Anomali ThreatStream: Threat Intelligence Product Overview and Insight

The Anomali ThreatStream threat intelligence platform (TIP) integrates hundreds of threat information feeds with the analytics a security professional needs to understand how a specific threat might impact the organization. This article provides more in-depth information on the product and its features. For a comparison with other TIP products, see our list of the top […]

Written By: Drew Robb
Feb 8, 2023
eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

The Anomali ThreatStream threat intelligence platform (TIP) integrates hundreds of threat information feeds with the analytics a security professional needs to understand how a specific threat might impact the organization. This article provides more in-depth information on the product and its features.

For a comparison with other TIP products, see our list of the top threat intelligence companies.

Company Description

Anomali was created in 2013 and has since grown to 250+ employees. It is privately held with several venture capital investors. It has offices in Redwood City, Belfast, Singapore, and Dubai. Anomali’s series D funding raised $40 million in 2018, raising the total funding to more than $96.3 million since launch.

Product Description

The Anomali suite of threat intelligence solutions empower organizations to detect, investigate and respond to active cybersecurity threats. The ThreatStream threat intelligence platform (TIP) aggregates and optimizes millions of threat indicators and integrates with internal infrastructure to identify new attacks, discover existing breaches, and enables security teams to quickly understand and contain threats before affecting the whole network.

Other Anomali tools include:

  • STAXX, a free tool to collect and share threat intelligence using STIX and TAXII standards for machine-readable information formatting
  • Lens, a commercial product that uses Natural Language Processing (NLP) to scan unstructured data to identify threats

Until August 14, 2022 Anomali provided a free, out of the box intelligence feed, Anomali Limo. Anomali indicates a replacement may be in development, but has not yet provided any details. However, Anomali continues to provide secure threat sharing for ISACs and threat sharing networks.

Anomali ThreatStream features include:

  • Automated collection of threat data from hundreds of sources and in multiple formats – notably Anomali Labs, open-source OSINT feeds, and information sharing and analysis centers (ISACs)
  • Threat data is contextualized with relevant actors, campaigns, as well as tactics, techniques, and procedures (TTPs)
  • Normalization, enrichment, de-duplication of data, and removal of false positives at scale
  • Threat intelligence scoring using machine learning (ML) algorithms to rate confidence in the score that reflects the severity of the threat
  • Global intelligence feed ROI optimizer to assess sources
  • Turnkey threat feed integration for security tools such as SIEMs, SOARs, firewalls, IPS, endpoints, etc.
  • Security tool integration for inbound data ingestion and outbound response orchestration
  • Flexible integrations using RESTful API and SDKs
  • Workflows and functionalities to analyze and share data
  • Brand monitoring (automatic search for typosquatted domains & compromised credentials)
  • Sandboxing (research malicious indicators directly within the ThreatStream platform)
  • Extracting data from suspected phishing emails for immediate blocking
  • MITRE ATT&CK mapping of global threats
  • Visual link analysis to connect indicators to associated higher-level threat models
  • Integrated sandbox to investigate suspicious files
  • Share threat visibility and identification with more than 2,000 other organizations in ThreatStream Trusted Circles
  • Threat bulletins and other finished intelligence products for publishing reports to stakeholders
  • Flexible deployment options: cloud-native, virtual machine, on-premises private instance, or even ThreatStream AirGap – a completely stand-alone instance

Additional optional features can include commercial threat feeds and other applications available from the Anomali App Store (some include trial periods).

Anomali describes ThreatStream as “a central platform for collecting, managing, and sharing threat intelligence. Integration with common security solutions ensures that organizations can identify and respond to the threats relevant to their environment.”

anomali threatstream dashboard

 

Agents

Anomali ThreatStream does not use agents.

Markets and Use Cases

Anomali says it provides value for any organization across any industry vertical that is looking to leverage threat intelligence. Anomali’s ThreatStream Platform is used by many the Fortune 100 companies and and banks.

Applicable Metrics

ThreatStream consumes both structured and unstructured data from hundreds of threat intelligence feeds, processing millions of Indicators of Compromise (IOCs).

Intelligence

Anomali’s ThreatStream platform utilizes MACULA, a machine learning algorithm, to score and weight indicators and remove false positives. The ThreatStream platform automates traditionally manual data curation tasks. It also integrates with other security products, including SIEMs, firewalls, endpoint products and more.

ThreatStream Trusted Circles enable an organization to share threat visibility and identification with more than 2,000 other participants. Organizations can also acquire premium threat feeds in the Anomali App Marketplace.

Delivery

ThreatStream is available as a SaaS, for virtual machines, on-premises, or even as an air-gapped solution. On-premises and air-gapped solutions allow customers to acquire threat information without sharing data or permitting internal threat information from leaving their network.

Pricing

Pricing for the ThreatStream Platform varies based on the customer environment. Anomali does not publish pricing on their own website, but the AWS marketplace shows a 12 month subscription to Threatstream Enterprise for 3,500 employees is $150,000.

This article was originally written by Drew Robb on July 18, 2017, and updated by Chad Kime on February 8, 2023.

thumbnail Drew Robb

Originally from Scotland, Drew Robb has been a writer for more than 25 years. He lives in Florida and specializes in IT, engineering, and business. As well as eWeek and TechRepublic, he writes for a wide range of magazines including Gas Turbine World, SDxCentral, and HR Magazine. He is the author of Server Disk Management in a Windows Environment (Auerbach Publications).

Recommended for you...

Free Antivirus Software Face-Off: Which One Protects Best?

Find the best free antivirus software of 2025. Compare Bitdefender, Avira, Kaspersky & more for features, speed, and real-time defense.

Matt Gonzales
Aug 13, 2025
The 6 Best Password Managers for Small Businesses (Tested and Trusted)

Discover the best password manager for small businesses in 2025. See top-rated picks with MFA, admin tools, and passkey support.

Matt Gonzales
Jul 29, 2025
Protect Your Privacy: Best Secure Messaging Apps in 2025

Looking for the safest way to chat in 2025? Explore the best secure messaging apps with end-to-end encryption and zero data tracking.

Liz Ticong
Jun 25, 2025
Microsoft Defender vs Bitdefender: Compare Antivirus Software

Compare Microsoft Defender and Bitdefender antivirus software. We rate malware detection, pricing plans, privacy features, and more.

Jenna Phipps
May 27, 2025
eSecurity Planet Logo

eSecurity Planet is a leading resource for IT professionals at large enterprises who are actively researching cybersecurity vendors and latest trends. eSecurity Planet focuses on providing instruction for how to approach common security challenges, as well as informational deep-dives about advanced cybersecurity topics.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.