Detect Relevant Threats and Manage Vulnerabilities
Across Your Hybrid IT Environment

Threat Manager protects your hybrid infrastructure, applications and cloud workloads by combining a network intrusion detection system (IDS) with vulnerability management

Intrusion Detection System (IDS)

  • Collect and analyze ingress, egress and lateral network traffic even within your IaaS environments
  • Identify lateral movement, brute force, privilege escalation, ransomware, and command & control exploits
  • Advanced detection logic for the riskiest 3rd party plug-ins, services, and libraries
Learn More

Vulnerability Management

  • Identify internet facing vulnerabilities in web applications
  • See detailed OS, port configs, services, and certificates for each asset
Learn More

Network Intrusion Detection System (IDS)-as-a-Service

We're on constant lookout for security threats lurking in your network traffic

Investigating unreliable alerts wastes two-thirds of staff time while actual breaches go undetected an average of 146 days. With ActiveWatch managed detection and response you get actionable insight when it counts with:

  • Pre-built automated deployment capabilities get you up and running quickly - start seeing security threats in just minutes
  • Low-impact agents self-configure upon deployment and self-register/deregister for no-touch support of auto-scaling
  • Deployed agents encrypt and transmit your ingress, egress, and lateral network traffic to the Alert Logic backend for processing
  • We compare your network traffic with our growing list of 97,000+ signatures that detect a wide array of attack methods, including exploits in web app frameworks, app stack components, and attack methods included in the OWASP Top 10
  • Add 24x7x365 security monitoring, expert incident analysis and live notifications of critical attacks by security analysts in our global SOCs by including ActiveWatch with your Threat Manager subscription
Full Stack Assessment
and Detection Analytics
24x7x365
Expert Monitoring
Verified
Incident Report
Live Notification and
Help Within 15 Minutes
of High-Severity Incident

Full Stack Assessment
& Detection Anayltics

24 x 7 x 365
Expert Monitoring

Verified
Incident Report

Live Notification and
Help Within 15 Minutes
of High-Severity Incident

Threat Manager + ActiveWatch

Automate Your Vulnerability Management

Quickly Find And Fix Vulnerabilities In Your Environments

Use Threat Manager to identify 91,000+ security vulnerabilities and 8,600+ software configuration issues in all your environments

  • Find security vulnerabilities on the perimeter of your private and cloud environments before adversaries can launch exploits
  • Identify OWASP Top 10 web application vulnerabilities in custom-built or commercial apps with PCI ASV-level scanning
  • Get a complete list of missing security patches, unauthorized applications, and risky network configurations using non-intrusive, authenticated vulnerability scanning
  • Detect vulnerabilities missed by agent based scanners with virtual scanner appliances that scan anything with an IP address

Put Your IDS And Vulnerability Scan Results Into Action

Improve the security posture and compliance status of your organization from a single user interface

  • View the vulnerability status of your environment and assets over time to measure remediation progress and prioritize resources
  • Receive pre-built or ad hoc reports that include risk levels, threat details, potential impact, and detailed remediation recommendations.
  • Filter or search on asset groups, hosts, services, open ports, or specific vulnerabilities to find and address an emerging threat

Address Security and Compliance Readiness Without Disruption

Threat Manager includes live expert assistance from certified security analysts to ensure you are always ready for compliance audits

  • Work with PCI ASV Certified experts anytime to ensure readiness for PCI audits and provide quarterly Attestation of PCI Scan Compliance
  • Intuitive dashboard to view compliance status and drill-down a prioritized list of actions needed to maintain compliance
  • Automate delivery of customizable compliance reports for PCI, HIPAA, SOC 2 and more

Integrated, Modular Controls to Suit Your Workload Security Needs

  • Reduce
    Attack
    Surface

    Assess Vulnerabilities and Misconfigurations

  • Block
    Web
    Attacks

    Prevent Malicious HTTP / SSL

  • Identify
    Suspicious
    Activity

    Network, Web and Log Data

  • Reveal
    Actual
    Threats

    Analytics and Machine Learning

  • Prioritize,
    Explain,
    Notify

    24x7x365
    Global SOC

  • Act On
    Insight(Your Team)

    Contain and Remediate

  • Review,
    Report
    And Attest

    SOC 2, PCI DSS, HIPAA, SOX, GDPR

Reduce Attack Surface

Assess Vulnerabilities and Misconfigurations

Block Web Attacks

Prevent Malicious HTTP / SSL

Identify Suspicious Activity

Network, Web and Log Data

Reveal Actual Threats

Analytics and Machine Learning

Prioritize, Explain, Notify

24x7x365 Global SOC

Act On Insight (Your Team)

Contain and Remediate

Review, Report and Attest

SOC 2, PCI DSS, HIPAA, SOX, GDPR

Plug Into Ready-to-Use Services

Get advanced security at a fraction of the time and cost of tool-only and outsourcing approaches

NEW - Cloud Defender

Free Tier of Threat Manager from AWS Marketplace

Deploy from AWS console into your Availability Zone/Virtual Private Cloud/AMIs

Download from Azure Marketplace

Deploy directly from Azure console into your Azure VNets or security workgroup
using Azure Resource Manager (ARM) templates

Also available for deployment into on-premise virtualized and physical infrastructure environments.

Schedule Demo

Want to see Alert Logic Threat Manager in more detail?
Complete this form or call us direct at 844.816.1051, for the UK call +44 (0) 203 011 5533. An Alert Logic representative will contact you soon.