52906445_l.jpg

CyberDNA is Fast And Affordable Enterprise Security

Monitoring

  • The average annualized cost of cyber crime incurred per individual U.S. organization who does not use CyberDNA was $12.7 million.(1)

  • With our solution you can reduce detection time to minutes which reduces overall impact and thusly, the overall time and cost for remediation.The average time to detect and resolve a cyber attack without the assistance of CyberDNA was 215 days in 2014.(1)

  • (1) “2014 Cost of Cyber Crime Study: United States”, Ponemon Institute, October 2014.

What is CyberDNA?

Vigilant's managed security service, CyberDNA, takes a different approach to monitoring your company infrastructure through a proprietary, distributed network of passive network security sensors that we guarantee can show more about your existing attacks and vulnerabilities than any other product on the market.

The Unified Security Management Difference - alien Vault/AT&T Cyber Security

5 Essential Security Capabilities in a Single Console

The AlienVault Unified Security Management™ (USM) platform provides five essential security capabilities in a single console, giving you everything you need to manage both compliance and threats.

Understanding the sensitive nature of IT environments, we include active, passive and host-based technologies so that you can match the requirements of your particular environment.

 
home-page-banner-for-partner-alt--1-.png

Threat Detection

Detect malicious traffic on your network

  • Network IDS

  • Host IDS

  • File Integrity Monitoring (FIM)

Asset Discovery

Find all assets on your network before a bad actor does

  • Active Network Scanning

  • Passive Network Monitoring

  • Asset Inventory

  • Software Inventory

Behavioral Monitoring

Identify suspicious behavior and potentially compromised systems

  • Netflow Analysis

  • Service Availability Monitoring

  • Full packet capture

SIEM

Correlate and analyze security event data from across your network

  • Log Management

  • Event Correlation

  • Incident Response

  • Reporting and Alarms

Vulnerability Assessment

Identify systems on your network that are vulnerable to exploits

  • Network Vulnerability Testing

  • Continuous Vulnerability Monitoring