With the APP Store, you can easily evaluate and purchase threat intelligence streams and investigation enrichment offerings offered by Anomali partners directly in the ThreatStream admin console, as well as customize your included subscriptions to more than 100 open-source threat feeds. Anomali’s pre-integrated partner ecosystem includes the leading global research vendors offering indicators and insights spanning threat categories you need to secure your business, letting you easily implement your intelligence coverage strategy across a breadth of threat categories in the APP Store, including:
- Adversary Monitoring
- Brand Monitoring
- Malware Intelligence
- Social Media
- Deep & Dark Web
- Domain Monitoring
- Fraud Intelligence
- Mobile Device
- Physical Infrastructure
- Vulnerability Prioritization
Join the APP Store
Accenture DeepSight addresses every stage of the attack lifecycle with industry-leading threat intelligence, advanced monitoring, incident response, and cyber skills development services.
Blueliv is a leading provider of targeted cyber threat information and analysis intelligence for large enterprises and service providers. Our deep expertise, global high-quality data sources, and proprietary big-data analysis capabilities enable our clients to successfully prevent targeted cyber attacks and strategically minimize future threats. The Blueliv cyber threat platform and feed address a comprehensive range of cyber threats to turn global threat data into predictive, actionable intelligence specifically for each enterprise and the unique threats it faces. Our powerful search and big-data analytics capabilities deliver real-time actionable information and adaptive response to our clients and partners.
Cisco® Threat Grid combines two of the leading malware protection solutions: unified malware analysis and context-rich intelligence. It empowers security professionals to proactively defend against and quickly recover from cyber attacks. Cisco Threat Grid crowd-sources malware from a closed community and analyzes all samples using proprietary, highly secure techniques that include static and dynamic (sandboxing) analysis. It correlates the results with hundreds of millions of other analyzed malware artifacts to provide a global view of malware attacks, campaigns, and their distribution. Security teams can quickly correlate a single sample of observed activity and characteristics against millions of other samples to fully understand its behaviors in a historical and global context.
Cofense empowers your people to recognize phishing attacks and stop them in minutes, not days. Our end-to-end phishing defense solution combines cutting-edge technology with collective human intelligence to protect your organization from inbox to SOC. Cofense Intelligence is timely, trusted, high-fidelity, and contextual phishing-specific attack intelligence to help fight rapidly evolving threat landscape.
CrowdStrike™ is a leading provider of next-generation endpoint protection, threat intelligence, and services. CrowdStrike Falcon enables customers to prevent damage from targeted attacks, detect and attribute advanced malware and adversary activity in real time, and effortlessly search all endpoints reducing overall incident response time. CrowdStrike customers include some of the largest blue chip companies in the financial services, energy, oil & gas, telecommunications, retail, and technology sectors, along with some of the largest and most sophisticated government agencies worldwide.
We're an independent cyber security services company with a single focus - detecting and mitigating threats to protect our customers’ assets, brands and users. We create value by sharing our threat intelligence expertise, and help protect some of the world's largest commercial enterprises. Trusted by law enforcement agencies, government, business and news media, we are more than 60 cyber security professionals from over 20 countries.
Digital Shadows monitors and manages an organization’s digital risk across the widest range of data sources within the visible, deep and dark web to protect the company’s business and reputation. Digital Shadows SearchLight™ service combines the industry’s most comprehensive and scalable data analytics combined with human data security experts to protect an organization from digital risks.
The Dragos ICS asset identification, threat detection and response platform distills decades of real-world experience from an elite team of ICS cybersecurity experts across the U.S. intelligence community and private industrial companies. Dragos’ offerings also include professional services, and Dragos WorldView for regular threat intelligence reports. Dragos is headquartered in the Washington, DC area.
Proofpoint ET Intelligence delivers the most timely and accurate threat intelligence. Their fully verified intel provides deeper context and integrates seamlessly with your security tools to enhance your decision-making.
Most threat intelligence solutions suffer because the data is too hard to standardize and verify. Facebook created the ThreatExchange platform so that participating organizations can share threat data using a convenient, structured, and easy-to-use API that provides privacy controls to enable sharing with only desired groups.
Farsight Security provides rapid threat detection and response to rapidly identify and react to incursions of your internet presence and brand. Real-time contextual information increases the value of threat data for the enterprise, government and security industries. Farsight provides the world’s most security conscious organizations with threat intelligence and incident threat detection, protecting users and their infrastructure.
FireEye is the intelligence-led security company. Working as a seamless, scalable extension of customer security operations, FireEye offers a single platform that blends innovative security technologies, nation-state grade threat intelligence, and our world-renowned Mandiant consulting. With this approach, FireEye eliminates the complexity and burden of cyber security for organizations struggling to prepare for, prevent, and respond to cyber attacks.
