RAKBANK chooses Anomali Threat Intelligence

Anomali announced recently that the National Bank of Ras Al Khaimah (RAKBANK), is deploying Anomali to operationalize threat intelligence across its infrastructure that will enable immediate detection for the most serious threats it faces, gain the ability to respond more quickly to cybercriminals, and strengthen defenses while reducing overall risk.

Khaled Chatila, Anomali Regional Sales Director, Middle East, Turkey and Africa

“As one of the prominent banks in the United Arab Emirates, we manage assets and transactions for thousands of customers. One of our main commitments to our customers is security and we achieve this through solid partnerships with industry experts such as Anomali. They are going to provide intelligent-driven cybersecurity measures and will do everything possible to avoid disruptions that cyberattacks can cause,” said K.S. Ramakrishnan, Chief Risk Officer, RAKBANK. “By bringing in industry experts, we expect to gain advanced levels of security that will help us to further heighten our defenses and intercept any possible exploitation by cybercriminals.”

As an Anomali customer, RAKBANK will utilize our full product suite, which includes Anomali ThreatStream, our threat intelligence platform (TIP), Anomali Lens+, our advanced threat knowledge tool, and Anomali Match, our enterprise threat detection engine. Key to the Bank’s decision to choose Anomali was Match’s ability to automate the detection of threats in networks by continuously correlating all available intelligence and telemetry against every event log.

“The Middle East is home to one of the most vibrant economies in the world today, which isn’t lost on adversaries. This is why it’s also ground zero for an array of advanced threats,” said Khaled Chatila, Anomali Regional Sales Director, Middle East, Turkey and Africa. “We’re honored that RAKBANK chose us to help remain protected against some of the most troubling criminals and fraudsters targeting banks today. We look forward to helping them build an effective threat intelligence program that scales alongside their security operations.”

Comments

Comments