
Lens architecture

How customers use Lens
Scale security operations with the power of AI. Power analyst experience and efficiency.
Answer, “Am I affected?”
MITRE ATT&CK mapping
Executive and analyst summaries
Automate tagging and enrichment
Continuous protection
Key capabilities
Unstructured data to intel
Derive intel from unstructured data sources: blogs, docs, pdf, bulletins, etc.
Natural language processing
Go from blogs and docs to machine readable intel in seconds with NLP
Generative AI
Translate machine data to human insights with GPT
Intel enrichment
Automatically tag intelligence with actors, regions, industry, vulnerabilities, and more
Browser extensions
Transform web research to intelligence with one click
Sandbox
Detonate URLs in a sandbox to extract real-time indicators
Auto investigate
Automatically create or add to investigations for faster MTTx
Threat bulletins
Generate threat bulletins to inform peers and executives on key events
Threat hunting
Hunt for attacker footprints in your environment with one click
State Government
Chief Information Security Officer


Recognized as a leader in modernizing security operations







Schedule a demo
Time is the biggest enemy when dealing with critical events. Anomali Lens enables you to go from bulletins to bulletproof in minutes.
Take Lens for a test drive today.