CIO Influence
CIO Influence News Security

The Anomali Platform Advances Intelligence-Driven Detection and Response Capabilities and Prevents Business Disruptions While Optimizing Security Expense

The Anomali Platform Advances Intelligence-Driven Detection and Response Capabilities and Prevents Business Disruptions While Optimizing Security Expense
New Capabilities Continue Anomali’s Focus to Enable Enterprise Organizations to Stay a Step Ahead of Adversaries.

Anomali, the leader in intelligence-driven cybersecurity solutions, announced the general availability today of its quarterly platform update to meet the expanding needs of its customers and partners. This release introduces new capabilities to enhance Anomali’s threat intelligence and extended detection and response (XDR) use cases that enable enterprise organizations to stay one step ahead of adversaries and prevent business disruptions while optimizing security expenses.

“Anomali’s August release offers new capabilities and enhancements for security operations teams struggling to identify not only who’s targeting them, but how and why they are being targeted,” said Mark Alba, Chief Product Officer at Anomali.

Latest ITechnology News: AdvoLogix Powers Integration Between iManage and Salesforce Sales Cloud

Key highlights of this release include:

Creating Extended Visibility with Anomali Attack Pattern Detection and MITRE ATT&CK®: In 2021, Anomali joined MITRE Engenuity’s Center for Threat-Informed Defense to collaborate on the Attack Flow Project to better understand adversary behavior and improve defensive capabilities. This partnership culminated with the public release of the project in March 2022.

Since then, Anomali has been working to incorporate attack flows into The Anomali Platform. This release moves the platform toward an Attack Flow Library for Anomali ThreatStream that will provide an access point for new Attack Flows that sequence cyberattack techniques. This capability will provide a new context around adversary behavior and help security teams expertly profile the adversary. It will also enable them better to protect the organization in advance of an attack, detect an attack in real-time, and respond post-attack.

Latest ITechnology News: Amdocs’ Vubiquity Expands Content Services Agreement with Oi

Furthermore, this predictive visual mapping will be leveraged by CISOs and security professionals to align attacks with potential holes in their security posture to get in front of the threat.

“ESG research found that 97% of security professionals believe that MITRE ATT&CK is important to their organization’s security operations strategy,” said Jon Oltsik, Senior Principal Analyst and Fellow, ESG Research. “Anomali’s commitment to integrating the MITRE ATT&CK Framework into its solutions and participating in the MITRE Engenuity Center for Threat Informed Defense can help security teams adopt the framework and better understand cyber-adversaries.”

Routine Workflow Automation: Given macro-economic conditions, customers are looking for capabilities that make their existing investments more impactful. We’ve introduced a new extensible framework to support the automation of routine tasks throughout the platform. This release’s first implementation is available to automate enrichments in the investigations workbench. A drag-and-drop process for configuring a multi-stage enrichment task can easily be set and run when conditions require it, saving analysts time performing repetitive tasks.

Additional enhancements with this platform release include:

  • Support for MITRE ATT&CK Mobile & ICS: Intelligence aggregation, contextualization, and analysis for Mobile and ICS attack surfaces to strengthen overall security posture.
  • MITRE ATT&CK Enterprise v11 in Anomali Lens
  • Scheduled Retrospective Search: Helps the SOC automate the correlation of historical events with newly available intelligence to produce reports and gain insight into threat actors, TTPs, or other adversary behavior. This new capability enables CISOs to detect real-time threats in their local IT environment.

[To share your insights with us, please write to sghosh@martechseries.com]

Related posts

Tech Industry Veteran Lisa Erickson Joins Aderant to Catalyze Innovative AI and Cloud Development

Business Wire

SecureAuth Launches Arculix for Next-Generation Passwordless Authentication and Identity Orchestration

Radiant Logic Selected to Participate in NIST’s NCCoE Zero Trust Architecture

CIO Influence News Desk