Connect with the Anomali CISO community
Get Curated Access to Hundreds of Threat Intelligence Feeds
Choose From 200+ Specialized Intelligence Feeds to Improve Your Security Posture
With the Anomali Marketplace, you can easily evaluate and purchase threat intelligence streams and investigation enrichment offerings offered by Anomali partners directly in the ThreatStream admin console, as well as customize your included subscriptions to more than 100 open-source threat feeds.
Interested in featuring your intelligence on the Anomali Marketplace? Let’s discuss how you can become an Anomali Technology Partner.
Types of Intelligence Feeds
Anomali’s pre-integrated partner ecosystem includes the leading global research vendors offering indicators and insights spanning threat categories you need to secure your business, letting you easily implement your intelligence coverage strategy across a breadth of threat categories in the APP Store, including:
Threat Intelligence Partners
BforeAI is a leader in predictive security solutions helping organizations prevent intrusions and data exfiltration by predicting vectors of future attacks. The information is used in PreCrime™ - predictive cyber threat intelligence that enhances existing security solutions (firewalls, DNS resolvers, anti-phish filters, proxies, etc.) with foresight. BforeAI's patented AI technology combined with hyperscale observation infrastructure and modern APIs augment customers' security postures with predictions.
Cisco® Secure Malware Analytics (formerly Threat Grid) combines two of the leading malware protection solutions: unified malware analysis and context-rich intelligence. It empowers security professionals to proactively defend against and quickly recover from cyber attacks. Secure Malware Analytics crowd-sources malware from a closed community and analyzes all samples using proprietary, highly secure techniques that include static and dynamic (sandboxing) analysis. It correlates the results with hundreds of millions of other analyzed malware artifacts to provide a global view of malware attacks, campaigns, and their distribution. Security teams can quickly correlate a single sample of observed activity and characteristics against millions of other samples to fully understand its behaviors in a historical and global context.
The Feedly integration with Anomali ThreatStream provides a simple way to ingest articles and threat intelligence reports discovered in Feedly. The integration ingests full article content and insights discovered by Feedly AI, such as IoCs and the relationships between threat actors, malware, TTPs, and CVEs.
Flashpoint is the pioneering leader in threat data and intelligence. We empower commercial enterprises and government agencies to decisively confront complex security challenges, reduce risk, and improve operational resilience amid fast-evolving threats. Through the Flashpoint Ignite platform, we deliver unparalleled depth, breadth, and speed of data from highly relevant sources, enriched by human insights. Our solutions span cyber threat intelligence, vulnerability intelligence, geopolitical risk, physical security, fraud, and brand protection. The result: our customers safeguard critical assets, avoid financial loss, and protect lives.
Most threat intelligence solutions suffer because the data is too hard to standardize and verify. Meta created the ThreatExchange platform so that participating organizations can share threat data using a convenient, structured, and easy-to-use API that provides privacy controls to enable sharing with only desired groups.
SEKOIA.IO CTI is a mix of exclusive SEKOIA.IO threat intelligence data coming from C2 trackers, VT trackers, honeypots and refined OSINT data. The threat intelligence provided by SEKOIA.IO is easily actionable within Anomali ThreatStream as it's highly structured in STIX 2.1, fully contextualized and built for detection purposes. SEKOIA.IO CTI subscription includes an API and a web portal access.
Improve your detection and response capabilities
Organizations rely on Anomali to harness and correlate the power of threat intelligence with AI-driven security analytics.