Flashpoint strives to empower their customers to make better decisions in support of their customers' business or mission by gathering the most salient data publicly available on the internet and providing meaningful, timely, relevant, and actionable insights through a fusion of technology and subject matter expertise. Their ultimate goal is to make the world a safer place by empowering people and organizations everywhere to detect, understand, and mitigate the risks that matter to them the most.
The Georgia Tech Research Institute is a highly-regarded applied research and development organization. Each day, GTRI’s science and engineering expertise is used to solve some of the toughest problems facing government and industry across the nation and around the globe. GTRI redefines innovation by tackling customers’ most complex challenges with the right mix of expertise, creativity and practicality. Our expert scientists and engineers turn ideas into workable solutions and then put those solutions into action. GTRI has 76 active US Letters Patents, 43 pending US patent applications and 15 pending provisional applications in the United States.
Group-IB is one of the global leaders in preventing and investigating high-tech crimes and online fraud. Since 2003, the company has been active in the field of computer forensics and information security, protecting the largest international companies against financial losses and reputation risks.
iDefense empowers its customers’ environments with contextual, timely and actionable security intelligence, enabling businesses and governments to make smarter decisions to defend against new and evolving threats.
Intel 471 provides an actor-centric intelligence collection capability for the world's leading cyber threat intelligence teams. Their intelligence collection focuses on infiltrating and maintaining access to closed sources where threat actors collaborate, communicate and plan cyber attacks.
FireEye iSIGHT Threat Intelligence is a proactive, forward-looking means of qualifying threats poised to disrupt your business based on the intents, tools and tactics of the attacker. Our high-fidelity, comprehensive intelligence delivers visibility beyond the typical attack lifecycle, adding context and priority to global threats before, during and after an attack. It helps mitigate risk, bolster incident response, and enhance your overall security ecosystem. Get the intel you need to predict attack and refocus your attention on what matters most to your business.
Most Tested. Most Awarded. For over 20 years, we’ve been recognized as experts in the fight against malware and cybercrime. In 2017, Kaspersky products participated in 86 independents tests & reviews – and were awarded 72 first places and 78 top-three finishes.
Malware Patrol provides real-time threat intelligence that protects companies in over 175 countries against the latest cyber threats, including phishing, malware, ransomware, data exfiltration, and brand infringement. Security teams rely on our dependable and historically rich data to expand their threat landscape visibility, resulting in improved detection rates and response times.
Q6 Cyber monitors the Digital Underground - a vast universe of online sites, marketplaces, communities, and forums where hackers, fraudsters, and cyber criminals operate and interact. Our 24x7 coverage includes not only the DarkWeb and DeepWeb, but also malware networks, botnets, private messaging platforms and other cybercrime infrastructure. Q6 delivers exceptional ROI to enterprise customers around the world through significant reduction of fraud losses, data breaches, and electronic crimes including Customer Account Takeovers and Payment Card Fraud. Our e-Crime Intelligence helps to transform your information security and fraud operations from reactive to proactive.
Red Sky Alliance provides targeted cyber threat intelligence in the forms of services, feeds and reporting. Founded in 2011, Red Sky Alliance has tracked and analyzed malware, ransomware and cyber threat actor groups. Services such as their RedXray cyber threat notification service can provide daily cyber threat intelligence without installing software, hardware or require a network connection. Prices for this service begin at US$ 500.00 per month.
Silobreaker helps security, business and intelligence professionals make sense of the overwhelming amount of data available on the web. By discovering insights that are buried deep inside the data, we help you uncover the information that is most valuable to you. Our products are designed to support your workflow, from collecting and analysing data to disseminating your findings across your organisation.
Sixgill’s cyber threat intelligence solution focuses on your intelligence needs, helping you mitigate risk to your organization, more effectively and more efficiently. Using an agile and automatic collection methodology, Sixgill provides you with broad coverage of exclusive-access deep and dark web sources as well as relevant surface web sources. Utilizing artificial intelligence and machine learning, Sixgill automates the production cycle of cyber intelligence from monitoring, to extraction to production, uniquely focusing on relevant threats operating in these sources. A market leader in deep and dark web cyber threat intelligence, Sixgill provides threat intelligence solutions to enterprises around the world including Fortune 500 companies, financial institutions, and law enforcement agencies, addressing a wide range of cybersecurity challenges.
TeamT5 is a group of hackers dedicated to cyber threat research. The team started out with outstanding research ability and has been delivering cyber threat intelligence (CTI) for more than 5 years. Compared with other CTI vendors, TeamT5 has the deepest and best understanding of cyber attackers in the Asia Pacific region. With leading intelligence and knowledge of cyber-attacks, TeamT5 developed unique technologies and methodology to help clients deal with targeted attacks. The solutions have been verified and have helped numerous victims to solve their problems.
The Media Trust works with the world's largest, most-heavily trafficked digital properties—websites and mobile apps—to provide real-time security, first-party data protection and privacy, performance management and quality assurance solutions that help protect, monetize and optimize the user experience across desktop, smartphone, tablet and gaming devices.