Software

Anomali Threatstream

by Anomali

itsa 365: Logo Anomali

Key Facts

  • Automate threat intelligence collection
  • Speed investigations
  • Feed your security controls

Categories

  • APT protection
  • Awareness
  • Threat analysis
  • Big data
  • Business continuity
  • Cloud (computing) security
  • Compliance/GRC (products and services)
  • Computer emergency response team (CERT)
  • Data leakage/loss prevention
  • Event management
  • Firewalls
  • Forensics
  • Intrusion detection/prevention
  • Early warning for IT
  • Log management
  • Risk analysis and management
  • Vulnerability and patch management

Key Facts

  • Automate threat intelligence collection
  • Speed investigations
  • Feed your security controls

Categories

  • APT protection
  • Awareness
  • Threat analysis
  • Big data
  • Business continuity
  • Cloud (computing) security
  • Compliance/GRC (products and services)
  • Computer emergency response team (CERT)
  • Data leakage/loss prevention
  • Event management
  • Firewalls
  • Forensics
  • Intrusion detection/prevention
  • Early warning for IT
  • Log management
  • Risk analysis and management
  • Vulnerability and patch management
Show More

PRODUCT DESCRIPTION

Anomali ThreatStream aggregates threat intelligence under one platform, providing an integrated set of tools to support fast, efficient investigations, and delivering “operationalized” threat intelligence into security controls at machine speed.

ThreatStream accelerates the process of collecting all of your global threat data into a single high-fidelity set of threat intelligence, with virtually no IT administration required.

- Automate threat data collection from hundreds of sources into a single, high fidelity set of threat intelligence
- Operationalize threat intelligence into “machine-readable” form
- Score threat intelligence for confidence and severity with powerful machine learning algorithms
- Easily “try and buy” new sources of threat intelligence via the APP Store

Show More

Product Expert