Making intelligence driven security a reality

ThreatStream has changed the company name to Anomali and launched two new products.

  • 8 years ago Posted in
The new brand reflects the company’s ongoing mission to enable customers to identify and address anomalous or undesirable behaviour in their networks. The Anomali products announced today are Harmony Breach Analytics for mid-to-large enterprises and the Anomali Breach Detection Service for small to medium sized businesses. The new products allow organisations to leverage threat intelligence to find attacks during any phase of the attack chain.
 
“Today’s security technologies were never meant to ingest the growing millions of threat intelligence indicators that are now readily available. These indicators are rightly seen as critical to an active defence strategy. However the ability to exploit their value has not tracked their explosive growth in volume. We see threat intelligence as the new Big Data challenge,” said Hugh Njemanze, CEO of Anomali. “For perspective, we are currently managing close to 100 million threat indicators for any given customer and growing exponentially, up from 10 million only a year ago. Harmony Breach Analytics and Threat Analysis Reports Service were purpose-built to offload the work of digesting the raw volumes of threat intelligence from the existing security tools and instead directly deliver to those same tools the actionable information needed to drive security workflows.”
 
Harmony Breach Analytics Provides Intelligence with Relevance
Harmony Breach Analytics, available alongside of the newly upgraded ThreatStream 6.0 Threat Intelligence Platform, can work with your existing threat intelligence feeds, and focus security operations, incident responders and threat analysts on relevant actionable threats. Threat matches can be pushed back into an organisation’s SIEM to support existing intelligence driven workflows. Harmony’s unique approach scales to create threat intelligence with relevance beyond the 200+ day threat exposure window often sited in threat research. Harmony Breach Analytics unlocks the hidden operational value of threat intelligence data for incident responders and SOC personnel.
 
The security team benefits include the ability to:
  • Focus the security team on threat intelligence that’s relevant and specific to their organisation at any given time
  • Perform retrospective analysis
  • Enable an intelligence driven SOC (ISOC)
  • Link indicators of compromise to threats at all points along the attack chain
 
Anomali Breach Detection Service
The Anomali Breach Detection Service allows an organisation to simply and easily submit their raw log data to Anomali. The service takes advantage of Anomali’s state of the art store of threat intelligence data to detect likely breaches and report them. The generated reports provide security metrics for inbound and outbound threats and live links pointing to additional adversary research. These reports are available as a subscription service and provide automated security situational awareness to organisations that do not have a dedicated security staff.
 
The business and security benefits include the ability to:
  • Act as an SMB’s threat analyst, enabling internal staff to take action based on reported threats
  • Provide ongoing reports to your business partners for security assurance
  • Correlate, alert and analyse without having to invest costly dedicated security infrastructure
  • Create a report cadence and subscription size that’s the right size for your organisation
Research shows ‘game needs to be changed,’ with security innovation years behind that of the...
73% of organizations lack automated patch management, and 62% experienced incidents involving...
Quest Software has signed a definitive agreement with Clearlake Capital Group, L.P. (together with...
Dell EMC PowerProtect Cyber Recovery for AWS provides a fast, easy-to-deploy public cloud vault to...
Aqua’s cloud native application protection platform becomes the only solution that protects cloud...
54% of organisations working on a security transformation project now or in the next 12 months.
Node4 has released its Mid-Market IT Priorities Report 2021. The independent report reveals that...
Zscaler Zero Trust exchange cloud-based architecture enables superior green security capabilities...