Overview
Avalor is on a mission to transform the way security teams use data, making every piece of security data useful for better decisioning in one comprehensive solution. Security teams leverage many solutions to secure their technology, all of which produce a lot of valuable data. The missed opportunity is that the data is siloed, often duplicative, and inefficient as systems and people don't often talk to each other. This makes connecting the dots in your security program a real challenge. That is, until now. Avalor's proprietary Data Fabric for Security™ ingests, normalizes, and enriches data from any source, with zero friction, providing a complete and real-time view of your cybersecurity posture in a way your teams need to see it. With full control over their data, security teams can understand and take action on a multi-dimensional view of risk quickly and efficiently. Avalor's flexible platform empowers teams with the architecture to connect any data across their entire security stack, enhance their workflows with critical business context, and expand into any use case to support and optimize security operations. With Avalor's Unified Vulnerability Management application, customers can seamlessly blend multiple sources with business context to build actionable insights that power full cycle risk assessment, prioritization, remediation dispatch, and analytics - customized entirely to their organizational needs.
Highlights
- Aggregate, normalize, de-duplicate, and track risk from discovery to remediation. Avalor's data fabric acts as a source of truth for assets, controls, identities, vulnerabilities, security bugs, and other related data points. Gain a holistic view of data across your organization to identify patterns, prioritize work, and quickly make decisions.
- Ingest any data in any format, no matter how obscure or custom the source using Avalor's AnySource™ Connector Along with 150+ of out-of-the-box integrations for security tools, cloud platforms, and more, the AnySource™ Connector ensures that all data can be ingested, parsed, and mapped into your security knowledge graph.
- Enrich remediation decisions with business context Easily connect your vulnerability data to asset metadata, organization charts, and any other data source using our robust library of integrations.
Introducing multi-product solutions
You can now purchase comprehensive solutions tailored to use cases and industries.
Features and programs
Financing for AWS Marketplace purchases
Pricing
Dimension | Description | Cost/12 months |
|---|---|---|
Avalor Data Fabric | Avalor Security Platform | $300,000.00 |
Vendor refund policy
No refunds available.
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
Software as a Service (SaaS)
SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.
Support
Vendor support
Email support is offered Monday - Friday during normal business hours. support@avalor.io
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.
Reviews
Functionality
Ease of use
Customer service
Cost effectiveness
Standard contract
Customer reviews
Comprehensive visibility has improved risk-based prioritization and simplified compliance reporting
What is our primary use case?
The platform's ability to generate customizable compliance reports is valuable because they are always available, and I can request the latest report with the most current data and upload it directly from the platform.
Risk-based prioritization is very important for my resource allocation.
What is most valuable?
The platform's ability to generate customizable compliance reports is excellent because they are always available, and I can request the latest report with the most current data and upload it from the platform.
Risk-based prioritization is very important for my resource allocation.
What needs improvement?
For how long have I used the solution?
What do I think about the stability of the solution?
How are customer service and support?
How would you rate customer service and support?
Positive
How was the initial setup?
What about the implementation team?
Which other solutions did I evaluate?
What other advice do I have?
Unified visibility has strengthened zero trust decisions but reporting and skills still need work
What is our primary use case?
Our major use cases for Unified Vulnerability Management include user identity, endpoint management, security management for endpoints, authentication, and authorization. We also use it to filter internet traffic from end users.
What is most valuable?
Based on my experience, the visibility and zero trust that Unified Vulnerability Management provides brings the biggest benefit.
The scanning in Unified Vulnerability Management helps with vulnerability management by scanning applications and users' internet-bound traffic as well as data center traffic. It flags anomalies and measures against known vulnerabilities, known CVEs, and vulnerabilities, making it a process of filtering, scanning, and reporting of anomalies.
We are using the automated scanning feature in Unified Vulnerability Management.
What needs improvement?
Regarding the ability of Unified Vulnerability Management to generate customizable compliance reports, it is adequate, but sometimes you still need to be able to filter whatever the report generates to ensure accuracy and have a baseline on what the report provides. You should be able to filter and also take action on critical and non-critical reports. You get a lot of reports, but filtering them is essential.
The negative side of Unified Vulnerability Management is that you need a skill set that is not readily available. You require a lot of training and personnel that understand the technology, so getting the skill set is a major issue for managing the technology.
For how long have I used the solution?
The scanning in Unified Vulnerability Management helps with vulnerability management by scanning applications and users' internet-bound traffic as well as data center traffic. It flags anomalies and measures against known vulnerabilities, known CVEs, and vulnerabilities, making it a process of filtering, scanning, and reporting of anomalies.
What do I think about the stability of the solution?
Unified Vulnerability Management is generally stable, although we experienced latency issues once, but it has been fixed, and so far, it has been good.
What do I think about the scalability of the solution?
Unified Vulnerability Management is scalable.
How are customer service and support?
The technical support from Unified Vulnerability Management is adequate, but not as robust as Cisco; we still experience delays.
Regarding improvements to support, the response time could be better, but not the quality of support.
I would rate the support from Unified Vulnerability Management at six out of ten points.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Comparing Unified Vulnerability Management with Cisco, there are crucial differences. For Cisco, you have more skilled engineers available to manage Cisco enterprise and technologies, but for Unified Vulnerability Management, you require training and a specific skill set. Support from Cisco is better from my experience.
How was the initial setup?
The deployment process of Unified Vulnerability Management is straightforward because it primarily involves cloud support or deployment with few changes to the infrastructure.
What about the implementation team?
We used an integrator for the deployment of Unified Vulnerability Management, so it is a mix of mostly integrator and consultant for quality assurance, along with in-house contributions.
What was our ROI?
I see a very high return on investment with Unified Vulnerability Management.
The ROI with Unified Vulnerability Management is approximately 60 percent so far, given one year in the deployment. We have used Unified Vulnerability Management for less than one year, so I would say 60 percent so far.
What's my experience with pricing, setup cost, and licensing?
Regarding pricing for Unified Vulnerability Management, it is expensive; pricing is another issue.
I would rate the price of Unified Vulnerability Management at nine out of ten points.
Which other solutions did I evaluate?
What other advice do I have?
For remediation, we do it manually, which is handled by another team. We have not used the remediation workflow tools in Unified Vulnerability Management.
The integration capabilities of Unified Vulnerability Management impact our overall IT security strategy positively. It integrates seamlessly with other systems and applications using APIs, and we do not have issues with integration, even with tools to generate tickets and reporting.
Risk-based prioritization is important for our resource allocation. When you refer to critical and non-critical vulnerabilities, we know what to focus on and what to tackle at any point in time.
With risk-based prioritization in Unified Vulnerability Management, it makes attention-driven decisions possible. We eliminate critical vulnerabilities as soon as possible using an agile process. Other vulnerabilities are worked on based on availability, so critical ones come first, then low and medium risks follow. It is really important.
I would rate this review at seven out of ten points.
