Anomali, Microsoft partnership automates threat detection and response

In News

Anomali announced that Anomali Match is now integrated with Microsoft Azure Sentinel. By bridging the gap between these two leading security solutions, Anomali and Microsoft have created an automated solution that significantly enhances and speeds joint customers’ threat detection, alerting, and response capabilities.

Azure Sentinel is a cloud-native security information and event manager (SIEM) platform that uses built-in AI to help analyze large volumes of data across an enterprise—fast. Azure Sentinel aggregates data from all sources, including users, applications, servers, and devices running on-premises or in any cloud, letting you reason over millions of records in a few seconds.

Anomali Match is a high-performance threat detection and response solution. It continuously correlates all collected security event and log data against millions of globally observed indicators of compromise (IOCs) to expose previously unknown adversaries that have already penetrated networks. Match retrospective analysis capabilities stretch back as far as five years.

With this integration, Microsoft and Anomali have created a bi-directional data flow that allows users to easily export Azure Sentinel logs into Match for correlation with Anomali global intelligence. Combining IOC matching at massive scale together with other innovative techniques provides the precision detection needed to investigate and prioritize matched threats for ingestion back into Azure Sentinel, where Security Operation Center (SOC) analyst teams can then triage.

“Most enterprises have dozens of cybersecurity tools deployed and access to mass volumes of related information. Despite this, many continue to fall victim to attackers who have figured out how to slip through holes that disparate systems and siloed data leave open,” said Mark Alba, Anomali Chief Product Officer. “Azure Sentinel and Anomali have bridged a gap that allows our joint customers to consolidate essential security technologies, providing them with the information and capabilities needed to identify and mitigate threats that are impacting their networks.”

“To remain protected, organizations need visibility over what’s going on across their infrastructures, which are expanding rapidly due to things like cloud adoption, growing remote workforces, and increasing levels of mobile connections,” said Jason Wescott, Principal PM Manager, Azure Sentinel. “With Match enabled, enterprises will gain access to threat intelligence that will allow them to know more about what they are up against and then take smarter steps to further reduce risk.”

Comments

You may also read!

Higher the factors, stronger the security

During the time of increased cyber threats, the importance of proper authentication methods is not to be overlooked. In

Read More...

Zecurion releases the new version of Zecurion DLP

Zecurion, a vendor of the Next Generation Data Loss Prevention (DLP), released the new version of its foremost solution,

Read More...

COVID-19 themed threats and Powershell malware continues to surge: McAfee

McAfee released its McAfee Threats Report: April 2021 examining cybercriminal activity related to malware and the evolution of cyber

Read More...

Join Our Newsletter!

Love SecurityMEA? We love to tell you about our new stuff. Subscribe to newsletter!

Mobile Sliding Menu