All Posts
Anomali
1
min read

The Evolution of Anomali: How Anomali's ThreatStream has evolved into delivering a differentiated approach to XDR

Published on
July 11, 2022
Table of Contents

As a cybersecurity innovator, Anomali’s founder, Hugh Njemanze, looks at an unsolved problem through the combined lens of technical, business and end user requirements.

When he founded Anomali, then called ThreatStream, he saw a critical need to make threat intelligence relevant and ultimately actionable. Hugh has continued to apply his entrepreneurial approach, now delivering a big data solution that helps security teams quickly understand threats, determine the impact, and respond quickly to solve for the extended detection and response needs of the business.

Hugh recently joined Mitch Ashley at RSA 2022 to discuss Anomali’s intelligence-driven extended detection and response (XDR) cybersecurity solutions.

Listen as Hugh discusses how the early days of SIEMs and Anomali’s ThreatStream has culminated in an offering that is now focused on delivering a differentiated approach to XDR.

You’ll hear more about:

  • Why threat intelligence is a key component of an in-depth security program
  • Why organization's need to gain a better understanding of what adversaries are doing and their intent
  • Hugh’s thoughts on what XDR is and should be
  • How XDR breaks down silos and ties information about attacks and attackers together
Before XDR was XDR, we were extending the ability to collect and manage unlimited levels of threat data, making it available for investigations, enabling internal threat detection by matching it against all telemetry, and ultimately helping to power faster response by operationalizing intelligence across security infrastructures. Hugh Njemanze

Today - Anchored by big data management and refined by artificial intelligence, The Anomali Platform, a differentiated XDR solution, delivers unique proprietary capabilities that correlates the largest repository of global intelligence with telemetry from customer-deployed security solutions. This combination empowers security operations teams to detect threats with precision, optimize response, achieve resiliency and ultimately stop attackers and breaches.

Listen to the interview and read Hugh’s blog to learn more.

FEATURED RESOURCES

February 17, 2026
Anomali Cyber Watch

Anomali Cyber Watch: Zero-Click Affects Claude, SolarWinds Vulnerabilities for Velociraptor and more

Zero-Click Remote Code Execution Flaw Affects Claude Desktop Extensions. Threat Actors Exploit SolarWinds Web Help Desk Vulnerabilities to Deploy Velociraptor. Fake 7-Zip Site Distributes Trojanized Installer Converting Systems to Proxy Nodes. ZeroDayRAT Commercial Mobile Spyware Targets Android and iOS. And more..
Read More
February 10, 2026
Anomali Cyber Watch

Anomali Cyber Watch: Notepad++ Attack, RAT Uses Hugging Face, Microsoft Office Flaw and more

Notepad++ Supply Chain Attack Delivers Chrysalis Backdoor. Android RAT Uses Hugging Face Platform to Host Malicious Payloads. Fancy Bear Exploits Microsoft Office Flaw in Ukraine. Nitrogen Ransomware Decryptor Fails Due to Coding Error. And more...
Read More
February 16, 2026
IT Operations
Security Operations

Data Hygiene for AI Security: Stop Ingesting Everything, Start Engineering Signal

Read More
Explore All