Threat Detection and Vulnerability Management Across Your Hybrid IT Environment

Threat Manager protects your business – including your containers and applications – with the proven combination of a network intrusion detection system (IDS) and vulnerability management for hybrid, cloud, and on-premises environments.

Intrusion Detection System (IDS)

  • Identify lateral movement, brute force attacks, privilege escalation, ransomware, and command & control exploits
  • Collect and analyze network traffic that traverses hosts
  • Detect threats to containers running on AWS, Azure, and on-premises deployed Docker, AWS Elastic Container Service (ECS), Kubernetes, AWS Elastic Beanstalk, and CoreOS with our Container security solution
Learn More

Vulnerability Management

  • Identify internet-facing vulnerabilities in web applications
  • See detailed OS, port configs, services, and certificates for each asset
Learn More

Network Intrusion Detection System (IDS)-as-a-Service

We're on constant lookout for security threats lurking in your network traffic

Investigating unreliable alerts wastes two-thirds of staff time while actual breaches go undetected an average of 146 days. With ActiveWatch managed detection and response you get actionable insight when it counts with:

  • Pre-built automated deployment capabilities get you up and running quickly - start seeing security threats in just minutes
  • Low-impact agents self-configure upon deployment and self-register/deregister for no-touch support of auto-scaling
  • Deployed agents encrypt and transmit your ingress, egress, and lateral network traffic to the Alert Logic backend for processing
  • We compare your network traffic with our growing list of 97,000+ signatures that detect a wide array of attack methods, including exploits in web app frameworks, app stack components, and attack methods included in the OWASP Top 10
  • Add 24x7 security monitoring, expert incident analysis and live notifications of critical attacks by security analysts in our global SOCs by including ActiveWatch with your Threat Manager subscription
Full Stack Assessment
and Detection Analytics
24x7
Expert Monitoring
Verified
Incident Report
Live Notification and
Help Within 15 Minutes
of High-Severity Incident

Full Stack Assessment
& Detection Anayltics

24 x 7
Expert Monitoring

Verified
Incident Report

Live Notification and
Help Within 15 Minutes
of High-Severity Incident

Threat Manager + ActiveWatch

Automate Your Vulnerability Management

Quickly Find and Fix Vulnerabilities

Use Threat Manager to identify 91,000+ security vulnerabilities and 8,600+ software configuration issues in all your environments

  • Find security vulnerabilities on the perimeter of your private and cloud environments before adversaries can launch exploits
  • Identify OWASP Top 10 web application vulnerabilities in custom-built or commercial apps with PCI ASV-level scanning
  • Get a complete list of missing security patches, unauthorized applications, and risky network configurations using non-intrusive, authenticated vulnerability scanning
  • Detect vulnerabilities missed by agent based scanners with virtual scanner appliances that scan anything with an IP address

Put Your IDS And Vulnerability Scan Results Into Action

Improve the security and compliance of your organization from a single user interface

  • View the vulnerability status of your environment and assets over time to measure remediation progress and prioritize resources
  • Receive pre-built or ad hoc reports that include risk levels, threat details, potential impact, and detailed remediation recommendations.
  • Filter or search on asset groups, hosts, services, open ports, or specific vulnerabilities to find and address an emerging threat

Address Security and Compliance Readiness Without Disruption

Threat Manager includes live expert assistance from certified security analysts to ensure you are always ready for compliance audits

  • Work with PCI ASV Certified experts anytime to ensure readiness for PCI audits and provide quarterly Attestation of PCI Scan Compliance
  • Intuitive dashboard to view compliance status and drill-down a prioritized list of actions needed to maintain compliance
  • Automate delivery of customizable compliance reports for PCI, HIPAA, SOC 2 and more

Integrated, Modular Controls to Suit Your Workload Security Needs

Reduce
Attack
Surface

Assess Vulnerabilities and Misconfigurations

Block
Web
Attacks

Prevent Malicious HTTP / SSL

Identify
Suspicious
Activity

Network, Web and Log Data

Reveal
Actual
Threats

Analytics and Machine Learning

Prioritize,
Explain,
Notify

24x7x365
Global SOC

Act On
Insight(Your Team)

Contain and Remediate

Review,
Report
And Attest

SOC 2, PCI DSS, HIPAA, SOX, GDPR

Reduce Attack Surface

Assess Vulnerabilities and Misconfigurations

Block Web Attacks

Prevent Malicious HTTP / SSL

Identify Suspicious Activity

Network, Web and Log Data

Reveal Actual Threats

Analytics and Machine Learning

Prioritize, Explain, Notify

24x7x365 Global SOC

Act On Insight (Your Team)

Contain and Remediate

Review, Report and Attest

SOC 2, PCI DSS, HIPAA, SOX, GDPR

Free Tier of Threat Manager from AWS Marketplace

Deploy from AWS console into your Availability Zone/Virtual Private Cloud/AMIs

Download from Azure Marketplace

Deploy directly from Azure console into your Azure VNets or security workgroup
using Azure Resource Manager (ARM) templates

Also available for deployment into on-premise virtualized and physical infrastructure environments.

Schedule Demo

Want to see Alert Logic Threat Manager in more detail?
Complete this form or call us direct at 844.816.1051, for the UK call +44 (0) 203 011 5533. An Alert Logic representative will contact you soon.