Partner Datasheet

Partner Datasheet: PolySwarm

<h2 class="text-center">Threats Come From All Angles, Your Protection Should Too</h2> <h4>A launchpad for new technologies and innovative threat detection methods</h4> <h3>Anomali and PolySwarm Joint Solution Features</h3> <ul> <li>Data Enrichment: File and URL enrichment provided by a crowdsourced network of cutting edge, anti-malware solutions.</li> <li>Performance-based compensation to the researcher community.</li> <li>Early detection of threats: driven by highly specialized, research-driven engines, focused on emerging malware and 0-day threats.</li> <li>Threat scoring: A single, authoritative score that provides the probability a file contains malware.</li> </ul> <h3>Immediate Time-to-Value</h3> <ul> <li>Actionable Automation: Enables SOC and CTI teams to make decisions quickly at scale with unprecedented accuracy.</li> <li>25% of PolySwarm samples are not yet in VirusTotal.</li> <li>Expanded coverage against emerging threats, the ones more likely to be missed by existing solutions.</li> <li>Simple, easy-to-use integration.</li> </ul> <h2>Crowdsourced, Researcher-Driven Malware Intelligence</h2> <p>As the volume and complexity of cyber threats increase, CTI & SOC teams have to deal with an ever-growing queue of alerts, requiring them to contextualize and prioritize incidents at scale. The PolySwarm-Anomali integration allows users to obtain file and URL reputation services with a single click, in real-time, from a network of independent malware detection engines. PolySwarm summarizes crowdsourced verdicts into a single, authoritative number called PolyScore™, providing the probability a given file contains malware.</p> <div class="row"> <div class="col-md-4"> <h4>Specialized Solutions</h4> <p>Access to focused researcher-driven engines to detect critical threats</p> </div> <div class="col-md-4"> <h4>Unique Engines & Samples</h4> <p>Solutions and samples that can’t be found in other multiscanners</p> </div> <div class="col-md-4"> <h4>Contextual Threat Scoring</h4> <p>PolyScore™ filters the noise and amplifies the signal by weighting en- gine’s opinions based on performance</p> </div> </div> <h2><strong>Case Study</strong><br /> SOC Automation</h2> <table style="width:100%"> <tbody> <tr> <td style="width:60px;vertical-align:top;"><img alt="" src="https://www.anomali.com/images/uploads/resources/challenge.png" style="width: 45px;" /></td> <td> <h3 class="nomargin">Challenge:</h3> <p>A large, fast-growing MSSP is experiencing an unprecedented increase in the number of alerts they are managing on their clients infrastructure due to COVID-19. They need a scalable way to determine whether incoming files are malicious or benign to compliment their existing solutions. Their existing multiscanners solution has a hard time concluding on file maliciousness, since engine’s verdicts are often conflicting, requiring additional intuition-based work from analysts and SOC team members, thereby impacting the profitability and productivity of the organization.</p> </td> </tr> <tr> <td style="width:60px;vertical-align:top;"><img alt="" src="https://www.anomali.com/images/uploads/resources/solution.png" style="width: 45px;" /></td> <td> <h3 class="nomargin">Solution:</h3> <p>SOC integration via Anomali ThreatStream, along with PolySwarm’s malware intelligence. Using a single, authoritative number computed from recent crowdsourced verdicts, engine strengths, confidence levels, and other relevant threat indicators, all sourced from millions of daily assertions in the PolySwarm network.</p> </td> </tr> <tr> <td style="width:60px;vertical-align:top;"><img alt="" src="https://www.anomali.com/images/uploads/resources/benefit.png" style="width: 45px;" /></td> <td> <h3 class="nomargin">Customer Benefit:</h3> <p>PolyScore enables SOC automation and allows analysts and CTI teams to make quick defensive decisions at scale, with unprecedented accuracy.</p> </td> </tr> </tbody> </table> <h2><strong>Case Study</strong><br /> Data Enrichment/ Threat Hunting</h2> <table style="width:100%"> <tbody> <tr> <td style="width:60px;vertical-align:top;"><img alt="" src="https://www.anomali.com/images/uploads/resources/challenge.png" style="width: 45px;" /></td> <td> <h3 class="nomargin">Challenge:</h3> <p>An Anomali customer has uncovered a suspicious SHA256 hash from an internal EDR protected endpoint and wants to know more about this threat. The customer’s EDR vendor and existing malware enrichment solutions does not have any additional information on the suspicious hash. They want a second opinion of the hash and if malicious they want such details as the malware name, C2 information and the ability to pivot to other similar hashes. These details will enable their SOC and IR teams to proactively block or locate other potential infections.</p> </td> </tr> <tr> <td style="width:60px;vertical-align:top;"><img alt="" src="https://www.anomali.com/images/uploads/resources/solution.png" style="width: 45px;" /></td> <td> <h3 class="nomargin">Solution:</h3> <p>Anomali ThreatStream, through PolySwarm’s integration, provides in-depth enrichment capabilities such as listing most of the major hashes including MD5, SHA1 and the fuzzy hashes of TLSH and SSDEEP. Scan search results over time allow SOC teams to under- stand how detections have changed over- time for additional context on the threat. Via the graph pivoting functionality, PolySwarm’s integration allows for the enrichment of the sample with domain and IP information found in the malware by static analysis and other malware that contain the same domain information.</p> </td> </tr> <tr> <td style="width:60px;vertical-align:top;"><img alt="" src="https://www.anomali.com/images/uploads/resources/benefit.png" style="width: 45px;" /></td> <td> <h3 class="nomargin">Customer Benefit:</h3> <p>The ability to quickly get a second opinion from cutting edge researcher driven engines and use this metadata within the Anomali platform to identify additional important details and information. This process dramatically increases both the speed and productivity of the respective SOC, CTI and IR teams and enables the organization to effectively safeguard the enterprise.</p> </td> </tr> </tbody> </table>