SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Topics
    • Artificial intelligence (AI)
    • Counter Terror
    • Cyber security
    • Robotics
    • Thermal imaging
    • Intrusion detection
    Hikvision 4G solar kit for remote security

    Hikvision 4G solar kit for remote security

    Dahua Panoramic PTZ WizMind Network Camera

    Dahua Panoramic PTZ WizMind Network Camera

    Hikvision DeepinView: The Dedicated Subseries

    Hikvision DeepinView: The Dedicated Subseries

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Topics
    • Artificial intelligence (AI)
    • Counter Terror
    • Cyber security
    • Robotics
    • Thermal imaging
    • Intrusion detection
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • HID Global expands its RFID enablement solutions portfolio with Invengo's Textile Services Business acquisition
    • ASSA ABLOY acquires Invengo Information Technology Co., Ltd.’s textile services business unit in France
    • Access IS delivers contactless transit payment solutions for Storstockholms Lokaltrafik to secure Stockholm’s public transport
    • Security Industry Association names Craig Sharman as the 2021 recipient of the SIA Chairman’s Award
    Topics
    • Artificial intelligence (AI)
    • Counter Terror
    • Cyber security
    • Robotics
    • Thermal imaging
    • Intrusion detection
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Security bytes
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2020
    • Year in Review 2019
    Featured
    • What are the security challenges of protecting SMBs?
    • Expert roundup: healthy buildings, blockchain, AI, skilled workers, and more
    • Smart Offices: How is mobile ID changing the way we access the office?
    • Water plant attack emphasizes cyber’s impact on physical security
    Topics
    • Artificial intelligence (AI)
    • Counter Terror
    • Cyber security
    • Robotics
    • Thermal imaging
    • Intrusion detection
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Topics
    • Artificial intelligence (AI)
    • Counter Terror
    • Cyber security
    • Robotics
    • Thermal imaging
    • Intrusion detection
    Dahua Technology installs HD CCTV cameras with smart analytics using AI to secure iconic Battle of Britain Bunker

    Dahua Technology installs HD CCTV cameras with smart analytics using AI to secure iconic Battle of Britain Bunker

    Oliver Law Security installs Vanderbilt ACT365 security system to protect one of Doncaster’s largest gyms, The Fitness Village

    Oliver Law Security installs Vanderbilt ACT365 security system to protect one of Doncaster’s largest gyms, The Fitness Village

    Hikvision IP CCTV systems protect visitors and stores at Somerset Mall in South Africa

    Hikvision IP CCTV systems protect visitors and stores at Somerset Mall in South Africa

    CLIQ® access control solution from ASSA ABLOY helps secure museums, shopping and indoor leisure sites

    CLIQ® access control solution from ASSA ABLOY helps secure museums, shopping and indoor leisure sites

  • Virtual events
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Management Systems
    • Integrated Systems
    • Asset Management
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Topics
    • Artificial intelligence (AI)
    • Counter Terror
    • Cyber security
    • Robotics
    • Thermal imaging
    • Intrusion detection
    Shifting trends in operation centers and control rooms for 2021

    Shifting trends in operation centers and control rooms for 2021

    5 steps to building resilience in your 2021 physical security plan

    5 steps to building resilience in your 2021 physical security plan

    Critical event management: The digital transformation of safety and security

    Critical event management: The digital transformation of safety and security

    Capture new opportunities with computer vision and video analytics

    Capture new opportunities with computer vision and video analytics

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID Global
    • Nedap Security Management
    • ASSA ABLOY
    • Security & Safety Things
    • Hanwha Techwin America
    Other Resources
    • eMagazines
    • Videos
    Topics
    • Artificial intelligence (AI)
    • Counter Terror
    • Cyber security
    • Robotics
    • Thermal imaging
    • Intrusion detection
    How to ramp up perimeter security with license plate reader technology

    How to ramp up perimeter security with license plate reader technology

    Solve access control challenges in the healthcare sector

    Solve access control challenges in the healthcare sector

    The role of access control in a safe return to the workplace

    The role of access control in a safe return to the workplace

    10 step guide to staying ahead of emerging security threats

    10 step guide to staying ahead of emerging security threats

About us Advertise
  • Artificial intelligence (AI)
  • Counter Terror
  • Cyber security
  • Robotics
  • Thermal imaging
  • Intrusion detection
  • Body worn video cameras
  • ISC West
  • Video management software
  • Video analytics
  • COVID-19
  • View all
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos
Cyber security

Anomali and Microsoft partner on software integration to automate enterprise threat detection and response operations

19 Feb 2021

Anomali and Microsoft partner on software integration to automate enterprise threat detection and response operations
Download PDF version
Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook
Related Links
  • Which new buzzwords reflect the security industry’s trends?
  • What will be the biggest security trends in 2021?

