Overview

Anomali delivers earlier detection and identification of adversaries in your organizations network by making it possible to correlate tens of millions of threat indicators against your real time network activity logs and up to a year or more of forensic log data. Anomali’s approach enables detection at every point along the kill chain, making it possible to mitigate threats before material damage to your organization has occurred.

Products

  • Anomali STAXX

    Anomali STAXX gives you a free, easy way to subscribe to any STIX / TAXII feed. Simply download the STAXX client, configure your data sources, and STAXX will handle the rest. https://www.anomali.com/platform/staxx

  • Anomali Enterprise

    Anomali Enterprise (AE) is a powerful Threat Hunting engine that compares millions of IOCs against your internal traffic to identify active threats. AE is the only solution that scales to analyze millions of IOCs against billions of events/day, over 365 days. https://www.anomali.com/platform/anomali-enterpris...

  • ThreatStream

    Mission Control for Threat Intelligence

    Anomali ThreatStream combines threat data from feeds and other sources with data from inside the network to surface relevant threats to an organization.

    By mapping Indicators of Compromise (IOCs) with a strategic threat model, analysts using the ThreatStream platform are able to quickly identify, investigate and react to security threats. https://www.anomali.com/platform/threatstream

Contracts

Federal

GSA Schedule 70

GS-35F-0119Y
Dec 20, 2011- Dec 19, 2021

SEWP V

NNG15SC03B/NNG15SC27B
May 01, 2015- Apr 30, 2025

ITES-SW

W52P1J-15-D-0008
Mar 03, 2015- Aug 10, 2020
*Additional Option Years Available

State and Local

CMAS

3-12-70-2247E
Aug 28, 2012- Mar 31, 2022

City of Seattle Contract

0000003265
Jul 11, 2014- Dec 19, 2021

Department of General Services PA - Symantec

4400004253
May 01, 2009- Dec 19, 2021

Pennsylvania COSTARS-6 IT Software Contract

COSTARS-006-176
Aug 31, 2017- Aug 31, 2021

State of Indiana Contract

0000000000000000000021430
Aug 01, 2017- Jul 31, 2021

State of New Mexico Contract

80-000-18-00002
Aug 01, 2017- Aug 01, 2021

Education

Massachusetts Higher Education Consortium (MHEC)

MC15-04
Aug 10, 2019- Jun 30, 2022

VASCUPP

UVA1482501
May 02, 2014- Dec 19, 2021

Events

There are no current events at this time

Resources

Datasheet

Anomali_Logo_BlackBlue-RGB-new.png
Datasheet
ThreatStream provides the essential analysis and correlation that you need to translate raw, unstructured and duplicative data into true intelligence. Reduce the noise of false positives from outdated irrelevant data in minutes. What’s left is true insight in the form of pre-built rules, reports, ...

Anomali’s Threat Analysis Reports Service allows an organization to simply and easily submit their raw log data to Anomali. The service strips out potential indicators of compromise from the data and looks for matches in Anomali’s vast store of threat intelligence data. The report provides threa...

Anomali Enterprise (AE) is a powerful Threat Hunting engine that compares millions of IOCs against your internal traffic to identify active threats. AE is the only solution that scales to analyze millions of IOCs against billions of events/day, over 365 days.Threat Hunting: Identifies real threats a...

Resource

The Center for Protection of the National Infrastructure (CPNI) and CERT-UK recently sponsored a white paper called Threat Intelligence: Collecting, Analyzing, Evaluating. The paper discusses the need for ensuring that intelligence collected be relevant for major security stakeholders in your organi...

Anomali offers the comprehensive suite of Threat Intelligence solutions for organizations of any size.STAXX - Anomali STAXX gives you a free, easy way to subscribe to any STIX / TAXII feed.Anomali Enterprise - Anomali Enterprise (AE) is a powerful Threat Hunting engine that compares millions of IOCs...

Intelligence is becoming the cornerstone for security. Organizations large and small are making threat intelligence a part of their day-to-day security operations, but variations persist, hinting at blindspots that will need to be addressed.

The Ponemon Institute recently commissioned a report: The Value of Threat Intelligence: A Study of North American and United Kingdom Companies. The study revealed that 70 percent of security industry professionals believe threat intelligence is often too voluminous and/or complex to provide actionab...

Whitepaper

One key number that is generally accepted and that every CISO watches is “200-days.” As reported in many widely accepted reports, that’s been the average amount of time between an initial compromise and when its actually discovered in an organization. Law enforcement, a business partner or ind...