Anomali delivers advanced threat intelligence solutions designed to enhance security operations by providing comprehensive visibility into threats and enabling real-time threat detection and management.
Product | Market Share (%) |
---|---|
Anomali | 4.9% |
Recorded Future | 15.6% |
CrowdStrike Falcon | 8.5% |
Other | 71.0% |
Anomali stands out in threat intelligence, offering an innovative platform that integrates data to identify and analyze threats effectively. It enables teams to streamline threat detection processes and respond to incidents with increased agility. With a focus on accuracy and efficiency, Anomali supports cybersecurity professionals in making informed decisions to safeguard their networks consistently.
What are Anomali's core features?In industries like finance and healthcare, Anomali is implemented to address specific challenges like compliance and data protection. By using this platform, organizations gain the ability to adapt to evolving threats, ensuring robust and adaptable security postures tailored to industry demands.
Anomali was previously known as Match, Lens, ThreatStream, STAXX, Anomali Security Analytics.
Bank of England, First Energy, UBISOFT, Bank of Hope, Blackhawk Network
Author info | Rating | Review Summary |
---|---|---|
Enterprise Security Architect V at FirstEnergy | 4.0 | We use Anomali as our central threat intelligence platform to store and correlate various feeds, enabling proactive threat hunting. Its powerful API supports our automation needs. While promising, the AI features still need improvement as technology advances. |
Senior Cyber Threat Hunter at a financial services firm with 10,001+ employees | 4.5 | I use Anomali for threat hunting and intelligence operationalization, valuing its threat modeling capabilities. Improvements are needed in its community intelligence sharing and tagging system. I've evaluated alternatives like Recorded Future and Mandiant Advantage but still use Anomali. |
Managing Member at a tech vendor with self employed | 3.5 | We use Anomali as a threat intelligence platform to stream and correlate threat feeds. Its credential monitoring feature is highly valuable despite a limited data set. However, integration improvements are needed. We switched from MISP due to its high maintenance needs. |
IT Cyber Security Senior Analyst at a consultancy with 10,001+ employees | 3.5 | No summary available |