Panther Labs introduces Security Data Lake Search and Splunk Integration capabilities

These offerings mark a critical leap forward in managing security risks in today's cloud-first landscape.
As organizations race to implement machine learning capabilities, they're increasingly reliant on decentralized, cloud-based data stores and workflows to power the development of new software, such as AI tools.
These workflows magnify security challenges, with organizations continuing to report severe security incidents due to cloud misconfigurations, especially in public cloud environments.
The enhancements Panther is launching will redefine security detection, analysis, and response for the cloud-first, AI-powered future.
By combining the economic efficiency of modern security data lakes with the familiarity of traditional SIEM interfaces, Panther will enable security teams to more easily identify and respond to threats, hardening their security posture for decentralized, high-scale cloud workflows.
Panther's Security Data Lake Search is designed to capitalize on the efficiency and performance of modern data lakes.
With traditional solutions, high-volume log sources are too costly and unwieldy to ingest and search at scale, forcing organizations to choose between cost and performance.
With Panther's Security Data Lake Search, security teams can harness the full potential of mission-critical cloud logs in their detection and investigation workflows, with deployment options that reduce total cost of ownership and maximize ROI. These enhancements offer unparalleled search performance across vast data lakes, without relying on SQL, enabling fast, efficient investigations.
Panther's Splunk Integration combines Panther's cloud-native detection capabilities with Splunk's extensive analytics platform, giving organizations enhanced visibility of critical cloud workflows.
By using Panther's real-time detections on streaming cloud logs and configuring Splunk as an alert destination, security teams are empowered to implement rapid, cloud-scale detection and response workflows.
Together, Panther's Security Data Lake Search and Splunk Integration unlock the full potential of high-volume, high-value cloud log streaming data.
With cloud-native search capabilities and high-performance detections built on existing Splunk infrastructure, security teams can now ingest all of their logs and operate with the agility necessary to drive better security outcomes.
Panther has demonstrated significant value for a wide range of enterprise customers, with an average reduction in TCO by over 50%. As security risks from cloud-based workflows continue to escalate, Panther's platform is crucial for organizations aiming to bolster their compliance and reduce risk exposure efficiently.


This Cyber News was published on www.helpnetsecurity.com. Publication date: Wed, 06 Dec 2023 15:43:05 +0000


Cyber News related to Panther Labs introduces Security Data Lake Search and Splunk Integration capabilities

