Conéctese con la comunidad de CISO de Anomali
Tienda asociada preferida de Anomali
El único mercado para la inteligencia, el enriquecimiento y la integración de amenazas.
![__wf_reserved_heredar](https://cdn.prod.website-files.com/6453db2ad32b573c40a15c49/646cfdaf820b84e0484c6e51_Anomali.jpg)
Herramientas e inteligencia integradas que proporcionan contexto e información procesable
Los equipos de seguridad ahora cuentan con una amplia variedad de fuentes de inteligencia sobre amenazas que les proporcionan indicadores de riesgo, pero conocer una dirección IP o un nombre de dominio es solo el primer paso para prevenir o responder a una amenaza. Enriquecer el contexto en torno a las IOC aumenta considerablemente su valor para los analistas, y al ampliar la investigación sobre amenazas con servicios avanzados de análisis de amenazas, como el sandboxing, se obtienen detalles fundamentales.
¿Quiere ampliar sus capacidades de análisis de amenazas? Podemos ayudarlo a identificar los datos de enriquecimiento y las herramientas de análisis adecuados para su organización.
Herramientas de análisis de amenazas
Anomali ofrece más de 200 servicios avanzados de análisis de amenazas, que incluyen:
![__wf_reserved_heredar](https://cdn.prod.website-files.com/6454d31338f3f4b0b5ecdf5f/648e6b06f30950587127c850_logo-authentic8.webp)
![__wf_reserved_heredar](https://cdn.prod.website-files.com/6454d31338f3f4b0b5ecdf5f/648e6b03067f9c6e0972db1e_logo-cisco-umbrella.png)
![__wf_reserved_heredar](https://cdn.prod.website-files.com/6454d31338f3f4b0b5ecdf5f/648e6b04204ed3d8d3cb7de2_logo-crowdstrike.webp)
![__wf_reserved_heredar](https://cdn.prod.website-files.com/6454d31338f3f4b0b5ecdf5f/648e6ad406219274c5494d2c_logo-domain-tools.png)
![__wf_reserved_heredar](https://cdn.prod.website-files.com/6454d31338f3f4b0b5ecdf5f/648e6b0c067f9c6e0972e213_logo-greynoise.png)
![__wf_reserved_heredar](https://cdn.prod.website-files.com/6454d31338f3f4b0b5ecdf5f/648e6b0e067f9c6e0972e36b_logo-hyas.png)
![__wf_reserved_heredar](https://cdn.prod.website-files.com/6454d31338f3f4b0b5ecdf5f/648e6b154341455f6b0a3ff8_ip_quality_score.png)
![__wf_reserved_heredar](https://cdn.prod.website-files.com/6454d31338f3f4b0b5ecdf5f/648e6ae0b6f8c441a3f305ad_logo-joe-security.png)
![__wf_reserved_heredar](https://cdn.prod.website-files.com/6454d31338f3f4b0b5ecdf5f/648e6b02a4ef1bc8b2134d8f_logo-maltego.png)
![__wf_reserved_heredar](https://cdn.prod.website-files.com/6454d31338f3f4b0b5ecdf5f/648e6afe1fc7402ccfb91a25_logo-recorded-future.webp)
![__wf_reserved_heredar](https://cdn.prod.website-files.com/6454d31338f3f4b0b5ecdf5f/648e6adb8d10f41c9cca200c_silobreaker.png)
![__wf_reserved_heredar](https://cdn.prod.website-files.com/6454d31338f3f4b0b5ecdf5f/648e6afe204ed3d8d3cb7cba_logo-soltra.png)
![__wf_reserved_heredar](https://cdn.prod.website-files.com/6454d31338f3f4b0b5ecdf5f/648e6ae4a4ef1bc8b2133ff6_logo-vmray.png)
![__wf_reserved_heredar](https://cdn.prod.website-files.com/6454d31338f3f4b0b5ecdf5f/648e6afe25130019822279ac_logo-virustotal.png)
![__wf_reserved_heredar](https://cdn.prod.website-files.com/6454d31338f3f4b0b5ecdf5f/648e6b06f30950587127c850_logo-authentic8.webp)
![__wf_reserved_heredar](https://cdn.prod.website-files.com/6454d31338f3f4b0b5ecdf5f/648e6b03067f9c6e0972db1e_logo-cisco-umbrella.png)
![__wf_reserved_heredar](https://cdn.prod.website-files.com/6454d31338f3f4b0b5ecdf5f/648e6b04204ed3d8d3cb7de2_logo-crowdstrike.webp)
![__wf_reserved_heredar](https://cdn.prod.website-files.com/6454d31338f3f4b0b5ecdf5f/648e6ad406219274c5494d2c_logo-domain-tools.png)
DNS-Based Cyber Threat Detection and Response
The DomainTools® Iris™ App for Anomali delivers a subset of DomainTools Iris data, together with pivot capability and domain risk score, directly to the analyst inside the The Anomali Security Operations Platform. This integration enables rapid in-context assessments of domain name observables and discovery of connected domains that share the same IP, hostname, or SSL certificate hash.
![__wf_reserved_heredar](https://cdn.prod.website-files.com/6454d31338f3f4b0b5ecdf5f/648e6b0c067f9c6e0972e213_logo-greynoise.png)
![__wf_reserved_heredar](https://cdn.prod.website-files.com/6454d31338f3f4b0b5ecdf5f/648e6b0e067f9c6e0972e36b_logo-hyas.png)
![__wf_reserved_heredar](https://cdn.prod.website-files.com/6454d31338f3f4b0b5ecdf5f/648e6b154341455f6b0a3ff8_ip_quality_score.png)
![__wf_reserved_heredar](https://cdn.prod.website-files.com/6454d31338f3f4b0b5ecdf5f/648e6ae0b6f8c441a3f305ad_logo-joe-security.png)
![__wf_reserved_heredar](https://cdn.prod.website-files.com/6454d31338f3f4b0b5ecdf5f/648e6b02a4ef1bc8b2134d8f_logo-maltego.png)
![__wf_reserved_heredar](https://cdn.prod.website-files.com/6454d31338f3f4b0b5ecdf5f/648e6afe1fc7402ccfb91a25_logo-recorded-future.webp)
![__wf_reserved_heredar](https://cdn.prod.website-files.com/6454d31338f3f4b0b5ecdf5f/648e6adb8d10f41c9cca200c_silobreaker.png)
![__wf_reserved_heredar](https://cdn.prod.website-files.com/6454d31338f3f4b0b5ecdf5f/648e6afe204ed3d8d3cb7cba_logo-soltra.png)
![__wf_reserved_heredar](https://cdn.prod.website-files.com/6454d31338f3f4b0b5ecdf5f/648e6ae4a4ef1bc8b2133ff6_logo-vmray.png)
![__wf_reserved_heredar](https://cdn.prod.website-files.com/6454d31338f3f4b0b5ecdf5f/648e6afe25130019822279ac_logo-virustotal.png)
![__wf_reserved_heredar](https://cdn.prod.website-files.com/6453db2ad32b573c40a15c49/646cffbb29887a119df54979_schedule-demo.webp)
Mejore sus capacidades de detección y respuesta
Las organizaciones confían en Anomali para aprovechar el poder de la inteligencia de amenazas y ofrecer capacidades eficaces de detección y respuesta ampliadas (XDR).