{"id":7460,"date":"2023-02-08T18:00:00","date_gmt":"2023-02-08T18:00:00","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/2017\/07\/18\/anomali-threatstream-threat-intelligence-product-overview-and-insight\/"},"modified":"2023-03-21T14:48:54","modified_gmt":"2023-03-21T14:48:54","slug":"anomali-threatstream","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/products\/anomali-threatstream\/","title":{"rendered":"Anomali ThreatStream: Threat Intelligence Product Overview and Insight"},"content":{"rendered":"<p>The Anomali ThreatStream threat intelligence platform (TIP) integrates hundreds of threat information feeds with the analytics a security professional needs to understand how a specific threat might impact the organization. This article provides more in-depth information on the product and its features.<\/p>\n<p><em>For a comparison with other TIP products, see our list of the <\/em><a href=\"https:\/\/www.esecurityplanet.com\/products\/threat-intelligence-platforms\/\" target=\"_blank\" rel=\"noopener\"><em>top threat intelligence companies<\/em><\/a>.<\/p>\n<h2><strong>Company Description<\/strong><\/h2>\n<p>Anomali was created in 2013 and has since grown to 250+ employees. It is privately held with several venture capital investors. It has offices in Redwood City, Belfast, Singapore, and Dubai. Anomali\u2019s series D funding raised $40 million in 2018, raising the total funding to more than $96.3 million since launch.<\/p>\n<h2><strong>Product Description<\/strong><\/h2>\n<p>The Anomali suite of threat intelligence solutions empower organizations to detect, investigate and respond to active cybersecurity threats. The <a href=\"https:\/\/www.anomali.com\/products\/threatstream\" target=\"_blank\" rel=\"noopener\">ThreatStream threat intelligence platform<\/a> (TIP) aggregates and optimizes millions of threat indicators and integrates with internal infrastructure to identify new attacks, discover existing breaches, and enables security teams to quickly understand and contain threats before affecting the whole <a href=\"https:\/\/www.esecurityplanet.com\/networks\/network-security\/\">network<\/a>.<\/p>\n<p>Other Anomali tools include:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.anomali.com\/resources\/staxx\" target=\"_blank\" rel=\"noopener\">STAXX<\/a>, a free tool to collect and share threat intelligence using STIX and TAXII standards for machine-readable information formatting<\/li>\n<li><a href=\"https:\/\/www.anomali.com\/products\/lens\" target=\"_blank\" rel=\"noopener\">Lens<\/a>, a commercial product that uses Natural Language Processing (NLP) to scan unstructured data to identify threats<\/li>\n<\/ul>\n<p>Until August 14, 2022 Anomali provided a free, out of the box intelligence feed, Anomali <a href=\"https:\/\/www.anomali.com\/resources\/limo\" target=\"_blank\" rel=\"noopener\">Limo<\/a>. Anomali indicates a replacement may be in development, but has not yet provided any details. However, Anomali continues to <a href=\"https:\/\/www.anomali.com\/threat-intel-sharing\" target=\"_blank\" rel=\"noopener\">provide secure threat sharing for ISACs<\/a> and threat sharing networks.<\/p>\n<p>Anomali ThreatStream features include:<\/p>\n<ul>\n<li>Automated collection of threat data from hundreds of sources and in multiple formats &#8211; notably Anomali Labs, open-source OSINT feeds, and information sharing and analysis centers (ISACs)<\/li>\n<li>Threat data is contextualized with relevant actors, campaigns, as well as tactics, techniques, and procedures (TTPs)<\/li>\n<li>Normalization, enrichment, de-duplication of data, and removal of false positives at scale<\/li>\n<li>Threat intelligence scoring using machine learning (ML) algorithms to rate confidence in the score that reflects the severity of the threat<\/li>\n<li>Global intelligence feed ROI optimizer to assess sources<\/li>\n<li>Turnkey threat feed integration for security tools such as SIEMs, SOARs, firewalls, IPS, endpoints, etc.<\/li>\n<li>Security tool integration for inbound data ingestion and outbound response orchestration<\/li>\n<li>Flexible integrations using RESTful API and SDKs<\/li>\n<li>Workflows and functionalities to analyze and share data<\/li>\n<li>Brand monitoring (automatic search for typosquatted domains &amp; compromised credentials)<\/li>\n<li>Sandboxing (research malicious indicators directly within the ThreatStream platform)<\/li>\n<li>Extracting data from suspected phishing emails for immediate blocking<\/li>\n<li>MITRE ATT&amp;CK mapping of global threats<\/li>\n<li>Visual link analysis to connect indicators to associated higher-level threat models<\/li>\n<li>Integrated sandbox to investigate suspicious files<\/li>\n<li>Share threat visibility and identification with more than 2,000 other organizations in ThreatStream Trusted Circles<\/li>\n<li>Threat bulletins and other finished intelligence products for publishing reports to stakeholders<\/li>\n<li>Flexible deployment options: cloud-native, virtual machine, on-premises private instance, or even ThreatStream AirGap &#8211; a completely stand-alone instance<\/li>\n<\/ul>\n<p>Additional optional features can include commercial threat feeds and other applications available from the Anomali App Store (some include trial periods).