G-Cloud selects Anomali as sole threat intelligence provider


Monday, August 31, 2015 by Anomali

Anomali, provider of market-leading threat intelligence platforms, has been listed on G-Cloud 8, the UK Government digital marketplace for approved technology suppliers. G-Cloud has been designed to enable the UK Government to control, manage and standardise IT spending across public sector bodies.

G-Cloud is operated by the Crown Commercial Service, which is sponsored by the Cabinet Office, and registers new suppliers just once a year. Anomali has been selected as the sole threat intelligence provider for the period August 2016 to July 2017. Only suppliers that are G-Cloud-approved are allowed to sell products and services to UK Government departments.

"2016 has seen a large number of very high profile security breaches from malware to malvertising and ransomware, as well as distributed denial of service (DDoS) campaigns and insider incidents. Government departments and bodies hold a lot of personal data that would be extremely attractive to a cybercriminal - think medical records and financial information - making it absolutely critical that they are able to identify and address potential breaches at an early stage. That's where threat intelligence platforms come in and that's why this technology has made it onto the G-Cloud for the first time," commented Jamie Stone, VP of EMEA, Anomali.

One of the many challenges associated with deploying a cybersecurity strategy is cutting through the volume of threat data that is available to deliver relevant, actionable security intelligence. Businesses across both public and private sectors need to be able to invest in technology which can help them formulate a successful cybersecurity defence. A specialised threat intelligence platform enables organisations to prioritise potential cyber-attacks in order to understand and respond to threats effectively.

Anomali, formerly known as ThreatStream, provides products that unlock the value of threat intelligence for security operations and incident-response personnel. The company delivers technology which addresses threat intelligence big data and scalability challenges, provides deep retrospective analysis, and helps to realise the goal of an intelligence-driven security operations centre.