Traditional SIEM solutions promise to provide what you need – but the path to get there is one most of us can’t afford. Traditional SIEM solutions integrate and analyze the data produced by other security technologies that are already deployed, but unfortunately most mid-market organizations don’t have those other technologies deployed yet! AlienVault USM provides a different path. In addition to all the functionality of a traditional SIEM, AlienVault USM also builds the essential security capabilities into a single platform with no additional feature charges. And AlienVault’s focus on ease of use and deployment makes it the perfect fit for mid-market enterprises and organizations with limited budget and few in-house resources.
Features | AlienVault USM | Traditional SIEM |
Management: | ||
Log Management | ![]() | ![]() |
Event Management | ![]() | ![]() |
Event Correlation | ![]() | ![]() |
Reporting | ![]() | ![]() |
Trouble Ticketing | Built-In | $$ (3rd-party) |
Security Monitoring Technologies: | ||
Asset Discovery | Built-In | $$ (3rd-party) |
Network IDS | Built-In | $$ (3rd-party) |
Host IDS | Built-In | $$ (3rd-party) |
Netflow | Built-In | $$ (3rd-party) |
Full Packet Capture | Built-In | $$ (3rd-party) |
File Integrity Monitoring | Built-In | $$ (3rd-party) |
Vulnerability Assessment | Built-In | $$ (3rd-party) |
Additional Capabilities: | ||
Continuous Threat Intelligence | Built-In | $$ (3rd-party) |
Unified Management Console | Built-In | $$ (3rd-party) |