LevelBlue USM Anywhere™ Sensors
Get started with Sensor deployment.
To deploy a sensor in your environment, you’ll need a valid Sensor Activation Code, which connects the sensor to your USM Anywhere instance.
Start investigating alarms in three steps.
Deploy the Sensor
Deploy the USM Anywhere Sensor virtual machine in your selected environment.
Connect the Sensor
Complete the Sensor setup and analyze the initial event data.
Investigate Your First Alarm
Within a day, you should be able to investigate the first alarms for your system.
Secure OT environments from planning to protection.
Enhance operational visibility, fortify your security foundations, and proactively safeguard your OT environments against evolving threats.
-
Coordinate OT security priorities with business goals to baseline your security program
-
Exploit vulnerabilities in IT systems that could impact OT environments for proactive risk mitigation
-
Seamlessly integrate 24/7 IT and OT monitoring to unify analytics, workflows, and visibility
Globally CREST-Certified
Trustwave SpiderLabs is CREST-certified for both Penetration Testing and Simulated Targeted Attack & Response (STAR) Penetration Testing, proving we invest in training to ensure our teams keep up with the latest techniques. We consistently help clients increase their cyber maturity through cutting edge penetration testing and modern attack-based simulations.
Unlock the full power of Microsoft Security.
Get the best results from your Microsoft investment by partnering with Trustwave, no matter where you are in your journey. Optimize your enterprise with our custom Microsoft Security services.
- Transition safely with expert migration to the Microsoft platform from legacy systems, or from E3 to E5
- Realize value faster from your Microsoft Security investment
- Includes support for your entire heterogenous ecosystem
Security Configuration
Assess the configuration and security of your Azure cloud services setup
Security Controls Validation
Validate security controls following migration from legacy systems to Azure
Operational Best Practices
Optimize based on the CIS Microsoft Azure Foundations Benchmark
Excessive Privileges Testing
Test IAM within Azure Active Directory for excessive privileges
Strategic & Tactical Insights
Receive both strategic and tactical insights, including remediation plans
Cross-Technology Visibility
Identify security gaps across Microsoft products and third-party technologies
TRUSTWAVE SPIDERLABS
TESTING TIERS
OUR RISK-BASED APPROACH
Elite experts.
Renowned intelligence.
Stay ahead of disruption with Trustwave SpiderLabs. Our global team of 250+ security consultants, threat hunters, incident responders, forensic investigators, and researchers proactively protects our clients and delivers cutting-edge research.
Billions of threat intelligence records
200k+ hours of pen tests annually
30k vulnerabilities discovered annually
2M+ new malicious URLs detected monthly
Four Tiers of Penetration Testing as a Service
We will help you choose the best option to meet your business needs.
Basic
- Mostly automated
- Free attack tools
- Script-kiddie-like
Opportunistic
- Automated and human-led
- Skilled attacker
- Seeks easy targets
Targeted
- Human-led
- Targeted attack - specific
- Skilled attacker over time
Advanced
- Highly motivated skilled attacker
- Well-funded
- Exhausts all options to gain access
|
Comprehensive Pen Testing |
Traditional Pen Testing |
|
|---|---|---|
| Conducts checks and scans (e.g., ports exposed to internet) | ||
| Assesses well-known/documented vulnerabilities (e.g., CVEs) | ||
| Incorporates compliance and industry requirements | ||
| Assesses full set of environments (e.g., production, development, test) | ||
| Accounts for business and workflow logic | ||
| Assesses privileged credential levels (e.g., standard, administrator) | ||
| Validates findings by experienced, senior testers | ||
| Provides a detailed report with recommendations |
FAQs
A sensor sends collected data over an encrypted connection to USM Anywhere in the cloud where it is aggregated, analyzed, correlated and archived.
The activation code connects USM Anywhere to your account.
This page will help you deploy your first sensor. After your first sensor is deployed, you can setup additional sensors within USM Anywhere by going to Settings and navigating to the Sensors section.
It varies depending on your environment and how much data you’re sending to USM Anywhere but typically, our users see their first alarm within one day.
Get Started
Learn more about how our specialists can tailor a security program to fit the needs of your organization.