Sqrrl and Anomali Forge Partnership to Power Threat Hunting
FREMONT, CA: Sqrrl, a security analytics company and Anomali, a provider of threat intelligence has recently signed an agreement to work together in helping organizations counter advanced cyber threats. Sqrrl’s unique platform unifies multiple Big Data approaches into a single platform, which can be employed in use cases such as data breach, resulting from cyber-espionage, insider misuse and other types of complex attacks. On the other hand, Anomali delivers innovative and effective technologies and solutions to achieve a secure world.
Mark Terenzoni, CEO, Sqrrl comments, “Siloes across security tools must be broken down, and the Sqrrl/Anomali partnership enables our customers to easily unite threat intelligence with their own data stored in the Sqrrl threat hunting platform.”
With techniques derived from ‘Knowledge Extraction’ and ‘Linked Data Analysis’ data models, Sqrrl ensures maximum security. Through its enterprise approach, the company provides data-centric security to clients, offering disparate data sources with various security and compliance requirements to be consolidated into a shared platform for processing, analytics, and application development.
The features of the Sqrrl and Anomali joint solution include the matching of threat intelligence data to internal network and endpoint datasets. It also has provision for contextual investigation of threat intelligence matches using Sqrrl's linked data and behavior graph approaches along with machine learning analytics. The integrated solution would be available to customers for demonstrations, proofs of concept, and production deployments.
Mark Seward, VP of Security Solutions at Anomali states, “Sqrrl's security platform and Anomali's Threatstream 6 threat intelligence platform create a solution that scales to meet the challenge posed by the exponential growth in indicators of compromise (IOCs) while supporting an intelligence driven SOC.”
By Debra Jensen, CIO, Charlotte Russe
By Phil Jordan, CIO, Telefonica
By Alberto Ruocco, CIO, American Electric Power
By Sven Gerjets, SVP-IT, DIRECTV
By Adrian Mebane, VP-Global Ethics & Compliance, The Hershey...
By Mike Fitton, Wireless Business Unit Director, Altera
By Jim Kaskade, VP and GM, Big Data & Analytics, CSC
By Graham Welch, Director-Cisco Security, Cisco
By Michael Watkins, Senior Product Director, Global Knowledge
By Nelson C. Vincent, EdD, VP for IT and CIO, University of...
By Sharon Gietl, VP-IT & CIO, The Doe Run Company
By Arnold Leap, CIO, 1-800-Flowers.com
By Gary Barlet, CIO, USPS OIG
By Mike Dieter, CTO, Transplace
By Bill Schimikowski, VP, Customer Experience, Fidelity...
By Kevin Kometer, CIO, CME Group
By John Landwehr, Public Sector CTO, Adobe
By Marc Probst, CIO & VP, Intermountain Healthcare
By Charles Koontz, President & CEO, GE Healthcare IT & Chief...
By Jeff Bauserman, VP-Information Systems & Technology,...