<\/p>\n<p>Anomali describes ThreatStream as &#8220;a central platform for collecting, managing, and sharing threat intelligence. Integration with common security solutions ensures that organizations can identify and respond to the threats relevant to their environment.\u201d<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-26501 size-large\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2017\/07\/anomali-threatstream-1-1024x634.png\" alt=\"anomali threatstream dashboard\" width=\"696\" height=\"431\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2017\/07\/anomali-threatstream-1-1024x634.png 1024w, https:\/\/assets.esecurityplanet.com\/uploads\/2017\/07\/anomali-threatstream-1-300x186.png 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2017\/07\/anomali-threatstream-1-768x476.png 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2017\/07\/anomali-threatstream-1-150x93.png 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2017\/07\/anomali-threatstream-1-696x431.png 696w, https:\/\/assets.esecurityplanet.com\/uploads\/2017\/07\/anomali-threatstream-1-1068x661.png 1068w, https:\/\/assets.esecurityplanet.com\/uploads\/2017\/07\/anomali-threatstream-1.png 1515w\" sizes=\"(max-width: 696px) 100vw, 696px\" \/><\/p>\n<p>&nbsp;<\/p>\n<h2><strong>Agents<\/strong><\/h2>\n<p>Anomali ThreatStream does not use agents.<\/p>\n<h2><strong>Markets and Use Cases<\/strong><\/h2>\n<p>Anomali says it provides value for any organization across any industry vertical that is looking to leverage threat intelligence. Anomali\u2019s ThreatStream Platform is used by many the Fortune 100 companies and and banks.<\/p>\n<h2><strong>Applicable Metrics<\/strong><\/h2>\n<p>ThreatStream consumes both structured and unstructured data from hundreds of threat intelligence feeds, processing millions of Indicators of Compromise (IOCs).<\/p>\n<h2><strong>Intelligence<\/strong><\/h2>\n<p>Anomali\u2019s ThreatStream platform utilizes MACULA, a machine learning algorithm, to score and weight indicators and remove false positives. The ThreatStream platform automates traditionally manual data curation tasks. It also integrates with other security products, including SIEMs, firewalls, endpoint products and more.<\/p>\n<p>ThreatStream Trusted Circles enable an organization to share threat visibility and identification with more than 2,000 other participants. Organizations can also acquire premium threat feeds in the Anomali App Marketplace.<\/p>\n<h2><strong>Delivery<\/strong><\/h2>\n<p>ThreatStream is available as a SaaS, for virtual machines, on-premises, or even as an air-gapped solution. On-premises and air-gapped solutions allow customers to acquire threat information without sharing data or permitting internal threat information from leaving their network.<\/p>\n<h2><strong>Pricing<\/strong><\/h2>\n<p>Pricing for the ThreatStream Platform varies based on the customer environment. Anomali does not publish pricing on their own website, but the <a href=\"https:\/\/aws.amazon.com\/marketplace\/pp\/prodview-unjq3gvyoflti\" target=\"_blank\" rel=\"noopener\">AWS marketplace<\/a> shows a 12 month subscription to Threatstream Enterprise for 3,500 employees is $150,000.<\/p>\n<p><em>This article was originally written by <\/em><em>Drew Robb<\/em><em> on July 18, 2017, and updated by <\/em><a href=\"https:\/\/www.esecurityplanet.com\/author\/chad-kime\/\" target=\"_blank\" rel=\"noopener\"><em>Chad Kime<\/em><\/a><em> on February 8, 2023.<\/em><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6d4063bfd3-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6d4063bfd3\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6d4063bfd3\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6d4063bfd3\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6d4063bfd3\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6d4063bfd3\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6d4063bfd3\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>The Anomali ThreatStream threat intelligence platform (TIP) integrates hundreds of threat information feeds with the analytics a security professional needs to understand how a specific threat might impact the organization. This article provides more in-depth information