Centro de socios de Anomali
Explore nuestra biblioteca de próximos seminarios web, folletos y hojas de datos, informes y documentos técnicos del sector, estudios de casos y mucho más, que se celebrarán próximamente y bajo demanda.
![__wf_reserved_heredar](https://cdn.prod.website-files.com/6453db2ad32b573c40a15c49/646e404530fa9bb6180cde4f_discover-cover-image.webp)
![__wf_reserved_heredar](https://cdn.prod.website-files.com/6454d31338f3f4b0b5ecdf5f/648e6adc8d10f41c9cca20a0_logo-sixgill2.png)
![__wf_reserved_heredar](https://cdn.prod.website-files.com/6454d31338f3f4b0b5ecdf5f/648e6adc8d10f41c9cca20a0_logo-sixgill2.png)
Marketplace Partner
![__wf_reserved_heredar](https://cdn.prod.website-files.com/6454d31338f3f4b0b5ecdf5f/648e6adf06219274c54951a7_logo-securonix.png)
![__wf_reserved_heredar](https://cdn.prod.website-files.com/6454d31338f3f4b0b5ecdf5f/648e6adf06219274c54951a7_logo-securonix.png)
Marketplace Partner
![__wf_reserved_heredar](https://cdn.prod.website-files.com/6454d31338f3f4b0b5ecdf5f/648e6adb8d10f41c9cca200c_silobreaker.png)
![__wf_reserved_heredar](https://cdn.prod.website-files.com/6454d31338f3f4b0b5ecdf5f/648e6adb8d10f41c9cca200c_silobreaker.png)
Marketplace Partner
![__wf_reserved_heredar](https://cdn.prod.website-files.com/6454d31338f3f4b0b5ecdf5f/648e6ade1add2cbfacdfa355_logo-zscaler.png)
![__wf_reserved_heredar](https://cdn.prod.website-files.com/6454d31338f3f4b0b5ecdf5f/648e6ade1add2cbfacdfa355_logo-zscaler.png)
Marketplace Partner
![__wf_reserved_heredar](https://cdn.prod.website-files.com/6454d31338f3f4b0b5ecdf5f/648e6add1add2cbfacdfa270_logo-csis.png)
![__wf_reserved_heredar](https://cdn.prod.website-files.com/6454d31338f3f4b0b5ecdf5f/648e6add1add2cbfacdfa270_logo-csis.png)
Marketplace Partner
![__wf_reserved_heredar](https://cdn.prod.website-files.com/6454d31338f3f4b0b5ecdf5f/648e6ade95804003532ba5ab_logo-cybersponse.png)
![__wf_reserved_heredar](https://cdn.prod.website-files.com/6454d31338f3f4b0b5ecdf5f/648e6ade95804003532ba5ab_logo-cybersponse.png)
Marketplace Partner
![__wf_reserved_heredar](https://cdn.prod.website-files.com/6454d31338f3f4b0b5ecdf5f/648e6adb8d10f41c9cca1fc2_servicenow.png)
![__wf_reserved_heredar](https://cdn.prod.website-files.com/6454d31338f3f4b0b5ecdf5f/648e6adb8d10f41c9cca1fc2_servicenow.png)
Marketplace Partner
![__wf_reserved_heredar](https://cdn.prod.website-files.com/6454d31338f3f4b0b5ecdf5f/648e6ad406219274c5494d2c_logo-domain-tools.png)
![__wf_reserved_heredar](https://cdn.prod.website-files.com/6454d31338f3f4b0b5ecdf5f/648e6ad406219274c5494d2c_logo-domain-tools.png)
Marketplace Partner
DNS-Based Cyber Threat Detection and Response
The DomainTools® Iris™ App for Anomali delivers a subset of DomainTools Iris data, together with pivot capability and domain risk score, directly to the analyst inside the The Anomali Security Operations Platform. This integration enables rapid in-context assessments of domain name observables and discovery of connected domains that share the same IP, hostname, or SSL certificate hash.
![__wf_reserved_heredar](https://cdn.prod.website-files.com/6454d31338f3f4b0b5ecdf5f/648e6ad63123330e355ffaf2_logo-verodin.webp)
![__wf_reserved_heredar](https://cdn.prod.website-files.com/6454d31338f3f4b0b5ecdf5f/648e6ad63123330e355ffaf2_logo-verodin.webp)
Marketplace Partner
![__wf_reserved_heredar](https://cdn.prod.website-files.com/6454d31338f3f4b0b5ecdf5f/648e6ad91add2cbfacdf9ff7_logo-dragos.png)
![__wf_reserved_heredar](https://cdn.prod.website-files.com/6454d31338f3f4b0b5ecdf5f/648e6ad91add2cbfacdf9ff7_logo-dragos.png)
Marketplace Partner
![__wf_reserved_heredar](https://cdn.prod.website-files.com/6454d31338f3f4b0b5ecdf5f/648e6ad73123330e355ffbca_logo-bandura.webp)
![__wf_reserved_heredar](https://cdn.prod.website-files.com/6454d31338f3f4b0b5ecdf5f/648e6ad73123330e355ffbca_logo-bandura.webp)
Marketplace Partner
![__wf_reserved_heredar](https://cdn.prod.website-files.com/6454d31338f3f4b0b5ecdf5f/648e6ad9b6f8c441a3f3026c_kaspersky-2.png)
![__wf_reserved_heredar](https://cdn.prod.website-files.com/6454d31338f3f4b0b5ecdf5f/648e6ad83123330e355ffe25_partner-zerofox.png)
![__wf_reserved_heredar](https://cdn.prod.website-files.com/6454d31338f3f4b0b5ecdf5f/648e6ad106219274c5494c5a_OMES-OK-ISAC.png)
![__wf_reserved_heredar](https://cdn.prod.website-files.com/6454d31338f3f4b0b5ecdf5f/648e6ad106219274c5494c5a_OMES-OK-ISAC.png)
ISAC Partner
![__wf_reserved_heredar](https://cdn.prod.website-files.com/6454d31338f3f4b0b5ecdf5f/648e6ad2b6f8c441a3f30023_logo-malware-patrol.png)
![__wf_reserved_heredar](https://cdn.prod.website-files.com/6454d31338f3f4b0b5ecdf5f/648e6ad2b6f8c441a3f30023_logo-malware-patrol.png)
Marketplace Partner
![__wf_reserved_heredar](https://cdn.prod.website-files.com/6453db2ad32b573c40a15c49/646cffbb29887a119df54979_schedule-demo.webp)
Automatice el descubrimiento y la investigación de amenazas
Las organizaciones confían en Anomali para obtener información relevante rápidamente para informar a la alta dirección y a todos los departamentos.