Panther

Panther

Computer and Network Security

San Francisco, CA 11,418 followers

Turn up the volume, turn down the noise.

About us

Panther transforms noisy cloud logs into security signals with code-driven detection and response at petabyte scale–without the overhead and cost of traditional SIEMs.

Website
https://panther.com/
Industry
Computer and Network Security
Company size
51-200 employees
Headquarters
San Francisco, CA
Type
Privately Held
Founded
2018
Specialties
Cloud Security, Information Security, Startup, AWS, AWS Security, SIEM, Cloud-Native SIEM, big data, Security Data Lake, Security, Detections as Code, Splunk Alternative, Cloud SIEM, Log Analysis, Security Monitoring, Python, and threat detection

Products

Locations

Employees at Panther

Updates

  • View organization page for Panther, graphic

    11,418 followers

    We've got you covered for your next security engineering job in 2025! ⭐ Here are 5 security engineering jobs posted in the last week! Go to our job board for links, and to see more opportunities: https://lnkd.in/g46zAHtK 💰 Coinbase Senior Blockchain Security Engineer Remote, US 🔸 AIS Security Operations Architect Virginia, US 🍏 Zoll Medical Corporation Information Security Architect Broomfield, CO 🛡 Coro Security Support Engineer Remote, US 💻 UCare Security Architect/Security Architect Senior Minneapolis, MN #NowHiring #HiringNow #JobBoard #SecurityEngineering #SecOps #Cybersecurity #Jobs #StartupJobs

    • Finding the ultimate sec engineering job board
  • Panther reposted this

    View profile for Russell Leighton, graphic

    Chief Architect at Panther Labs | ex-Amazon

    We added a full system architecture description of Panther to our user docs a few months ago. More than 1 person has said to me "That's crazy, you are telling your competitors and even the more tech savvy customers how to do what you do! They will steal your ideas and you will lose business." I think the opposite, let me explain. Panther is a "Cloud Native" SIEM, taking advantage of all the available services. Does that mean anyone can do what we have done? Yes it does. Assuming enough good engineers, in 3-5 years you could build what we have today. It will take 3-5 years because Panther is more than "let's wire up some lambdas to write parquet files". The hard lessons learned about resiliency, correctness and cost effectiveness take time and a diversity of experience. The full feature set of a SIEM goes well beyond simply running scheduled queries. By showing how we implemented the breadth of features in Panther we hope customers will appreciate what we have created and understand the value of what we offer. Do you have 3-5 years to roll your own? Do you have the operational staff to run what you built? If so, let's compare notes in a few years. In the meantime, Panther has some industry changing capabilities planned for 2025. More on that in a few months!

    Panther System Architecture | Panther Docs

    Panther System Architecture | Panther Docs

    docs.panther.com

  • Panther reposted this

    View profile for Casey Hill, graphic

    Head of Product at Panther | FIP, CIPP/E, CIPM, CSPO

    The below sums it up quite well. We're hobbyists without our customers. They not only give us thoughtful feedback and suggestions for improving our product, but they contribute to it. Thank you to the #panther customer community, for the continued support!

    View organization page for Panther, graphic

    11,418 followers

    🔥🔥🔥 Some #gratitude coming in hot! 🏆 We want to recognize our vibrant Panther community whose contributions improve our open-source ruleset on the daily. We know the SecOps community is driven by open-source tools and standards, which is why our ruleset has been open-sourced from the start—and proudly a part of the #Sigma ecosystem. Recently, our Threat Research team started a quarterly newsletter to recognize and celebrate our contributors. 🎉 We give one lucky winner a prize for having the most impact on our ruleset. Here’s some of the great stuff we’ve seen over the ☀️ summer and 🍁 fall! ⭐ A policy that ensures valid AWS WAF logging destinations, a policy to prevent cross-service confused deputy issues on S3 buckets, and a rule that detects when EKS resources are accessed using the system:anonymous user, all submitted by Bharat Chandra P. 👏 Thank you! ⭐ An improvement to all alert titles in the Wiz Audit log detections to include the Wiz actor ⭐ Filtering out Intelsat plane wifi networks, which causes a false positive in our impossible travel rule ⭐ A new rule that alerts when a GitHub dependabot vulnerability is dismissed without being resolved. This one was submitted by Elim Ghebregzabiaher—thank you! 👏 ⭐ Correction of an alert title showing the actor instead of the target for a Slack alert ⭐ A well-documented bug report for the Crowdstrike pipeline that helped our Threat Research team quickly fix the issue To our contributors and the Panther community, our sincerest gratitude. 💙 Thank you! 💙 To everyone else, check out our open-source ruleset 👉 panther-analysis: https://lnkd.in/disJ4Cb #SecurityEngineering #DetectionAsCode #DetectionEngineering #OpenSource

