Announcing the AlienVault Success Center!

March 7, 2019 | Kenneth Coe
Kenneth Coe

Kenneth Coe

Ken is an ACSE and Forum Moderator at AlienVault, Inc. he has over 20 years of experience in systems support and security.

March 7, 2019 | Kenneth Coe

Announcing the AlienVault Success Center!

We are very excited to announce that our new Success Center has just launched. It is our new “one stop shop” for help and support with AlienVault USM Anywhere, USM Appliance and USM Central customers, OTX, OSSIM, and InfoSec in general. Why a Success Center? We studied the situation at length before formulating our plan for the Success…

April 19, 2016 | Kenneth Coe

False Positives in IDS: Irritating But Often Necessary

Why We Should Love False Positives   Let's face it. False positives suck. On the other hand, while the subtitle of this post may sound funny, it isn't really that far from the truth. It’s true that many people experience a level of anger at false positives that could be used as a climax to a…

Get the latest security news in your inbox.

Subscribe via email


December 16, 2015 | Kenneth Coe

Open Source Network Security Tools for Newbies

With so many open source tools available to help with network security, it can be tricky to figure out where to start, especially if you are an IT generalist who has been tasked with security. We all have to start somewhere. The question is, where? The sheer number of free open source tools available can make it difficult to choose…

October 7, 2015 | Kenneth Coe

Three Steps to Reduce the Cost of Implementing an Information Security Plan

Excerpted from a three-part series of articles. Security is expensive. Let's correct that. Information Technology is expensive. Security is not a separate part of our IT infrastructure that is thrown on after the fact. Rather, it should be an integral part of any functioning system, and its cost will depend greatly on how it is implemented. The process of creating…

July 16, 2015 | Kenneth Coe

Third Step in Reducing the Cost to Implement a Security Plan

Step 3: Paint with Better Brushes In my previous blogs Step 1 and Step 2 were outlined. Now that we have covered some of the core issues, it is time to flush out the details. The only real way to do this is to read, and not just a little. Information is your friend here. No technology, product, solution, or approach can totally…

July 7, 2015 | Kenneth Coe

Second Step to Reducing the High Cost of Implementing an Information Security Plan

In my last blog I discussed how to create and implement a security policy to reduce steps and lower the cost of securing your business. Now I’m tackling Step 2. Step 2: Divide and Conquer Local area networks should not be wide open spaces. Managing networks, in fact, is much easier if they are comprised of a number of smaller subnets…

June 23, 2015 | Kenneth Coe

Three Steps to Reduce the High Cost of Implementing an Information Security Plan

This is the first blog of a three-part series. I’m in Support at AlienVault and spend my share of time on the forums. I have seen a few posts regarding the cost of implementing security processes and procedures on a network. This is a valid question to consider, as the prospect of creating a security policy and implementing…