<h2 class="text-center">Anomali and CipherTrace: Cryptocurrency Threat Intelligence</h2>
<p>Detect, investigate, and respond to crypto-threats with CipherTrace Sentry and Anomali ThreatStream</p>
<h3>CipherTrace and Anomali Joint Solution Features</h3>
<ul>
<li>Deep Blockchain Insights: CipherTrace Sentry Enrichment for Anomali ThreatStream provides powerful and easy-to-use cryptocurrency de- anonymization and tracing to increase crypto-threat visibility, detection, and response and enhance investigations.</li>
<li>Credible Transaction Attribution: With CipherTrace Sentry, Anomali users can leverage CipherTrace’s industry-leading attribution to de-anonymize crypto- addresses and associate them with real-world entities and events, such as criminals, dark markets, ransomware events, terrorist funding, crypto- exchanges and ATMs, and more.</li>
</ul>
<h3>Immediate Time-to-Value</h3>
<ul>
<li>Matches Crypto Addresses with IP Addresses: Using the CipherTrace enrichment for Anomali ThreatStream, users can view all the crypto addresses associated with an IP Address of interest, along with their associated owners and events.</li>
<li>Investigate Ransomware Payments: Detailed blockchain analytics and cryptocurrency intelligence data to track cryptocurrency payments made to hackers.</li>
<li>Comprehensive Tracing of Transactions: Users can easily trace a given address’s input and output transactions via the Anomali ThreatStream user interface.</li>
</ul>
<h2>Boost Anomali With Superior Crypto-Intelligence</h2>
<p>The CipherTrace Sentry integration allows users to work with a vast array of data to enable detailed analysis, without leaving the Anomali ThreatStream platform. CipherTrace does this through a variety of techniques, including running transactions on 1,000 crypto-exchanges. CipherTrace analysts add over 1.5 million attribution datapoints each week.</p>
<div class="row">
<div class="col-md-4">
<h4>Detailed Blockchain Analytics and Cryptocurrency Intelligence</h4>
<p>Provides an end-to-end audit trail of transactions. With the information, users can distill “big data” into a view of the cryptocurrency risk landscape.</p>
</div>
<div class="col-md-4">
<h4>Actionable Intelligence for Evidentiary Proceedings & Regulatory Compliance</h4>
<p>Trace crypto transactions to ensure compliance with Anti-Money Laundering Regulations.</p>
</div>
<div class="col-md-4">
<h4>Real-Time, Accurate Risk Reporting</h4>
<p>Discover locations and IP Addresses associated with cryptocurrency transactions as they occur so users can respond immediately to threats.</p>
</div>
</div>
<h2><strong>Use Case:</strong> Detecting and Investigating Cryptocurrency Threats</h2>
<h3>Target Market:</h3>
<p>Leading Financial Institutions and Law Enforcement agencies</p>
<h3>Challenge:</h3>
<p>The need to identify crypto-activity associated with clients and insider transactions in order to:</p>
<ul>
<li>Thoroughly understand threats and suspicious activities</li>
<li>Perform investigations</li>
<li>Execute targeted due diligence activities</li>
</ul>
<h3>Solution:</h3>
<p>CipherTrace and Anomali connected and investigated crypto-addresses, IP addresses, and funds flows, along with their relationships to entities and events of interest.</p>
<p>With CipherTrace and Anomali, the security team was able to:</p>
<ul>
<li>Improve threat hunting by exposing hidden crypto-activity in corporate networks</li>
<li>Perform extended due diligence on client activities related to cryptocurrency</li>
<li>Assist clients and internal constituents with enhanced investigations into ransomware and malware incidents, dark market activities, and other crypto-related situations</li>
<li>Access and correlate crypto-intelligence data for investigations right from the Anomali dashboard</li>
</ul>
<h3>Customer Benefit:</h3>
<ul>
<li>Detailed, accurate, graphical reports that can be used as evidence in legal proceedings</li>
<li>Better business decision-making: increased time-to-insight for internal investigations</li>
<li>Single dashboard view: provides visibility into previously hidden crypto-activities</li>
<li>Collate data from multiple sources: Combines crypto-data with other information sources for deeper insights</li>
</ul>
<h2>Benefits:</h2>
<h3>Identify Threats</h3>
<p>Identify crypto-activity associated with internal and external IP addresses of interest.</p>
<h3>Follow the Money</h3>
<p>Trace crypto address transactions via the ThreatStream user interface to follow the money in ransomware, theft, and other investigations and find source and destination of funds.</p>
<p>Extend Anomali threat intelligence with seamless integration of real-time contextual crypto-ownership and movement-of-funds data tied to IP addresses and real-world events.</p>