• Product
    • Overview
    • How It Works
    • Panther for AWS
    • Panther for Snowflake
    • Panther vs SIEM
    • Detection Coverage
  • Integrations
  • Learn
    • Blog
    • Webinars
    • Workshops
    • Podcasts
    • Customer Stories
    • Events
  • Support
    • Documentation
    • Community
    • Knowledge Base
    • Release Notes
    • Status
  • Company
    • About Us
    • Trust
    • Careers
    • Partners
    • News
Request a Demo
Panther
  • Product
    • Overview
    • How It Works
    • Panther for AWS
    • Panther for Snowflake
    • Panther vs SIEM
    • Detection Coverage
  • Integrations
  • Learn
    • Blog
    • Webinars
    • Workshops
    • Podcasts
    • Customer Stories
    • Events
  • Support
    • Documentation
    • Community
    • Knowledge Base
    • Release Notes
    • Status
  • Company
    • About Us
    • Trust
    • Careers
    • Partners
    • News
Request a Demo
webinar

The Need for Speed: Modern SIEM with Real-Time Detection & Automation

Register now
Live October 11, 2023 | 11:00 AM
Article

Zero False Positives from your SIEM

The downfall of SIEMs are high volumes of false positive alerts. Let’s discuss techniques to drive false positives down and keep them down.

Read more
infographic

State of SIEM 2022: Key Statistics

We surveyed hundreds of SecOps professionals who currently use a SIEM solution. This report summarizes their challenges, frustrations, and areas of improvement.

Read more
infographic

Detection-as-Code Best Practices

Detection-as-Code is the application of software engineering best practices to detection engineering. By adopting this new paradigm, teams can build scalable, repeatable processes for writing, maintaining, testing, and deploying detection content.

Read more
Play
Episode 27
podcast

Michael Hanley of GitHub on Why Security Needs Engineering, and Vice Versa

In this episode of the Detection at Scale, Jack speaks with Michael Hanley, Chief Security Officer and SVP of Engineering at GitHub. He also spent five years at Duo Security building their security program, and is passionate about making security easy and accessible for everyone.

Listen Now
Article

Accelerate Response with the Panther Slack Bot

Panther's new Slack Bot feature enables a much more seamless alert triage, assignment, and collaboration process – accelerating detection & response and reducing MTTR.

Read more
Article

Threat Hunting in AWS

In this article, we review how to hunt for threats in your AWS environment with AWS CloudTrail and VPC logs.

Read more
On demand
webinar

How Dropbox uses Detection-as-Code for AWS Threats

How Panther helped Dropbox implement software development best practices for their detection logic.

Watch now
Case Study

FloQast Accelerates Detection Testing and Deployment with Panther

FloQast Accelerates Detection Testing and Deployment With Panther

Read story
ebook

Crafting Security Detections for AWS

Learn how to build out threat detection for AWS environments in the way a magical smith of yore might fashion Mithril shirts for a battle against the forces of evil.

Read more
Page 6 of 23Previous...45678...20...Next

Panther
AICPA SOC - SOC for Service OrganizationsPCI-DSS Compliant

Product

  • Integrations
  • Platform
  • Panther for AWS
  • Panther for Snowflake
  • Panther vs SIEM

Customer Resources

  • Documentation
  • Release Notes
  • Status
  • Community
  • Knowledge Base

Learn

  • Blog
  • Podcasts
  • Solution Briefs
  • Webinars
  • Events
  • Case Studies
  • Workshops

Company

  • About us
  • Careers
  • News
  • Partners
  • Trust
Request a Demo

  • Terms
  • Privacy
  • Sitemap

Copyright ©2023 Panther Labs Inc.
All Rights Reserved.

Manage your privacy

By continuing to use this website you consent to our use of cookies.

Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Manage options
{title} {title} {title}