Transform security operations with disruptive security analytics. Go from business risk to cyber actions in minutes. Amplify your visibility, automate your workflows, and optimize your cyber stack.
Your risk surface: Where are you at risk of exposure?
Your compromise: What have the attackers already taken from you?
The external landscape: From data to insights in minutes.
Your curated intelligence: Accelerate your time to protection.
A unique cybersecurity marketplace providing instant access to a growing catalog of threat intelligence providers, integration partners, and threat analysis tools.
Trial and purchase threat intelligence feeds from Anomali partners – find the right intelligence for your organization, industry, geography, threat type, and more.
Gain the tools to pivot quickly from one piece of information to look up other sources of data to get a complete picture of a threat – all one click away.
Anomali seamlessly integrates with many Security and IT systems to operationalize threat intelligence.cost.
The Anomali Technology Partner Program provides technology partners everything they need to develop innovative and differentiated product and service integrations that complement Anomali’s solution portfolio designed to stop breaches and attackers.
Upcoming and on-demand webinars, brochures and datasheets, industry reports and white papers, case studies, and more.
Anomali offers compelling margins, competitive partner support, and new revenue opportunities for partners looking to help their customers boost the efficacy of security infrastructure, improve security visibility and automate operations while saving costs
We believe that creating and investing in an ecosystem of technology partners is imperative in delivering better business outcomes for our customers. Sharing threat intelligence and insights across ISACs, ISAOs, and other communities also depend on this collaboration.
The Anomali Partner Portal is a place to register new sales opportunities and access Anomali resources.
Now we have just come to the end of the second day of CIO today there's been a lot of conversations around intelligence and cybersecurity matters to do with cyber-securities in various sectors.
And we had a presentation also on just how companies and organizations can secure themselves by intelligence, getting intelligence and hunting for threats in their matters of security.
And right here I'm seated with Director Niall MacLeod from Solutions from Director of Solutions Architect, Anomali, a company that deals with intelligence and matters of security, who's going to be telling us much more on matters of intelligence solutions, and also hunting for threats.
Thank you so much, sir, for joining us.
Victoria, thank you very much Victoria.
Right now in the country, just the first quarter of 2019 we had 11.2 million threats of cyber attacks in various organizations and various sectors.
You were talking about intelligence and also threat intelligence and hunting intelligence.
Just how useful is this?
It's incredibly useful these days.
We see a lot of organizations being hit by attacks continuously.
We see organizations not be able to distinguish between good network traffic and bad network traffic.
And what we do in the threat intelligence space is we take external context of what's happening on your network and we apply that data set to what's happening internally with your network, with the events on your systems.
And we are able to distinguish between good and bad there.
VICTORIA: Talking about this kind of solution, probably someone will think it's too expensive to get into this.
It can vary dramatically.
You can start using threat intelligence completely free.
We have a free platform you can use.
You can go onto the internet and start looking for things called open source threat intelligence, which is community sourced and published freely available on the internet.
So getting into threat intelligence and producing some sort of basic feeds doesn't have to cost you anything more than time to start off with.
VICTORIA: Talk about hunting for threats.
How useful-- why would an organization go into hunting for threats?
Great.
Well, what happens is an organization, say for example a bank within Kenya, might receive information about an attack that is affecting another bank.
That information is shared with them.
And what they might want to do is start hunting within their network and say, have I seen anything related to this attack on my network?
Have I maybe been hit in the early stages of attack and I haven't noticed it yet?
So that's the one thing we do with threat hunting.
The other thing we do is we use it to test our defenses.
So if I know how an attacker typically carries out his malicious behaviors, I can simulate those.
I can attack my own network internally, and I can see what my security operation center actually finds, what they pick up, and what they miss.
And based on that, I can work out which security tools are working effectively, where I have gaps in my vision of what is on wrong with my network, and I have a plan on where to start rectifying and shoring up defenses.
VICTORIA: In terms of numbers, how much has this been able to save in terms of attacker-- I mean cyber attacks.
It's very difficult to quantify, as is many things in cyber security.
But if you look at things like the WannaCry virus that hit two years ago, there was companies who had losses of hundreds of millions of pounds in US dollars, shipping companies in Denmark, the National Health System in the UK.
These were organizations that were hit, and their losses were incredible, just through lost productivity, not being able to ship shipments when they should, not being able to schedule deliveries.
The costs are phenomenal.
So when you look at the cost of threat intelligence, if it can save you one of those, it is invaluable.
But it is very much like an insurance policy.
It is very often a cost that you don't realize until you're hit by an attack.
VICTORIA: And cyber attacks is one of the most threatening when it comes to technology in the country, and the numbers also say that just this year alone, the first quarter, the country lost 29.2 billion shillings on matters, just cyber attacks.
Now, when companies want to invest into this intelligence, probably most of them do not know where to start.
Do you start investing in the people or the systems?
So which one comes first?
The people are difficult at the moment.
There is an incredible cybersecurity skill shortage around the world, and from presentations today definitely a skill shortage in Kenya as well.
So you do have that gap on the number of people available to protect the networks against the number of people needed.
So you have to have people first of all.
So you need to staff up as best you can.
But then what we see people doing, what we see organizations doing is investing in technologies to save on the human cost.
If I can get something automated with the system and I don't have to have a human doing it, I can get away with it.
So it's really a combination.
We have to have people there to do the work.
But we can make them more efficient by providing technology.
VICTORIA: And finally, as we finish this, where do you see when-- from where you sit, where are we heading to in the future?
In the future, well cyber attacks are on the increase worldwide.
I can't see why there would be any difference in Kenya.
I think the region, the East African region, has been particularly hard hit.
A lot of cyber threat actors are looking at East Africa as a test bed.
You have sophisticated infrastructure but maybe still considered slightly remote.
Where hackers will come in and run proof of concepts on their latest malicious software, they'll try it out in Kenya and if it works they'll refine it and then use it in other countries.
So we're going to see cyber attacks constantly increasing, and we need to be able to defend ourselves the best we can.
VICTORIA: Thank you so much for your time.
Great.
Thank you very much, Victoria.
Niall MacLeod, the Director Solutions Architect, Anomali, speaking to Metropol TV right here on the second day of CIO 100 Symposium & Awards.
Tomorrow marks the end of this symposium where we'll be having awards to the members, some of the members of CIO and the CEOs form various companies will be awarded tomorrow.
And also a lot of conversation also going on matters just innovation and automation that has been among the major issues that have been discussed here in the second edition of CIO 100 Symposium & Awards.
We'll definitely be keeping you up to date on each and everything that happens.
And from here, from me and my crew from Metropol TV and my guest Niall Cloud, MacLeod it's a good night.