Lens Architecture

A diagram of a computer system with the words "The Anomali Platform" at the bottom.

How Customers Use Lens

Scale security operations with the power of AI. Improve analyst experience and efficiency.

Answer, “Am I affected?”

Use NLP to scan blogs and bulletins in seconds and hunt for indicators from seven years of data within minutes.

MITRE ATT&CK mapping

Automate MITRE mapping and visualization of threat data to improve efficacy.

Executive and analyst summaries

Transform dense, complex raw intelligence into bulletins that inform executives and/or practitioners in seconds.

Automate tagging and enrichment

Tag threat data with actors, malware, vulnerabilities, etc. to enrich research and investigations.

Continuous protection

Automate extraction and dissemination of threat info across your security controls for proactive defense.
WHY Lens?

Key Capabilities

Auto investigate

Automatically create or add to investigations for faster MTTx

Threat bulletins

Generate threat bulletins to inform peers and executives about key events

Threat hunting

Hunt for attacker footprints in your environment with one click

Convert unstructured data to actionable intel

Derive intel from unstructured data sources: web pages, blogs, docs, pdf, bulletins, etc.

Natural language processing (NLP)

Go from blogs and docs to machine-readable to analyst summarized intel in seconds with NLP

Intel enrichment

Automatically tag intelligence with actors, regions, industries, vulnerabilities, and more

Browser extensions

Transform web research into security intelligence with one click directly from your browser

Sandbox

Detonate URLs in a secure sandbox to extract real-time indicators

What People Are Saying About Anomali

“Before Anomali, we had tons of information without context. We had to look through thousands of alerts quickly just to see what stood out and then react to those. Anomali enabled us to spend less time dealing with noise, and more time focusing on critical issues.”
Devin Ertel headshot

Devin Ertel

CISO, Blackhawk Network Holdings

“We leverage market-leading tools to give our company a competitive advantage and our 24/7 SOC a leg up on bad actors. With Anomali, we improve on both of these goals. By adding intelligence, we achieve a high level of certainty that enhances prioritization of the most serious threats our customers face, while improving our mitigation decisions.”
Grant Leonard headshot

Grant Leonard

Co-Founder, Castra

“The time it takes to analyze a threat has gone down from 30 minutes to just a few minutes, time that adds up over the course of investigating many malicious IPs every week. There has been a substantial decrease in terms of meantime-to-know.”
A man in a purple shirt smiling

Arindam Bose

Senior Vice President & Security Officer, Bank of Hope

“As one of the prominent banks in the United Arab Emirates, we manage assets and transactions for thousands of customers. One of our main commitments to our customers is security and we achieve this through solid partnerships with industry experts such as Anomali. By bringing in industry experts, we expect to gain advanced levels of security that will help us to further heighten our defenses and intercept any possible exploitation by cybercriminals.”
Ramakrishnan KS headshot

K.S. Ramakrishnan

Chief Risk Officer, RAKBANK

Be Different.
Be the Anomali.

Challenge the status quo with a different type of security operations platform.