How is a company as large as Meta gauging risk? In season two of the Detection at Scale podcast, Justin Anderson, Security Engineering Manager, Detection & Response at Meta, explained how they evaluate risk by assessing the TTPs applicable to the environment and the coverage across those TTPs. Check out the full episode here 👉 https://lnkd.in/gmN6HgGy #DetectionatScale #Cybersecurity #DetectionEngineering #SecurityEngineering Hosted by: Jack Naglieri
Panther
Computer and Network Security
San Francisco, CA 11,218 followers
Turn up the volume, turn down the noise.
About us
Panther transforms noisy cloud logs into security signals with code-driven detection and response at petabyte scale–without the overhead and cost of traditional SIEMs.
- Website
-
https://panther.com/
External link for Panther
- Industry
- Computer and Network Security
- Company size
- 51-200 employees
- Headquarters
- San Francisco, CA
- Type
- Privately Held
- Founded
- 2018
- Specialties
- Cloud Security, Information Security, Startup, AWS, AWS Security, SIEM, Cloud-Native SIEM, big data, Security Data Lake, Security, Detections as Code, Splunk Alternative, Cloud SIEM, Log Analysis, Security Monitoring, Python, and threat detection
Products
Panther
Security Information & Event Management (SIEM) Software
Panther is a cloud-native threat detection platform that transforms TB/day of raw logs into a structured security data lake to power real-time detection, swift response, and thorough investigations. With detection-as-code in Python and out-of-the-box integrations for dozens of log sources, Panther solves the challenges of security operations at scale.
Locations
-
Primary
San Francisco, CA 94103, US
Employees at Panther
Updates
-
Hey folks! 🍸 We’ll be at #reinvent hosting a happy hour with our partners, Rootly, Vanta, Snowflake, and Suger. Join us at Clique Bar & Lounge at the Cosmopolitan for a relaxed evening to talk everything AWS and security over bites and drinks. There only a few spots left, so RSVP now 👉 https://lnkd.in/gtni-6Vi #AWSreinvent #SecurityEngineering #DetectionEngineering #CloudSecurity
-
🔥 Season three of the #DetectionAtScale pod has officially started!! 🔥 In this first episode, JJ Tang, CEO and Co-founder of Rootly, shares how breaking down silos and aligning processes across departments turns incident management into a true organizational superpower. 🎵 Tune in to Detection at Scale to learn more! Full episode is here 👉 https://lnkd.in/gDWN8C8D #cybersecurity #detectionandresponse #cloudsecurity Hosted by: Jack Naglieri
-
🤠 Thanks to everyone who visited us at #KubeCon + #CloudNativeCon! We loved sharing the good times with you at our packed happy hour. Onwards and upwards, friends!
-
Panther reposted this
To all making the annual pilgrimage to Vegas for #aws #reinvent: we're hosting an intimate happy hour with our customers. Come join us, Snowflake, Panther, Vanta, and Rootly for fun convos before you go bet it all on red. What do we have in common? We're all AWS partners who's in on marketplace and co-sell. We're almost at capacity. Let us know if you can join, we'd love to host you. 📍 Location: Clique Bar & Lounge, Las Vegas 📆 Date/Time: Tuesday, December 3, 5:00 PM - 7:00 PM Drinks, bites, and a chance to win a prize. #REINVENT2024 #happyhour #awspartners #cloud #marketplaces #paceyourself #wearcomfortableshoes
-
Panther reposted this
🚨 Last chance to register! 🚨 Our webinar on #PantherFlow starts in T - 6 hours at 1 PM EST / 10 AM PST. Join us for an in-depth walkthrough on our piped query language, including major design decisions and where we are headed next. 🔍 What we’re most looking forward to is showing you how to use PantherFlow to investigate a threat scenario 👉 an account compromise, lateral movement, data exfiltration, and privilege escalation. ✅ Sign up now! https://lnkd.in/g-RZiZC4 #DetectionAsCode #DetectionEngineering #SecurityEngineering
-
🚨 Last chance to register! 🚨 Our webinar on #PantherFlow starts in T - 6 hours at 1 PM EST / 10 AM PST. Join us for an in-depth walkthrough on our piped query language, including major design decisions and where we are headed next. 🔍 What we’re most looking forward to is showing you how to use PantherFlow to investigate a threat scenario 👉 an account compromise, lateral movement, data exfiltration, and privilege escalation. ✅ Sign up now! https://lnkd.in/g-RZiZC4 #DetectionAsCode #DetectionEngineering #SecurityEngineering
-
Why is it helpful when investigation workflows do not require a fixed schema? 🤔 Well, security data is almost ubiquitously JSON, which has variable schema. And when you don’t require unstructured security data to fit into structured schemas, this opens up many possibilities. 🌟 For starters, raw text search across all your logs for when you just don’t know what field a value might be in. Then there’s seamless, multi-table queries that don't require special handling when the tables contain different columns. And you can even use JSON data itself as inputs for your queries. #PantherFlow does all of the above, and more! Learn about the design decisions behind our piped search language in our blog by Douglas Miller, Staff Backend Software Engineer at Panther 👉 https://lnkd.in/g4PURrzB #DetectionAsCode #DetectionEngineering #SecurityEngineering
-
Finding related activity by a threat actor across different log types is a pain 👎 when you need to conduct multiple joins to match up various fields. With #PantherFlow, this is as simple as extracting the fields you need from each log type with the “coalesce” function. 🔴 Live tomorrow, join us for a webinar on how to use PantherFlow to investigate a threat scenario involving an account compromise and secrets exfiltration. This video clip is just a sneak peek at the more in-depth walkthrough to come! 👀 Save your spot 👉 https://lnkd.in/g-RZiZC4 #DetectionAsCode #DetectionEngineering #SecurityEngineering
-
This clip is just a teaser of what’s to come this Thursday. 😎 Join our Nov 21st webinar to explore how to use #PantherFlow to investigate a threat scenario. The creator of PantherFlow, Douglas Miller, and our Principal Threat Researcher, Ariel Ropek, will walk you through developing the queries to identify: 1️⃣ AWS user account compromise 2️⃣ Lateral movement to EKS 3️⃣ Kubernetes secrets exfiltration + privilege escalation Don’t miss this one! Register now 👉 https://lnkd.in/g-RZiZC4 #DetectionAsCode #DetectionEngineering #SecurityEngineering