In this webinar, you’ll learn how Dropbox implemented Detection-as-Code using Panther. The content will cover Dropbox’s detection workflow and the benefits of applying software development best practices to your detection logic. Then, we’ll step through a hypothetical, real-world example of an AWS detection from start to finish - beginning with a vulnerability and finishing with alert resolution.
NEW
Docker cut alerts 85% and 3Xed ingestion with Panther. Learn more
close
Docker cut alerts 85% and 3Xed ingestion with Panther. Learn more
close
Docker cut alerts 85% and 3Xed ingestion with Panther. Learn more
close
WEBINAR
WEBINAR
WEBINAR
How Dropbox uses Detection-as-Code for AWS Threats
How Dropbox uses Detection-as-Code for AWS Threats
TK
Ted Kietzman
JP
Jeff Puchalski
Recommended Resources
Recommended Resources
Proactive security starts here
Proactive security starts here
Detect faster. Respond smarter. Defend your cloud and hybrid environments with speed, agility, and confidence.
Get product updates, webinars, and news
By submitting this form, you acknowledge and agree that Panther will process your personal information in accordance with the Privacy Policy.
Get product updates, webinars, and news
By submitting this form, you acknowledge and agree that Panther will process your personal information in accordance with the Privacy Policy.
Product
Resources
Support
Company
Get product updates, webinars, and news
By submitting this form, you acknowledge and agree that Panther will process your personal information in accordance with the Privacy Policy.