AlienVault Unified Security ManagementTM (USMTM) provides NERC compliance software for teams with limited staff and budget
The North American Electric Reliability Corporation Critical Infrastructure Protection (NERC CIP) standards are specific guidelines to the power industry to ensure reliability and security standards for bulk electric system (BES). The NERC CIP standards specifically address security requirements, including:
- Risk-based assessment
- Security management
- Perimeter and physical security
- Remote access
- Incident response & investigation
- Configuration change management
- Vulnerability assessment
- Information protection
With v5 of NERC CIP, virtually all BES facilities are now in-scope with at least one the requirements of NERC CIP. Providers now need to assess their BES to identify systems as low, medium, or high impact to determine their compliance requirements.
AlienVault USMTM delivers the NERC CIP compliance software that simplifies your BES infrastructure assessment and compliance.
Built for IT Teams with Limited Resources
- Essential security controls built-in
- Automated analysis and alerting
- Centralized console for single view
Unified Approach Accelerates Infrastructure Assessment
- Essential security controls built in
- Not a “one-size-fits-all” approach
- Do more with less
Threat Intelligence Prioritizes Threat Detection and Response
- AlienVault Labs updates
- Indicators of Compromise (IOCs)
- Detailed response guidance
Built for IT Teams with Limited Resources
AlienVault USMTM provides all of the essential security capabilities you need in one platform. Built specifically for IT teams with limited budget for technology and security staff, the USM platform eliminates the need for you to spend your scarce resources deploying and managing stand-alone products.
The wide range of security technologies in the USM platform work together “out of the box.” It automatically starts analyzing data from built-in data sources utilizing the pre-configured correlation directives as soon as it’s installed, giving you a complete picture.
The centralized management console puts everything at your fingertips: data about the systems on your network, their security status, and actionable threat intelligence to respond to threats quickly.
The AlienVault USMTM platform provides five essential security capabilities in a single console, giving you everything you need to manage both compliance and threats:
- Asset Discovery
- Vulnerability Assessment
- Intrusion Detection
- Behavioral Monitoring
- Security Information and Event Management (SIEM)
AlienVault USMTM includes active and passive scanning technologies, allowing you to address the needs of your unique environment while meeting NERC CIP compliance requirements.
This unified approach means you can rely on the built-in security technologies and integrated threat intelligence to help you assess your BES and the impact of each system. Instead of spending valuable time gathering and analyzing data from across your network manually, you can rely upon AlienVault USM to give you the essential information you need.
Accelerate Threat Detection and Response with AlienVault Threat Intelligence
To help you stay ahead of the evolving threat landscape and meet NERC CIP compliance, you need threat intelligence that enables you to quickly detect, prioritize and eliminate danger to your network.
AlienVault Labs delivers continuous updates to rulesets as well as threat data from OTX. These updates enable USM to stay current with the latest IOCs (Indicators of Compromise), allowing you to more easily identify emerging threats targeting your network, such as:
- Suspicious system behavior like abnormal network flows and protocol usage
- Command and Control (C&C) communication
- Malware infections (rootkits, botnets, remote access trojans, and more)
- Access attempts by bad actors
- Escalation of privilege for specific user accounts
|NERC CIP Requirement||AlienVault USMTM Capabilities||Benefits of Unified Security ManagementTM|
|Risk-Based Assessment of Bulk Electric Systems (BES) Cyber Systems|| || |
|Security Management Controls|| || |
|Electronic Security Perimeters Including Interactive Remote Access|| || |
|Physical Security of BES Cyber Systems|| || |
|Systems Security Management|| || |
|Incident Reporting and Response Planning|| || |
|Configuration Change Management and Vulnerability Assessments|| || |
|Information Protection|| || |