Panther Labs introduces Security Data Lake Search and Splunk Integration capabilities - These offerings mark a critical leap forward in managing security risks in today's cloud-first landscape. As organizations race to implement machine learning capabilities, they're increasingly reliant on decentralized, cloud-based data stores and ...
10 months ago Helpnetsecurity.com
How to perform a proof of concept for automated discovery using Amazon Macie | AWS Security Blog - After reviewing the managed data identifiers provided by Macie and creating the custom data identifiers needed for your POC, it’s time to stage data sets that will help demonstrate the capabilities of these identifiers and better understand how ...
1 week ago Aws.amazon.com
Optimizing Data Lake Usage with Effective Object Management - Data lakes are a popular solution for data storage, and for good reason. Data lakes are flexible and cost effective, as they allow multiple query engines and many object formats without the need to manage resources like disks, CPUs, and memory. In a ...
8 months ago Imperva.com
Splunk Patches High-Severity Vulnerabilities in Enterprise Product - Splunk on Monday announced patches for 16 vulnerabilities in Splunk Enterprise and Cloud Platform, including six high-severity bugs. Three of the high-severity issues are remote code execution flaws that require authentication for successful ...
3 months ago Securityweek.com
Splunk Patches High-Severity Vulnerabilities in Enterprise Product - Splunk on Monday announced patches for 16 vulnerabilities in Splunk Enterprise and Cloud Platform, including six high-severity bugs. Three of the high-severity issues are remote code execution flaws that require authentication for successful ...
3 months ago Packetstormsecurity.com
From the SIEM to the Lake: Bridging the Gap for Splunk Customers Post-Acquisition - The smoke has cleared on Cisco's largest acquisition ever: that of Splunk for $28 billion in September. This acquisition has added a new layer of uncertainty for users, many of which were already wondering what the future holds for threat detection ...
7 months ago Cyberdefensemagazine.com
30 Best Cyber Security Search Engines - In recent years, several search engines have been developed that are primarily focused on cyber security. In today's era, having all the necessary resources and search tools related to cyber security is crucial to staying protected against emerging ...
3 months ago Cybersecuritynews.com
New infosec products of the week: December 8, 2023 - Here's a look at the most interesting products from the past week, featuring releases from Atsign, Daon, Global Integrity, Living Security, Panther Labs, Searchlight Cyber, and Varonis. Varonis enhances DSPM capabilities with Azure and AWS support. ...
10 months ago Helpnetsecurity.com
GPT in Slack With React Integration - Understanding GPT. Before delving into the intricacies of GPT Slack React integration, let's grasp the fundamentals of GPT. Developed by OpenAI, GPT is a state-of-the-art language model that utilizes deep learning to generate human-like text based on ...
9 months ago Feeds.dzone.com
CVE-2024-0762 - Potential buffer overflow ...
4 months ago
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
10 months ago Esecurityplanet.com
CVE-2022-32152 - Splunk Enterprise peers in Splunk Enterprise versions before 9.0 and Splunk Cloud Platform versions before 8.2.2203 did not validate the TLS certificates during Splunk-to-Splunk communications by default. Splunk peer communications configured ...
2 years ago
CVE-2022-32153 - Splunk Enterprise peers in Splunk Enterprise versions before 9.0 and Splunk Cloud Platform versions before 8.2.2203 did not validate the TLS certificates during Splunk-to-Splunk communications by default. Splunk peer communications configured ...
2 years ago
New Microsoft Purview features use AI to help secure and govern all your data - More than 90% of organizations use multiple cloud infrastructures, platforms, and services to run their business, adding complexity to securing all data.1Microsoft Purview can help you secure and govern your entire data estate in this complex and ...
10 months ago Microsoft.com
What Is Security Service Edge: All You Need to Know - Security service edge is a security technology that secures access to assets outside of the corporate network. Security service edge introduces a control that connects to remote users and assets before they connect to each other. All SSE tools borrow ...
4 months ago Esecurityplanet.com
CVE-2022-32151 - The httplib and urllib Python libraries that Splunk shipped with Splunk Enterprise did not validate certificates using the certificate authority (CA) certificate stores by default in Splunk Enterprise versions before 9.0 and Splunk Cloud Platform ...
2 years ago
CVE-2022-29277 - Incorrect pointer checks within the the FwBlockServiceSmm driver can allow arbitrary RAM modifications During review of the FwBlockServiceSmm driver, certain instances of SpiAccessLib could be tricked into writing 0xff to arbitrary system and SMRAM ...
1 year ago
Frustration grows over Google's AI Overviews feature, how to disable - Since Google enabled its AI-powered search feature, many people have tried and failed to disable the often incorrect AI Overviews feature in regular search results. When you're signed into Google and search for general topics like how to install one ...
4 months ago Bleepingcomputer.com
Microsoft Security Copilot improves speed and efficiency for security and IT teams - First announced in March 2023, Microsoft Security Copilot-Microsoft's first generative AI security product-has sparked major interest. With the rapid innovations of Security Copilot, we have taken this solution beyond security operations use cases ...
10 months ago Microsoft.com
Cybersecurity jobs available right now: October 2, 2024 - Help Net Security - As an Applied Cybersecurity Engineer (Center for Securing the Homeland), you will apply interdisciplinary competencies in secure systems architecture and design, security operations, threat actor behavior, risk assessment, and network security to ...
1 week ago Helpnetsecurity.com
Infosec products of the month: May 2024 - The Third-Party Intelligence module combines vendor-specific cyber threat intelligence with cybersecurity posture data from suppliers' tech environments, exposing a critical blind spot for security teams. Synopsys Polaris Assist automates repetitive, ...
4 months ago Helpnetsecurity.com
Traefik Labs updates address rising Kubernetes adoption and API management - Traefik Labs has unveiled product updates that address the escalating adoption of Kubernetes and the crucial role of API management in modern digital infrastructure. The updates include a Kubernetes-native API gateway, integration of a Web ...
6 months ago Helpnetsecurity.com
Continuous Vulnerability and Exposure Management: Unifying Detection Assessment and Remediation for Elevated IT Security - A typical enterprise Security Operations Center employs a diverse array of security tools to safeguard against cyber threats. This includes Security Information and Event Management for log analysis, firewalls for network traffic control, and ...
7 months ago Cybersecurity-insiders.com
Continuous Vulnerability and Exposure Management: Unifying Detection Assessment and Remediation for Elevated IT Security - A typical enterprise Security Operations Center employs a diverse array of security tools to safeguard against cyber threats. This includes Security Information and Event Management for log analysis, firewalls for network traffic control, and ...
7 months ago Cybersecurity-insiders.com
Continuous Vulnerability and Exposure Management: Unifying Detection Assessment and Remediation for Elevated IT Security - A typical enterprise Security Operations Center employs a diverse array of security tools to safeguard against cyber threats. This includes Security Information and Event Management for log analysis, firewalls for network traffic control, and ...
7 months ago Cybersecurity-insiders.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)