Skip to main content
TrustRadius: an HG Insights Company
Anomali ThreatStream

Anomali ThreatStream

Overview

What is Anomali ThreatStream?

A solution to operationalize actionable data and insights to secure any organization. Anomali ThreatStream provides curated access to the a global repository of threat intelligence, delivering enrichment, contextualization, and detection of known and emerging threats.

Read more

Learn from top reviewers

Return to navigation

Pricing

View all pricing
N/A
Unavailable

What is Anomali ThreatStream?

A solution to operationalize actionable data and insights to secure any organization. Anomali ThreatStream provides curated access to the a global repository of threat intelligence, delivering enrichment, contextualization, and detection of known and emerging threats.

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

64 people also want pricing

Alternatives Pricing

What is Webroot Endpoint Protection?

Webroot Endpoint Protection is the OpenText company's business class multi-vector endpoint protection application, providing centralized endpoint management, deep learning intelligence, and advanced behavioral analytics.

Return to navigation

Product Demos

Anomali Copilot Demo

YouTube
Return to navigation

Product Details

What is Anomali ThreatStream?

A solution to operationalize actionable data and insights to secure any organization. Anomali ThreatStream provides curated access to the a global repository of threat intelligence, delivering enrichment, contextualization, and detection of known and emerging threats.

Real-time dashboards provide security teams with situational awareness at a glance. ThreatStream automatically correlates threat intelligence with vulnerabilities in an organization's IT environment, empowering rapid investigation and effective response.


The solution will also automatically distribute enriched threat intelligence across the entire security ecosystem to enable proactive blocking and monitoring of potential attacks, strengthen the organization's security posture, and reduce risk.


Anomali ThreatStream Technical Details

Operating SystemsUnspecified
Mobile ApplicationNo
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews From Top Reviewers

(1-1 of 1)

Fundamentally built threat intelligence

Rating: 8 out of 10
November 03, 2021
Vetted Review
Verified User
Anomali ThreatStream
2 years of experience
Threat stream is being used to monitor the environment for threats or other indicators of compromise. Well there are many other feeds to ingest direct stream provides us a community-based and for the source of relevant information. as part of the security implementation threat stream is essentially used to protect the entire organization.
  • Indicators of Compromise
  • Signatures
  • Community Sharing
Cons
  • Platform Features
  • Integration
  • Additional IOCs
Parsing is useful information into other tools but can be a hit or miss depending on the tool. In regards to the quality of data, there is room for improvement as there is a constant growth of attackers and their techniques. Anomali Threat stream does well for larger organizations to use in tandem with other security suites.
  • Sandboxing features via JoeSSandbox
  • Threat Intelligence
  • Community platform
  • Threat intelligence
  • Security posture
  • Compliance
Many of the products that can be used to be ingested into a security event management software can be cumbersome with threat streamThere are many opportunities to continue fine-tuning the environment and providing great context in regards to threat research. When compared to other products threat stream stands out from usability and features.
VMware Carbon Black App Control (formerly cb protection), ReliaQuest, Cofense Vision
Return to navigation