All Posts
Anomali
1
min read

The Evolution of Anomali: How Anomali's ThreatStream has evolved into delivering a differentiated approach to XDR

Published on
July 11, 2022
Table of Contents

As a cybersecurity innovator, Anomali’s founder, Hugh Njemanze, looks at an unsolved problem through the combined lens of technical, business and end user requirements.

When he founded Anomali, then called ThreatStream, he saw a critical need to make threat intelligence relevant and ultimately actionable. Hugh has continued to apply his entrepreneurial approach, now delivering a big data solution that helps security teams quickly understand threats, determine the impact, and respond quickly to solve for the extended detection and response needs of the business.

Hugh recently joined Mitch Ashley at RSA 2022 to discuss Anomali’s intelligence-driven extended detection and response (XDR) cybersecurity solutions.

Listen as Hugh discusses how the early days of SIEMs and Anomali’s ThreatStream has culminated in an offering that is now focused on delivering a differentiated approach to XDR.

You’ll hear more about:

  • Why threat intelligence is a key component of an in-depth security program
  • Why organization's need to gain a better understanding of what adversaries are doing and their intent
  • Hugh’s thoughts on what XDR is and should be
  • How XDR breaks down silos and ties information about attacks and attackers together
Before XDR was XDR, we were extending the ability to collect and manage unlimited levels of threat data, making it available for investigations, enabling internal threat detection by matching it against all telemetry, and ultimately helping to power faster response by operationalizing intelligence across security infrastructures. Hugh Njemanze

Today - Anchored by big data management and refined by artificial intelligence, The Anomali Platform, a differentiated XDR solution, delivers unique proprietary capabilities that correlates the largest repository of global intelligence with telemetry from customer-deployed security solutions. This combination empowers security operations teams to detect threats with precision, optimize response, achieve resiliency and ultimately stop attackers and breaches.

Listen to the interview and read Hugh’s blog to learn more.

FEATURED RESOURCES

January 6, 2026
Anomali Cyber Watch

Anomali Cyber Watch: OWASP Agentic AI, MongoBleed, WebRAT Malware, and more

Real-World Attacks Behind OWASP Agentic AI Top 10. MongoDB Memory Leak Vulnerability “MongoBleed” Actively Exploited. WebRAT Malware Spread via Fake GitHub Proof of Concept Exploits. Trusted Cloud Automation Weaponized for Credential Phishing. MacSync macOS Stealer Evolves to Abuse Code Signing and Swift Execution. Claimed Resecurity Breach Turns Out to Be Honeypot Trap. Cybersecurity Professionals Sentenced for Enabling Ransomware Attacks. Google Tests Nano Banana 2 Flash as Its Fastest Image AI Model. RondoDox Botnet Exploits React2Shell to Hijack 90,000+ Systems. Critical n8n Expression Injection Leads to Arbitrary Code Execution
Read More
December 23, 2025
Anomali Cyber Watch

Anomali Cyber Watch: SantaStealer Threat, Christmas Scams of 2025, React2Shell Exploit, Phishing via ISO, and more

SantaStealer Infostealer Threat Gains Traction in Underground Forums. From Fake Deals to Phishing: The Most Effective Christmas Scams of 2025. React2Shell Exploitation Expands With New Payloads and Broader Targeting. Russian Phishing Campaign Delivers Phantom Stealer via ISO Attachments. And More...
Read More
December 16, 2025
Anomali Cyber Watch

Anomali Cyber Watch: GhostPenguin, SharePoint Exploits, Android Spyware, CastleLoader Malware Expansion, and more

Read More
Explore All