Anomali ThreatStream

Anomali ThreatStream

About TrustRadius Scoring
Score 8.4 out of 100
Anomali ThreatStream

Overview

Recent Reviews

Reviewer Pros & Cons

View all pros & cons

Video Reviews

Leaving a video review helps other professionals like you evaluate products. Be the first one in your network to record a review of Anomali ThreatStream, and make your voice heard!

Pricing

View all pricing
N/A
Unavailable

What is Anomali ThreatStream?

ThreatStream from Anomali in Redwood City speeds detection of threats by uniting security solutions under one platform and providing tools to operationalize threat intelligence. ThreatStream also automates many of the tasks typically assigned to security professionals, freeing analysts to quickly…

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting / Integration Services

Would you like us to let the vendor know that you want pricing?

14 people want pricing too

Alternatives Pricing

What is CrowdStrike Falcon?

CrowdStrike offers the Falcon Endpoint Protection suite, an antivirus and endpoint protection system emphasizing threat detection, machine learning malware detection, and signature free updating. Additionally the available Falcon Spotlight module delivers vulnerability assessment with no performance…

What is AlienVault USM?

AlienVault® Unified Security Management® (USM) delivers threat detection, incident response, and compliance management in one unified platform. It is designed to combine all the essential security capabilities needed for effective security monitoring across cloud and on-premises environments,…

Features Scorecard

No scorecards have been submitted for this product yet..

Product Details

What is Anomali ThreatStream?

ThreatStream from Anomali in Redwood City speeds detection of threats by uniting security solutions under one platform and providing tools to operationalize threat intelligence. ThreatStream also automates many of the tasks typically assigned to security professionals, freeing analysts to quickly handle threats. ThreatStream collects threat intelligence data from hundreds of third party sources.

Anomali ThreatStream Technical Details

Operating SystemsUnspecified
Mobile ApplicationNo

Comparisons

View all alternatives

Compare with

Reviews and Ratings

 (13)

Reviews

(1-5 of 5)
Companies can't remove reviews or game the system. Here's why
Score 9 out of 10
Vetted Review
Verified User
Review Source
We are one of the largest MSSPs in the region, and threat intelligence requirements are very critical for us to provide the best-in-class services to our esteemed customers. We are living in an era where the security threat landscape changes each second, and it becomes imperative that we keep up to terms with the latest developing threats. Anomali ThreatStream provides us a platform that we can leverage to stay updated about the latest happenings in Cybersecurity.
  • Provides high confident IOCs that can be used to sweep across logs.
  • Provides an excellent platform to research about security content.
  • Helps support our internal content development program by providing information about the latest campaigns, threat actors, malware, etc.
  • The user interface, perhaps there is some room for improvement although it is good already.
  • Confidence assigning process for IOCs needs to be more robust and transparent.
  • While integration with SIEM solutions is a cakewalk, there is definitely added value if SIGMA rule conversion and YARA rule creation are provided from the platform.
Anomali ThreatStream is excellent in scenarios where we deliver Managed Security Services to customers. It offers exhaustive volumes of information in the form of threat bulletins, IOCs, Threat Actor profiling, and details related to campaigns in the wild which can be used to a great extent by MSSPs. For an enterprise SOC, I believe it is a little less suited purely because of the pricing aspect as it is slightly towards the expensive side of the spectrum.
December 22, 2021

A worth buying software.

Grecia Grin | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
Review Source
Anomali is the most essential of our company for almost a year and it has been protecting our company from the malicious variety of threats and above all its automation helps in saving our time which we used to spend previously. Its record keeping and removal of duplicated files are helping us a lot. So overall it has been doing wonders for our company and from the day we have installed this we haven’t faced any unwanted situation. Even in my HR department, it has multiple applications in protecting us.
  • The way it removes the duplicated files of our business is one of the particular things that it is doing in a well way.
  • Automation.
  • I like the way it keeps working and identifies and removes threats.
  • Its record-keeping intelligence is great in keeping the records of threats and saves time in eradicating if they try to enter our systems.
  • Customer service is one of its flaws which needs improvement as they are reluctant to help expectedly.
  • It occupies a lot of space of our systems and this hinders the normal working of our systems.
In my opinion, threats are the basic unease when it comes to a high-rank company. As we are utilizing cyberspace to manage a lot of things and our important business data files are also dependant on cyberspace and we cannot afford any kind of threat in any way and Anomali has been protecting us from this headache and I think it is most beneficial for the high-rank companies that fear that any threat can cause them of millions.
Score 8 out of 10
Vetted Review
Verified User
Review Source
Threat stream is being used to monitor the environment for threats or other indicators of compromise. Well there are many other feeds to ingest direct stream provides us a community-based and for the source of relevant information. as part of the security implementation threat stream is essentially used to protect the entire organization.
  • Indicators of Compromise
  • Signatures
  • Community Sharing
  • Platform Features
  • Integration
  • Additional IOCs
Parsing is useful information into other tools but can be a hit or miss depending on the tool. In regards to the quality of data, there is room for improvement as there is a constant growth of attackers and their techniques. Anomali Threat stream does well for larger organizations to use in tandem with other security suites.
Helgi Atli-Connel | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Review Source
Being a supervisor it is my responsibility to keep an eye on anomalies that could harm normal functioning. The automation of tasks assigned to the security professionals in managing threats has become a lot easier with anomaly threat tools. This tool is being used in our organization for threat detection, intelligence in automating to deal with the threats. We are using it specifically in our information technology department and it helps in securing the analysis of data hyperactively and gives response to threats in lesser time.
  • We have experienced a very amazing and easy user interface.
  • We are in love with the intelligence-sharing facility.
  • The best of all is the threat intelligence record.
  • Time-saving and makes the work easier with its automation.
  • The customer service is slow at times.
  • It takes much of our system's storage, making it slow.
  • Multi-tasking sometimes is difficult and slow.
This tool is our first ever experience to use any threat protection. And we are glad that, we have got the best at first and we don’t find any further need to try any other thing until now. As per the market, its reviews were the best of all, so why should we go for any other option. The burden of weeding and curating on our team is freed now, and they can better focus on their departmental work. Highly recommended for the healthy growth of any business.
Score 9 out of 10
Vetted Review
Verified User
Review Source
It is being used as one of our platforms for threat intelligence, detection and automation in relation to threats. Currently [it's] being used in the IT department and helps security analysts proactively detect and respond to threats. Due to its vast partner network, community and machine learning capabilities this product is superior to its competitors.
  • Fantastic UI
  • STAXXX for sharing intelligence
  • Threat Intelligence feeds
  • Automation and collaboration cuts work down for the analysts
  • N/A
Being the best threat intelligence platform/tool on the market, it is fantastic in terms of performance and it has taken a lot of burden of curating and weeding through false positives off of our team freeing them up to focus on manual threat hunting and content building.