    • No alternative text description for this image
  • How do delays between action and billing updates impact incident response in AWS environments? In season two of the Detection at Scale podcast, Corey Quinn, Chief Cloud Economist at The Duckbill Group, shares his insights into time lags in AWS security incident detection. Because practitioners are using billing as part of their detection signaling, this can cause a delay between action and billing updates. Check out the full episode here 👉 https://lnkd.in/dCWvuRjg #DetectionatScale #Cybersecurity #DetectionEngineering #SecurityEngineering Hosted by: Jack Naglieri

  • How useful is behavior analysis in threat detection? In season two of the Detection at Scale podcast, Jeff Bollinger, Director of Incident Response and Detection Engineering at LinkedIn, explores the complex landscape of security monitoring, including the pivotal role of behavioral analysis and the increasing importance of detecting and monitoring unusual behaviors by entities in the cybersecurity domain. Although human behavior is too unpredictable for it to be an end-all-be-all indicator, it can still tell us a lot about what signals are actually threats and which are just noise. Check out the full episode here 👉 https://lnkd.in/g4MxarkD #DetectionatScale #Cybersecurity #DetectionEngineering #SecurityEngineering Hosted by: Jack Naglieri

  • 🤔 How does your SIEM handle ingesting custom log sources? Fed up with the time-intensive “nightmare” of onboarding unsupported log sources, Varo switched to Panther because of our easy data ingestion options. Learn how Varo uses Panther to centralize alerting and gain the visibility they need to secure their environment. Read the case study 👉 https://lnkd.in/gGFRCiPC #DetectionAsCode #SecurityEngineering #DetectionEngineering

  • Have you ever had to search for a particular string in your logs, but you don’t know what field it's in? We’ve been there too, and we know how much of a pain it is. In #PantherFlow, we made this a piece of cake. 🍰 🔍 Just invoke the "search" operator followed by your string, and PantherFlow will handle locating it in your data. For a more complex search pattern, use boolean logic or wildcards. No need to figure out the right field first. Curious how our piped query language simplifies search? Read about it in our blog 👉 https://lnkd.in/gk6cBxFg #DetectionAsCode #DetectionEngineering #SecurityEngineering

  • 🔥🔥🔥 Some #gratitude coming in hot! 🏆 We want to recognize our vibrant Panther community whose contributions improve our open-source ruleset on the daily. We know the SecOps community is driven by open-source tools and standards, which is why our ruleset has been open-sourced from the start—and proudly a part of the #Sigma ecosystem. Recently, our Threat Research team started a quarterly newsletter to recognize and celebrate our contributors. 🎉 We give one lucky winner a prize for having the most impact on our ruleset. Here’s some of the great stuff we’ve seen over the ☀️ summer and 🍁 fall! ⭐ A policy that ensures valid AWS WAF logging destinations, a policy to prevent cross-service confused deputy issues on S3 buckets, and a rule that detects when EKS resources are accessed using the system:anonymous user, all submitted by Bharat Chandra P. 👏 Thank you! ⭐ An improvement to all alert titles in the Wiz Audit log detections to include the Wiz actor ⭐ Filtering out Intelsat plane wifi networks, which causes a false positive in our impossible travel rule ⭐ A new rule that alerts when a GitHub dependabot vulnerability is dismissed without being resolved. This one was submitted by Elim Ghebregzabiaher—thank you! 👏 ⭐ Correction of an alert title showing the actor instead of the target for a Slack alert ⭐ A well-documented bug report for the Crowdstrike pipeline that helped our Threat Research team quickly fix the issue To our contributors and the Panther community, our sincerest gratitude. 💙 Thank you! 💙 To everyone else, check out our open-source ruleset 👉 panther-analysis: https://lnkd.in/disJ4Cb #SecurityEngineering #DetectionAsCode #DetectionEngineering #OpenSource

    • No alternative text description for this image

Similar pages

Browse jobs