• Product
    • Overview
    • How It Works
    • Panther for AWS
    • Panther for Snowflake
    • Panther vs SIEM
    • Detection Coverage
  • Integrations
  • Learn
    • Blog
    • Webinars
    • Workshops
    • Podcasts
    • Customer Stories
    • Events
  • Support
    • Documentation
    • Community
    • Knowledge Base
    • Release Notes
    • Status
  • Company
    • About Us
    • Trust
    • Careers
    • Partners
    • News
Request a Demo
Panther
  • Product
    • Overview
    • How It Works
    • Panther for AWS
    • Panther for Snowflake
    • Panther vs SIEM
    • Detection Coverage
  • Integrations
  • Learn
    • Blog
    • Webinars
    • Workshops
    • Podcasts
    • Customer Stories
    • Events
  • Support
    • Documentation
    • Community
    • Knowledge Base
    • Release Notes
    • Status
  • Company
    • About Us
    • Trust
    • Careers
    • Partners
    • News
Request a Demo
webinar

The Need for Speed: Modern SIEM with Real-Time Detection & Automation

Register now
Live October 11, 2023 | 11:00 AM
Article

The Great Cloud-Native Fib: Unmasking a Core SIEM Deception

Why it is crucial to differentiate between true cloud-native solutions and those that have been retrofitted and re-architected for cloud deployment.

Read more
Article

Shifting SIEM Left: Securing the Software Supply Chain with GitHub Monitoring

Delving into the evolving landscape of SIEM data sources, this article underscores the rising significance of Cloud and DevOps-related data, exemplified by GitHub, and underscores the importance of vigilant monitoring to safeguard organizations' critical code assets in the face of evolving threats.

Read more
Article

A Quick and Easy Guide to Detection and Query Tuning

How embracing Panther's detection-as-code principles empowers organizations to stay ahead of threats by fine-tuning and optimizing their security content for their unique environment.

Read more
Article

Panther Users Can Now Manage S3 Log Sources with Terraform

Read more
Article

Monitoring Tailscale Network & Audit Logs with Panther

Panther is thrilled to announce a powerful new integration with Tailscale. This cutting-edge collaboration enables users to stream logs directly from Tailscale to Panther.

Read more
Article

How FloQast Transforms Security Ops with Detection-as-Code

Learn how FloQast used the out-of-the-box detections as well as easily translated pre-written detections from other platforms.

Read more
Article

Accelerating Investigation with Panther

Learn how Panther empowers your investigations with enrichment, cross-log searching, and visualized results.

Read more
Article

How Panther Ensures Resilience During Cloud Outages

Discover how Panther's architecture and engineering principles ensure the safety of customer data even when faced with a major outage.

Read more
Article

Nation-State Actors Targeting Software Supply Chain via GitHub

GitHub warns of Lazarus Group's social engineering attack on developers. Learn how the attack operates and how to protect your organization.

Read more
Page 1 of 1112345...10...Next

Panther
AICPA SOC - SOC for Service OrganizationsPCI-DSS Compliant

Product

  • Integrations
  • Platform
  • Panther for AWS
  • Panther for Snowflake
  • Panther vs SIEM

Customer Resources

  • Documentation
  • Release Notes
  • Status
  • Community
  • Knowledge Base

Learn

  • Blog
  • Podcasts
  • Solution Briefs
  • Webinars
  • Events
  • Case Studies
  • Workshops

Company

  • About us
  • Careers
  • News
  • Partners
  • Trust
Request a Demo

  • Terms
  • Privacy
  • Sitemap

Copyright ©2023 Panther Labs Inc.
All Rights Reserved.

Manage your privacy

By continuing to use this website you consent to our use of cookies.

Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Manage options
{title} {title} {title}