on the product and its features. For a comparison with other TIP products, see our list of the top [&hellip;]<\/p>\n","protected":false},"author":213,"featured_media":26501,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[17],"tags":[7575],"b2b_audience":[34],"b2b_industry":[],"b2b_product":[377,375],"class_list":["post-7460","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-products","tag-threat-intelligence","b2b_audience-evaluation-and-selection","b2b_product-gateway-and-network-security","b2b_product-security-management"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Anomali ThreatStream: Threat Intelligence Product Analysis<\/title>\n<meta name=\"description\" content=\"We review Anomali ThreatStream, which identifies attacks and helps security teams contain threats. Learn about features, use cases, and pricing.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/products\/anomali-threatstream\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Anomali ThreatStream: Threat Intelligence Product Analysis\" \/>\n<meta property=\"og:description\" content=\"We review Anomali ThreatStream, which identifies attacks and helps security teams contain threats. Learn about features, use cases, and pricing.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/products\/anomali-threatstream\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-08T18:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-21T14:48:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2017\/07\/anomali-threatstream-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1515\" \/>\n\t<meta property=\"og:image:height\" content=\"938\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Drew Robb\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Drew Robb\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/anomali-threatstream\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/anomali-threatstream\/\"},\"author\":{\"name\":\"Drew Robb\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/df930f1317eb05f959f8016777c920c2\"},\"headline\":\"Anomali ThreatStream: Threat Intelligence Product Overview and Insight\",\"datePublished\":\"2023-02-08T18:00:00+00:00\",\"dateModified\":\"2023-03-21T14:48:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/anomali-threatstream\/\"},\"wordCount\":768,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/anomali-threatstream\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2017\/07\/anomali-threatstream-1.png\",\"keywords\":[\"Threat Intelligence\"],\"articleSection\":[\"Products\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.esecurityplanet.com\/products\/anomali-threatstream\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/anomali-threatstream\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/products\/anomali-threatstream\/\",\"name\":\"Anomali ThreatStream: Threat Intelligence Product Analysis\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/anomali-threatstream\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/anomali-threatstream\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2017\/07\/anomali-threatstream-1.png\",\"datePublished\":\"2023-02-08T18:00:00+00:00\",\"dateModified\":\"2023-03-21T14:48:54+00:00\",\"description\":\"We review Anomali ThreatStream, which identifies attacks and helps security teams contain threats. Learn about features, use cases, and pricing.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/anomali-threatstream\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/products\/anomali-threatstream\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/anomali-threatstream\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2017\/07\/anomali-threatstream-1.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2017\/07\/anomali-threatstream-1.png\",\"width\":1515,\"height\":938},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/anomali-threatstream\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Anomali ThreatStream: Threat Intelligence Product Overview and Insight\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/df930f1317eb05f959f8016777c920c2\",\"name\":\"Drew Robb\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/0.jpg.256x256_q100_crop-smart-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/0.jpg.256x256_q100_crop-smart-150x150.jpg\",\"caption\":\"Drew Robb\"},\"description\":\"Drew Robb has contributed to eSecurity Planet and other TechnologyAdvice websites for more than twenty years. He's covered every aspect of enterprise IT in his career, from the latest trends to in-depth product analysis. He is also the editor-in-chief of an international engineering magazine.