Anomali, the globally renowned company in intelligence-driven cyber security solutions, has announced that Anomali Match is now integrated with Microsoft Azure Sentinel.

By bridging the gap between these two major security solutions, Anomali and Microsoft have created an automated solution that significantly enhances and speeds joint customers’ threat detection, alerting and response capabilities.

Azure Sentinel and Anomali Match integration

Azure Sentinel is a cloud-native security information and event manager (SIEM) platform that uses built-in AI (Artificial Intelligence) to help analyse large volumes of data across an enterprise fast. Azure Sentinel aggregates data from all sources, including users, applications, servers, and devices running on-premises or in any cloud, giving users access over millions of records in a few seconds.

Anomali Match is a high-performance threat detection and response solution. It continuously correlates all collected security event and log data against millions of globally observed indicators of compromise (IOCs) to expose previously unknown adversaries that have already penetrated networks. Match retrospective analysis capabilities stretch back as far as five years.

Bi-directional data flow

With this integration, Microsoft and Anomali have created a bi-directional data flow

With this integration, Microsoft and Anomali have created a bi-directional data flow that allows users to easily export Azure Sentinel logs into match for correlation with Anomali global intelligence.

Combining IOC matching at a massive scale together with other innovative techniques provides the precision detection needed to investigate and prioritise matched threats for ingestion back into Azure Sentinel, where Security Operation Centre (SOC) analyst teams can then triage.

Enhancing cyber and data security

“Most enterprises have dozens of cybersecurity tools deployed and access to mass volumes of related information. Despite this, many continue to fall victim to attackers who have figured out how to slip through holes that disparate systems and siloed data leave open,” said Mark Alba, Anomali Chief Product Officer.

Mark adds, “Azure Sentinel and Anomali have bridged a gap that allows our joint customers to consolidate essential security technologies, providing them with the information and capabilities needed to identify and mitigate threats that are impacting their networks.”

Cloud adoption and threat intelligence

“To remain protected, organisations need visibility over what’s going on across their infrastructures, which are expanding rapidly due to things like cloud adoption, growing remote workforces and increasing levels of mobile connections,” said Jason Wescott, Principal PM Manager, Azure Sentinel.

Jason adds, “With match enabled, enterprises will gain access to threat intelligence that will allow them to know more about what they are up against and then take smarter steps to further reduce risk.”

Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook
Download PDF version Download PDF version
  • Network / IP
  • Electronic security systems
  • Business security systems
  • Office security systems
  • Office security
  • Physical security
  • Remote security
  • Commercial security
  • Perimeter security
  • Commercial security system
  • Security management
  • Security policy
  • Security devices
  • Security installation
  • Security access systems
  • Electronic access control
  • Intrusion detection
  • Building security
  • Facility security
  • Door access control
  • Security software
  • Security service
  • Physical Security Information Management (PSIM)
  • IP security solutions
  • Security communication
  • Integration software
  • Perimeter protection
  • Cyber security
  • Corporate Security
  • Incident Management
  • Cloud security
  • Artificial intelligence (AI)
  • Mobile access
  • Machine Learning
  • Touchless Security
  • Related links
  • Proximity Access control systems & kits
  • Standalone / Networked Access control systems & kits
  • Proximity Access control software
  • High Level Interface Access control software
  • Related categories
  • Access control systems & kits
  • Access control software
  • Intruder detectors
Related articles
Expert roundup: healthy buildings, blockchain, AI, skilled workers, and more

Expert roundup: healthy buildings, blockchain, AI, skilled workers, and more

What will be the biggest security trends in 2021?

What will be the biggest security trends in 2021?

What are the new trends and opportunities in video storage?

What are the new trends and opportunities in video storage?

Follow us

Sections CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Virtual events Events White papers Videos February 2021 news RSS
Topics Artificial intelligence (AI) Counter Terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras ISC West Video management software
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2021, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACInformed.com

Subscribe to our Newsletter


SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download SourceSecurity.com product tech spec