AlienVault threat alerts feature in Spiceworks 7.1 provides IT professionals with real-time, actionable information from a huge crowd-sourced threat intelligence database.
AlienVault, a provider of Unified Security Management solutions and crowd-sourced threat intelligence, has announced an integration with Spiceworks to help millions of Spiceworks users identify and mitigate threats on their network.
The new feature, AlienVault Threat Alerts, is based on the world’s largest crowd-sourced threat intelligence repository, AlienVault’s Open Threat Exchange (OTX), will provide IT professionals with real-time global threat data and the information they need to defend against threats to their network. New and existing Spiceworks users can access AlienVault Threat Alerts by downloading Spiceworks or updating their application to version 7.1.
Russ Spitler, VP of product management for AlienVault, said: "In today’s modern world, technology alone is not enough to combat the threats that now face organisations of all types and sizes.
"With the integration of continuous threat intelligence updates from OTX and AlienVault Labs, we can now provide millions of Spiceworks users with insight into the threats that could impact their business and the guidance they need to take preventative measures."
AlienVault Threat Alerts in Spiceworks 7.1 helps IT professionals identify and mitigate threats on their network by:
– Scanning network assets monitored by Spiceworks to look for connections with known malicious hosts;
– Triggering alerts within Spiceworks for any issues that are found;
– Providing remediation advice so Spiceworks users can quickly mitigate the threat.
Jay Hallberg, co-founder and COO of Spiceworks, said: "AlienVault Threat Alerts in Spiceworks represent yet another way we’re providing IT professionals with the tools and information they need to do their jobs.
"Network security continues to be a thorn in the side of IT professionals everywhere. Integrating AlienVault’s Threat Alerts feature into Spiceworks will simplify how IT professionals locate and manage network threats, all from the application they use each day to manage their technology environment."