Menu

TechValidate Research on Anomali

These pages present data that TechValidate has sourced via direct research with verified customers and users of Anomali. TechValidate stands behind the authenticity of all published data. Learn more »



166 Customers Surveyed

1,397 Data Points Collected

15 Published TechFacts

10 Published Charts



Selected Research Highlights


Anomali Customer Research

Purchasing Anomali

What were your top reasons for purchasing Anomali?

Needed a Threat Intelligence program to complement/enhance current security operations
69%
Needed a scalable solution to manage the numerous, disparate threat intelligence sources in the market into a single integrated platform
62%
Needed to seamlessly integrate Threat Intelligence processes with Security Operations
56%
Needed a platform that allows our analysts to focus on analysis vs. the mechanics of managing threat intelligence
43%
Needed access to a platform that enables collaboration amongst other organizations in and out of industry
40%
Other
9%

Anomali Customer Testimonial

Anomali allows us to provide a platform to all level of analysts to research potential indicators as well as share our indicators with the rest of the community. In addition, it gives us a platform to pull all of our known indicators and add them to our security solutions for automated detection and blocking.

Intelligence Analyst, Small Business Banking Company

Anomali Customer Research

Log Collection

If you have a SIEM, what types of logs are you collecting and using Anomali to match against?

Firewall
86%
IDS
73%
Anti-virus
64%
End-point
62%
Proxy
62%
Host logs
58%
Email
54%
Other
12%

Anomali Customer Testimonial

Anomali automation has allowed us to research and share malicious actor information with industry partners quickly and securely. In addition, intelligence we receive from trusted organizations are automatically populated into our tools for alerting.

IT Professional, Global 500 Energy & Utilities Company



More to Explore



About Anomali

Anomali detects adversaries and tells you who they are. Organizations rely on the Anomali Threat Platform to detect threats, understand the adversary, and respond effectively. Anomali arms security teams with machine learning optimized threat intelligence and identifies hidden threats targeting their environments. Anomali enables organizations to collaborate and share threat information among trusted communities and is the most widely adopted platform for ISACs worldwide. For more information, visit us at www.anomali.com and follow us on Twitter @Anomali.

Anomali Website   Anomali Incorporated Website