All Posts
Cyber Threat Intelligence
Threat Intelligence Platform
Anomali
1
min read

Anomali Announces New Threat Platform and SDKs at Detect '18

Anomali announced the launch of a new Threat Platform and developer SDKs. The Anomali Threat Platform delivers a comprehensive threat detection, analysis, and response suite.
Published on
September 21, 2018
Table of Contents

Detect ‘18 began this year with keynote addresses from Hugh Njemanze and General Colin L. Powell, USA (Ret.). Anomali announced in their keynote the launch of a new Threat Platform and developer SDKs. The Anomali Threat Platform delivers a comprehensive threat detection, analysis, and response suite and is comprised of five core capabilities:

  • Intelligence: collection, optimization and enrichment of threat intelligence
  • Investigation: understand cyber threats with comprehensive analyst workbench
  • Detection: proactive detection of active, serious threats targeting client networks
  • Automation: eliminate manual processes and streamline investigation and response
  • Collaboration: secure threat sharing via trusted circles, ISACs and ISAOs

“We launched the company in 2013 with the industry’s first threat intelligence platform,” said Hugh Njemanze, chief executive officer at Anomali. “Since then we have continually innovated and expanded the capabilities to achieve our goal of helping organizations detect, understand, and respond to critical threats. The Anomali Threat Platform gives security teams a fully integrated suite to stay on top of their most serious threats.”

Anomali also announced the expansion of the partner ecosystem with the release of three software development kits (SDKs). These new SDKs enable easier and faster integration with the Anomali Threat Platform and APP Store, allowing clients immediate access to partner content, integrations and analytics. The SDKs address three critical integration areas:

Threat Intelligence Feeds SDK: integrate proprietary threat intelligence feeds and make these accessible via the APP Store

Integration SDK: integrate threat intelligence from the Anomali Threat Platform into third party products and solutions

Enrichment SDK: integrate 3rd party threat analysis and data enrichments into the Anomali Threat Platform

“Organizations need a comprehensive threat platform that incorporates the most relevant threat intelligence, integrates with their internal security stack, and leverages the most valuable analytics available,” said Hugh Njemanze, chief executive officer at Anomali. “We developed these SDKs to deliver better threat visibility and response. I’m grateful to our partners, Symantec, Intel471, and RiskIQ for their early adoption and feedback, and welcome all interested partners to work with Anomali.”

“We share Anomali’s commitment to enabling more seamless interoperability of our solutions to deliver the full promise of threat intelligence,” said Peter Doggart, vice president business development, Symantec. “The Anomali Integration SDK furthers this vision and we look forward to working with Anomali to combine the power of Symantec’s Integrated Cyber Defense Platform with their cyber threat intelligence.”

“Combatting sophisticated cybercriminals requires timely, relevant and actionable intelligence that can be operationalized easily within an organization”, said Michael Anderson, vice president of partnerships at Intel 471. “Anomali’s SDK will enable customers to operationalize Intel 471 intelligence easily and at near real time within their Anomali deployment and security stack.”

“Threat analysts require immediate access to RiskIQ’s unique datasets to understand and respond to the adversary,” said Lou Manousos, chief executive officer at RiskIQ. “Our integration with the Anomali Threat Platform ensures that analysts have the right information available just a click away at all times.”

Partners can learn more about the SDKs and the APP Store program and register for access at www.anomali.com/app-store. Don't miss next year's Detect for an opportunity to discuss threat intelligence topics, connect with industry peers, earn CPE credits, and learn about the latest from Anomali.

FEATURED RESOURCES

January 20, 2026
Anomali Cyber Watch

Anomali Cyber Watch: Remcos RAT, BitB phishing, Linux Malware Framework, Supply Chain Intrusion and more

New Malware Campaign Delivers Remcos RAT Through Text-Only Staging and Living-Off-the-Land Execution. Browser-in-the-Browser Phishing Evolves into a High-Fidelity Credential Trap. Cloud-Aware Linux Malware Framework Poised for Future Threats. And More..
Read More
January 13, 2026
Anomali Cyber Watch

Anomali Cyber Watch: Cisco ISE Flaw, Ni8mare, N8scape, Zero-Click Prompt Injection and more

Anomali Cyber Watch: Cisco ISE Flaw Enables Arbitrary File Read via Administrative Access. Ni8mare and N8scape Vulnerabilities Expose n8n Automation Platforms to Full Compromise. Zero-Click Prompt Injection Abuse Enables Silent Data Exfiltration via AI Agents. Phishing Attacks Exploit Misconfigured Email Routing to Spoof Internal Domains. Ransomware Activity in the U.S. Continued to Rise in 2025. Android Ghost Tap Malware Drives Remote NFC Payment Fraud Campaigns. Black Cat SEO Poisoning Malware Campaign Exploits Software Search Results. MuddyWater Upgrades Espionage Arsenal with RustyWater RAT in Middle East Spear-Phishing. China-Linked ESXi VM Escape Exploit Observed in the Wild. Instagram Denies Data Breach Despite Claims of 17.5 Million Account Data Leak
Read More
January 6, 2026
Anomali Cyber Watch

Anomali Cyber Watch: OWASP Agentic AI, MongoBleed, WebRAT Malware, and more

Real-World Attacks Behind OWASP Agentic AI Top 10. MongoDB Memory Leak Vulnerability “MongoBleed” Actively Exploited. WebRAT Malware Spread via Fake GitHub Proof of Concept Exploits. Trusted Cloud Automation Weaponized for Credential Phishing. MacSync macOS Stealer Evolves to Abuse Code Signing and Swift Execution. Claimed Resecurity Breach Turns Out to Be Honeypot Trap. Cybersecurity Professionals Sentenced for Enabling Ransomware Attacks. Google Tests Nano Banana 2 Flash as Its Fastest Image AI Model. RondoDox Botnet Exploits React2Shell to Hijack 90,000+ Systems. Critical n8n Expression Injection Leads to Arbitrary Code Execution
Read More
Explore All