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/drew-robb-esp\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Anomali ThreatStream: Threat Intelligence Product Analysis","description":"We review Anomali ThreatStream, which identifies attacks and helps security teams contain threats. Learn about features, use cases, and pricing.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/products\/anomali-threatstream\/","og_locale":"en_US","og_type":"article","og_title":"Anomali ThreatStream: Threat Intelligence Product Analysis","og_description":"We review Anomali ThreatStream, which identifies attacks and helps security teams contain threats. Learn about features, use cases, and pricing.","og_url":"https:\/\/www.esecurityplanet.com\/products\/anomali-threatstream\/","og_site_name":"eSecurity Planet","article_published_time":"2023-02-08T18:00:00+00:00","article_modified_time":"2023-03-21T14:48:54+00:00","og_image":[{"width":1515,"height":938,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2017\/07\/anomali-threatstream-1.png","type":"image\/png"}],"author":"Drew Robb","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Drew Robb","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/products\/anomali-threatstream\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/products\/anomali-threatstream\/"},"author":{"name":"Drew Robb","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/df930f1317eb05f959f8016777c920c2"},"headline":"Anomali ThreatStream: Threat Intelligence Product Overview and Insight","datePublished":"2023-02-08T18:00:00+00:00","dateModified":"2023-03-21T14:48:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/products\/anomali-threatstream\/"},"wordCount":768,"commentCount":0,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/products\/anomali-threatstream\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2017\/07\/anomali-threatstream-1.png","keywords":["Threat Intelligence"],"articleSection":["Products"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.esecurityplanet.com\/products\/anomali-threatstream\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/products\/anomali-threatstream\/","url":"https:\/\/www.esecurityplanet.com\/products\/anomali-threatstream\/","name":"Anomali ThreatStream: Threat Intelligence Product Analysis","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/products\/anomali-threatstream\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/products\/anomali-threatstream\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2017\/07\/anomali-threatstream-1.png","datePublished":"2023-02-08T18:00:00+00:00","dateModified":"2023-03-21T14:48:54+00:00","description":"We review Anomali ThreatStream, which identifies attacks and helps security teams contain threats. Learn about features, use cases, and pricing.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/products\/anomali-threatstream\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/products\/anomali-threatstream\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/products\/anomali-threatstream\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2017\/07\/anomali-threatstream-1.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2017\/07\/anomali-threatstream-1.png","width":1515,"height":938},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/products\/anomali-threatstream\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Anomali ThreatStream: Threat Intelligence Product Overview and Insight"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/df930f1317eb05f959f8016777c920c2","name":"Drew Robb","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/0.jpg.256x256_q100_crop-smart-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/0.jpg.256x256_q100_crop-smart-150x150.jpg","caption":"Drew Robb"},"description":"Drew Robb has contributed to eSecurity Planet and other TechnologyAdvice websites for more than twenty years. He's covered every aspect of enterprise IT in his career, from the latest trends to in-depth product analysis. He is also the editor-in-chief of an international engineering magazine.","url":"https:\/\/www.esecurityplanet.com\/author\/drew-robb-esp\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/7460"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/213"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=7460"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/7460\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/26501"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=7460"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=7460"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=7460"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=7460"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=7460"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=7460"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}