Ubisoft Chooses Anomali to Secure Its Global IT Infrastructure
Anomali Gives Gaming Leader Access to Wide Range of Threat Feeds Needed to Defend Against Adversaries, Including Deep and Dark Web Intelligence
Anomali, a leader in intelligence-driven cybersecurity, announced that Ubisoft chose the Anomali Altitude integrated solutions suite to help secure its global IT infrastructure. Based in France, Ubisoft is a leading creator, publisher and distributor of interactive entertainment and services. Ubisoft offers a rich portfolio of world-renowned brands, including Assassin’s Creed®, Far Cry®, For Honor®, Just Dance®, Watch Dogs and Tom Clancy’s video game series, including Tom Clancy’s Ghost Recon, Tom Clancy’s Rainbow Six® and Tom Clancy’s The Division®.
Read More: How Artificial Intelligence And Blockchain Is Revolutionizing Mobile Industry In 2020?
Gaming and interactive entertainment are among the fastest-growing online industries. Business data platform Statista reports that there are close to two billion online gamers, with that number expected to grow to almost three billion by 2021. By building a security infrastructure that seamlessly integrates cyber threat intelligence (CTI) from a range of sources, including the deep and dark web, Ubisoft is taking proactive steps to defend its users against the world’s most advanced and active threats. By providing visibility into threat actors’ activities, along with fast integration into Ubisoft security controls, Anomali helps to automate the detection, investigation and response processes.
Read More: Predictions 2020: No Stopping “Kubernetifying” of the Analytics Stack
As an Anomali customer, Ubisoft will be utilizing Anomali ThreatStream. This award-winning threat intelligence platform (TIP) integrates and manages threat data from the broadest range of open source and proprietary feeds to create actionable threat intelligence that is relevant to customers’ unique environments. Because Anomali ThreatStream integrates into existing security infrastructures, customers can automate intelligence-driven blocking, detection and remediation across security controls.
Read More: Edge Computing+ AI Confluence: Get Ready to “Edgify” Your IT and Automation Operations
Comments are closed, but trackbacks and pingbacks are open.