• Product
    • Overview
    • Product Tour
    • Panther for AWS
    • Panther for Snowflake
    • Panther vs SIEM
    • Detection Coverage
  • Integrations
  • Learn
    • Blog
    • Webinars
    • Workshops
    • Podcasts
    • Customer Stories
    • Events
  • Support
    • Documentation
    • Community
    • Knowledge Base
    • Release Notes
    • Status
  • Company
    • About Us
    • Trust
    • Meet the Team
    • Careers
    • Partners
    • News
Request a Demo Start Trial
Panther
  • Product
    • Overview
    • Product Tour
    • Panther for AWS
    • Panther for Snowflake
    • Panther vs SIEM
    • Detection Coverage
  • Integrations
  • Learn
    • Blog
    • Webinars
    • Workshops
    • Podcasts
    • Customer Stories
    • Events
  • Support
    • Documentation
    • Community
    • Knowledge Base
    • Release Notes
    • Status
  • Company
    • About Us
    • Trust
    • Meet the Team
    • Careers
    • Partners
    • News
Request a Demo Start Trial
On demand
webinar

How To Reduce Alert Fatigue with Panther and GreyNoise

Discover how to reduce noisy alerts, improve alert fidelity, speed up analyst workflows and ensure prioritization of critical alerts with our new integration of GreyNoise threat intelligence in Panther

View now
Play
Episode 22
podcast

Compass CISO JJ Agha on Relentless Iterations and What He Expects from a Modern SIEM

JJ Agha is the CISO at Compass, the largest real estate brokerage in the US, and previously spent over four years as VP of InfoSec at WeWork, along with time as a security engineer at Vimeo and Priceline. 

Listen Now
Case Study

How Randori Reduced their SIEM-Related TCO by 70%

How Randori Reduced their SIEM Related TCO by 70%

Read story
Article

Rapid Detection and Response with Panther & Tines

Panther and Tines are modern solutions that work together to rapidly detect and respond to threats, saving time and improving security operations.

Read more
On demand
webinar

Automating Detection and Response with Panther and Tines

How to use Panther and Tines to generate alerts on suspicious activity, get answers from end-users, enrich data, and leverage automation to save time to focus on the issues that matter most: improving the security of your organization.

Watch now
report

State of AWS Log Management

We sought out security professionals who use AWS to better understand what they're seeing, what they’re concerned about, and what they want to improve.

Read more
Play
Episode 21
podcast

Discord’s Kathy Wang on Building and Managing Security Teams

Kathy Wang is the CISO at Discord, an internationally-recognized malware expert who has researched, developed, evaluated, and operationalized various solutions for detecting and preventing client-side attacks used by advanced persistent threats (APT)

Listen Now
Article

Modernize detection engineering with Detection-as-Code

Detection-as-Code enables teams to build scalable, repeatable processes for writing, maintaining, testing, and deploying detection content.

Read more
Article

Protect Business Critical Applications with GitHub Audit Logs & Modern SIEM

Security teams' usage of GitHub audit logs has become critical to monitoring the safe-keeping of infrastructure-critical code repositories.

Read more
Article

Think Like a Detection Engineer, Pt. 2: Rule Writing

In this post, we're overviewing how Detection Engineers should think about writing rules that are effective, tested, and actionable.

Read more
Page 6 of 20Previous...45678...20...Next

Detect Any Breach, Anywhere

Start detecting suspicious activity in real-time, transform raw logs into a robust security data lake, and build a world-class security program with Panther.

Try Panther

Panther
AICPA SOC - SOC for Service OrganizationsPCI-DSS Compliant

Product

  • Integrations
  • Platform
  • Panther for AWS
  • Panther for Snowflake
  • Panther vs SIEM
  • Pricing

Customer Resources

  • Documentation
  • Release Notes
  • Status
  • Community
  • Knowledge Base

Learn

  • Blog
  • Podcasts
  • Solution Briefs
  • Webinars
  • Events
  • Case Studies
  • Workshops

Company

  • About us
  • Careers
  • Meet the Team
  • News
  • Partners
  • Trust
Request a Demo

  • Terms
  • Privacy
  • Sitemap

Copyright ©2023 Panther Labs Inc.
All Rights Reserved.

Manage your privacy

By continuing to use this website you consent to our use of cookies.

Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
Manage options
{title} {title} {title}