Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Anomali equips security teams with advanced machine learning-driven threat intelligence, enabling them to uncover concealed threats that may affect their systems. Organizations depend on the Anomali platform to leverage threat data, insights, and intelligence for informed cybersecurity choices that mitigate risks and bolster defenses. At Anomali, our mission is to democratize access to the advantages of cyber threat intelligence, which is why we have created resources and tools that we provide to the community at no cost. By doing so, we aim to enhance overall cybersecurity awareness and resilience across various sectors.

Description

SecureX is a cloud-driven platform seamlessly integrating our Cisco Secure suite with your infrastructure, enabling significant reductions in dwell time and reliance on manual tasks. This innovative solution fosters simplicity, transparency, and productivity by eliminating obstacles that hinder your team's ability to access vital information and take necessary actions. Each Cisco Secure product comes equipped with XDR capabilities and more, providing an interconnected platform that harmonizes your current ecosystem while also being compatible with external solutions. Users can take advantage of a cohesive dashboard for unified visibility, ensuring that you remain informed about incidents thanks to a consistent ribbon that is always accessible. By consolidating global intelligence with local insights into a single perspective, SecureX streamlines threat investigations and incident management processes. Additionally, it offers automation of routine tasks through prebuilt workflows tailored to common scenarios, or you can create custom workflows using our intuitive no-to-low code, drag-and-drop interface, enhancing operational efficiency even further. With SecureX, organizations can transform their security response strategy, empowering teams to focus on more strategic initiatives.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

urlscan.io
Cisco Duo
Cisco Secure Firewall
Cisco Secure Workload
Cisco Umbrella
Darkfeed
GigaSECURE
HYAS
IBM Cloud
Intel 471 TITAN
Joe Sandbox
ServiceNow
Swimlane
The Media Trust
The Respond Analyst
ThreatBlockr
ThreatQ
V-Key Smart Authenticator
VMRay
alphaMountain Threat Intelligence APIs and Feeds

Integrations

urlscan.io
Cisco Duo
Cisco Secure Firewall
Cisco Secure Workload
Cisco Umbrella
Darkfeed
GigaSECURE
HYAS
IBM Cloud
Intel 471 TITAN
Joe Sandbox
ServiceNow
Swimlane
The Media Trust
The Respond Analyst
ThreatBlockr
ThreatQ
V-Key Smart Authenticator
VMRay
alphaMountain Threat Intelligence APIs and Feeds

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Anomali

Founded

2013

Country

United States

Website

www.anomali.com

Vendor Details

Company Name

Cisco

Founded

1984

Country

United States

Website

www.cisco.com/c/en/us/products/security/securex/index.html

Product Features

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Endpoint Detection and Response (EDR)

Behavioral Analytics
Blacklisting/Whitelisting
Continuous Monitoring
Malware/Anomaly Detection
Prioritization
Remediation Management
Root Cause Analysis

Alternatives

Alternatives

Quadrant XDR Reviews

Quadrant XDR

Quadrant Information Security