AI Buyer Insights:

Cantor Fitzgerald, a Kyriba Treasury customer evaluated GTreasury

Citigroup, a VestmarkONE customer evaluated BlackRock Aladdin Wealth

Swedbank, a Temenos T24 customer evaluated Oracle Flexcube

Moog, an UKG AutoTime customer evaluated Workday Time and Attendance

Michelin, an e2open customer evaluated Oracle Transportation Management

Wayfair, a Korber HighJump WMS customer just evaluated Manhattan WMS

Westpac NZ, an Infosys Finacle customer evaluated nCino Bank OS

Cantor Fitzgerald, a Kyriba Treasury customer evaluated GTreasury

Citigroup, a VestmarkONE customer evaluated BlackRock Aladdin Wealth

Swedbank, a Temenos T24 customer evaluated Oracle Flexcube

Moog, an UKG AutoTime customer evaluated Workday Time and Attendance

Michelin, an e2open customer evaluated Oracle Transportation Management

Wayfair, a Korber HighJump WMS customer just evaluated Manhattan WMS

Westpac NZ, an Infosys Finacle customer evaluated nCino Bank OS

List of Anomali ThreatStream Customers

loading spinner icon



Apply Filters For Customers

Logo Customer Industry Empl. Revenue Country Vendor Application Category When SI Insight
Entrust Datacard Professional Services 2500 $800M United States Anomali Anomali ThreatStream Threat Modeling 2015 n/a
In 2015 Entrust Datacard implemented Anomali ThreatStream as an enterprise threat intelligence management platform to scale ingestion and operationalization of cyber threat intelligence. Entrust Datacard deployed Anomali ThreatStream to serve as a Threat Intelligence and Analysis Platform supporting defensive cyber operations across its security operations center and enterprise security teams. The deployment configured Anomali ThreatStream Enterprise for core threat intelligence lifecycle capabilities, including high volume feed ingestion, normalization and enrichment, threat scoring and contextualization, centralized dashboards, and automated alerting. Configurations emphasized automation of indicator triage, tagging schemas and analyst workflow orchestration to surface highly contextualized intelligence for operational use. Operationalization focused on embedding intelligence into security operations and incident response processes, establishing analyst queues and playbook driven workflows to accelerate movement of indicators into investigation and defense tasks. The platform was operationalized to provide actionable and highly contextualized intelligence in support of defensive cyber operations, enabling Entrust Datacard to scale CTI handling as volumes grew.
ExxonMobil Oil, Gas and Chemicals 57900 $323.9B United States Anomali Anomali ThreatStream Threat Modeling 2021 n/a
In 2021 ExxonMobil integrated Anomali ThreatStream as a core element of its Threat Modeling capability to operationalize cyber threat intelligence across SOC and incident response workflows. The deployment focused on ingesting multiple CTI feeds into Anomali ThreatStream and Splunk SIEM to improve detection capabilities and supply actionable threat context to analysts. Anomali ThreatStream served as the primary Threat Intelligence Platform, collecting, normalizing, and scoring indicators of compromise, and aligning outputs with Priority Intelligence Requirements to guide threat hunting. Analysts configured threat actor and TTP mappings consistent with the MITRE ATT&CK framework, and developed detection rules and automated playbooks in Splunk Phantom SOAR, using Python and PowerShell to integrate ThreatStream data into alerting and response pipelines. The implementation integrated Anomali ThreatStream with SentinelOne for endpoint telemetry, Recorded Future and Maltego for enrichment and OSINT investigations, iBoss Proxy for web monitoring, Nexpose and InsightVM for vulnerability context, Palo Alto Prisma Cloud for cloud posture signals, and Nozomi Networks for ICS and OT visibility. Operational coverage spanned SOC operations, incident response teams, cloud environments including Azure and AWS, and critical ICS/OT asset monitoring, enabling cross-domain correlation of threat indicators. Governance and process changes included formalizing Priority Intelligence Requirements, authoring threat intelligence reports after red team and incident response activities, and creating custom Splunk dashboards to visualize ThreatStream-derived indicators. The program operationalized threat detection workflows and periodic ISO 27001 aligned assessments, and it explicitly improved detection capabilities, streamlined SOC operations, and supplied actionable intelligence for remediation and response as part of ExxonMobil security operations.
M&T Bank Banking and Financial Services 22080 $9.2B United States Anomali Anomali ThreatStream Threat Modeling 2018 n/a
In 2018, M&T Bank implemented Anomali ThreatStream as a Threat Intelligence and Analysis Platform. The deployment centralized threat research and analysis by ingesting and correlating telemetry and indicator data from multiple sources, explicitly including Anomali ThreatStream, Spamhaus, DNSLytics, Cisco Talos, VirusTotal and other commercial and open source intelligence feeds, to identify cyber threats and anomalies for the bank's security teams. Anomali ThreatStream was used to operationalize standard threat intelligence workflows, including indicator of compromise ingestion, enrichment, correlation and analyst investigation. The implementation emphasized feed orchestration, threat scoring and tagging, and structured analyst workflows for research and hunting, supporting enterprise security operations and the bank's threat intelligence function. Governance activities focused on feed curation and the intelligence lifecycle, with analysts using the platform to consolidate external threat data and surface actionable anomalies for detection and response.
Oil, Gas and Chemicals 10412 $21.6B United States Anomali Anomali ThreatStream Threat Modeling 2022 n/a
Government 1108 $301M United States Anomali Anomali ThreatStream Threat Modeling 2022 n/a
Professional Services 2400 $1.0B United States Anomali Anomali ThreatStream Threat Modeling 2017 n/a
Showing 1 to 6 of 6 entries

Buyer Intent: Companies Evaluating Anomali ThreatStream

ARTW Buyer Intent uncovers actionable customer signals, identifying software buyers actively evaluating Anomali ThreatStream. Gain ongoing access to real-time prospects and uncover hidden opportunities. Companies Actively Evaluating Anomali ThreatStream for Threat Modeling include:

  1. British Society of Interventional Radiology (BSIR), a United Kingdom based Non Profit organization with 10 Employees

Discover Software Buyers actively Evaluating Enterprise Applications

Logo Company Industry Employees Revenue Country Evaluated
No data found
FAQ - APPS RUN THE WORLD Anomali ThreatStream Coverage

Anomali ThreatStream is a Threat Modeling solution from Anomali.

Companies worldwide use Anomali ThreatStream, from small firms to large enterprises across 21+ industries.

Organizations such as ExxonMobil, Occidental Petroleum Corporation, M&T Bank, Optiv and Entrust Datacard are recorded users of Anomali ThreatStream for Threat Modeling.

Companies using Anomali ThreatStream are most concentrated in Oil, Gas and Chemicals, Banking and Financial Services and Professional Services, with adoption spanning over 21 industries.

Companies using Anomali ThreatStream are most concentrated in United States, with adoption tracked across 195 countries worldwide. This global distribution highlights the popularity of Anomali ThreatStream across Americas, EMEA, and APAC.

Companies using Anomali ThreatStream range from small businesses with 0-100 employees - 0%, to mid-sized firms with 101-1,000 employees - 0%, large organizations with 1,001-10,000 employees - 50%, and global enterprises with 10,000+ employees - 50%.

Customers of Anomali ThreatStream include firms across all revenue levels — from $0-100M, to $101M-$1B, $1B-$10B, and $10B+ global corporations.

Contact APPS RUN THE WORLD to access the full verified Anomali ThreatStream customer database with detailed Firmographics such as industry, geography, revenue, and employee breakdowns as well as key decision makers in charge of Threat Modeling.