CASE STUDY

How Tealium Built Their Virtual AI SOC with Panther

bullseye-arrow

Industry:

Software Development

buildings

HQ:

San Diego, CA

calendar-lines

Founded:

2011

users

Employees:

500–1,000

When Tealium first deployed Panther, the results were immediate. The security team gained 9x more data ingestion, reduced false positives by up to 70%, and built precise, customized detections that their previous SIEM couldn't support. Panther gave the team the foundation they needed: a scalable data lake, real-time detection logic, and Python-based rules they could actually own.

What they didn't anticipate was what came next.

From Data Lake to Intelligence Platform

As Panther's AI capabilities rolled out, the Tealium security team was already primed to adopt them. They had the data, the detection library, and the operational discipline. What they needed was a way to scale the expertise sitting inside that foundation. "Our SIEM is no longer just a data lake. Panther is now an intelligence platform," said Jason, Lead Security Engineer at Tealium. That realization changed how the team approached the work entirely.

"When you look at the thinking steps of the AI in the platform, it's doing all of the things that a sophisticated engineer would do on their best day β€” and it's doing it on every alert, every time, 24 hours a day, no fatigue."

Jason, Lead Security Engineer, Tealium

Clearing the Backlog That Wasn't Clearable

Over time, the team had accumulated thousands of open alerts in OpsGenie β€” some dating back to 2023 β€” that had never been fully assessed. There was no realistic path to close them. Doing it manually, with the full team focused on nothing else, would have taken a quarter. Contracting it out was the only other option.

Instead, they were able to use Panther AI to run a summary on every open alert, generate an indicator confidence score, and auto-close anything that scored as benign. Alerts with uncertainty or high confidence of compromise escalated to human review.

In a matter of weeks, the backlog was at zero. Every open signal had been assessed for compromise. "It was an impossible task with our current team," Jason said. "There's just no way around it."

Accelerating Detection Engineering

The second shift happened inside their weekly signal-to-noise meetings β€” a standing session where the team reviewed which detections needed tuning, restructuring, or refinement. For over a year, those meetings moved slowly. Two or three detections per session, with significant back-and-forth before anything changed.

The bottleneck wasn't effort. It was the research burden on the engineer doing the work. For Javi, Tealium's primary detection engineer, deciding how to structure a new rule β€” real-time alert, scheduled digest, profile-level detection β€” could mean 4-5 hours of solo research per detection.

With Panther AI, that process changed fundamentally. Panther AI could surface the right structure for a detection, flag considerations Javi hadn't thought to include, and serve as a sounding board throughout the build. What once took most of a day became a 10-minute conversation.

"Our detection engineer said, once he had access to Panther AI, it felt like he had a peer collaborating with him. That's a powerful thing when you feel like you were solo on something before."

Donald Scherer, Vice President of Platform and Infrastructure Security

Detection build time dropped by 75–80%, and as detection creation sped up, something unexpected happened: the team started actively seeking out more log sources to monitor rather than avoiding them. They grew their monitored log sources by nearly 30% because they finally had the confidence and capacity to expand coverage proactively.

"With Panther, we went from not wanting to monitor any more log sources to actively searching for more logs to bring in. That's the difference between an effective tool and a tool that builds confidence."

Donald Scherer, Vice President of Platform and Infrastructure Security, Tealium

Building the T-SOC: A Virtual SOC Powered by AI

The most ambitious evolution came at the end of 2025, when Don directed the team to build what they now call the T-SOC β€” the Tealium SOC β€” a virtual security operations capability built from the ground up using AI at every layer.

The architecture runs in tiers. Tier 1 handles initial alert triage and analysis. Tier 2 audits that analysis, a second AI layer that critiques the first. Tier 3 evaluates the output of both, and when the two lower tiers disagree, it escalates to a human. When they agree and confidence is high, benign alerts close automatically with a complete audit trail.

Underpinning all of it is Panther's data lake and the Panther MCP, which the T-SOC uses to query log data, enrich context, and inform response recommendations at each tier.

"It's AI triaging and analysis from multiple perspectives, AI evaluating the work of other agents, all the way through the triage and closure lifecycle," Jason explained. "At the end of the day, humans have the accountability and authority to oversee this process. But these tools enable us to respond in hours, not days β€” and in some cases, minutes, not hours."

The practical results are striking. Jason and Don estimate the team of five is doing the work of a team 10X their size. When someone manually created an IAM user across one of Tealium's numerous AWS accounts, the team was aware and triaging within 10 minutes. Alert volume has dropped by 80–90% through continuous detection improvement. With AI handling the high-volume, repetitive work across the alert lifecycle, the team now has the bandwidth to think about threat patterns and adversarial behavior that would never have made it onto the radar before.

β€œThere was a time I was so concerned about solving the next thing in front of me that I rarely had time to spend the mental resources on creative, strategic thinking. Now I have tools that can think creatively with me β€” and AI is running the low-brain, high-bandwidth work so we can focus on what actually matters. Everybody else is getting gray hair because of their SIEM. With Panther, we get to be excited about ours." 

Jason, Lead Security Engineer, Tealium

Share:

Challenges

A years-long alert backlog had grown beyond what the team could realistically clear alongside normal operations

Building and tuning detections required hours of solo research per rule, slowing the team's ability to improve signal quality

Applying consistent, senior-level analysis across 55+ AWS accounts was impossible for a small team relying on tribal knowledge

Solutions

Ran automated triage and confidence scoring across the full alert backlog, auto-closing benign signals and surfacing any true positives for human review

Leveraged Panther AI as a detection engineering collaborator to accelerate rule creation, structure decisions, and surface blind spots

Built out their virtual SOC β€” the T-SOC β€” with AI agents triaging, auditing each other's analysis, and escalating only when confidence thresholds aren't met

Results

Cleared thousands of open alerts dating back to 2023 down to zero in a matter of weeks, a task the team estimated would have taken a full quarter of dedicated attention before AI

Reduced time spent creating new detections by 75–80%, dropping from 4-5 hours per rule to just 10 minutes for some

A team of five now operates at the scale of a team 10X their size, with response times on alerts like AWS anomalies dropping to under 10 minutes and total alert volume reduced by 80–90%

Ready for less noise
and more control?

See Panther in action. Book a demo today.

Get product updates, webinars, and news

By submitting this form, you acknowledge and agree that Panther will process your personal information in accordance with the Privacy Policy.

Get product updates, webinars, and news

By submitting this form, you acknowledge and agree that Panther will process your personal information in accordance with the Privacy Policy.

Product
Resources
Support
Company

Get product updates, webinars, and news

By submitting this form, you acknowledge and agree that Panther will process your personal information in accordance with the Privacy Policy.