Phantom App & Playbook Challenge – Round 2

If one thing sets us apart, it’s our open community approach to Security Automation & Orchestration. We think it’s the only way to build a platform, and we’re not alone – judging from the support in the community. Many thanks to all who are contributing! We’re doing our part to contribute with our free Phantom Community Edition, App Store, GitHub repo for Playbooks, and the new Community Portal, as well as sponsoring events like Coding for Security Pros at Black Hat. The Phantom App & Playbook Challenge has also been a great way support the community, and we are excited to announce Round 2 of the challenge today! Much like Round 1 which finished in May, Round 2 of the Phantom App & Playbook Challenge is a great opportunity to help protect your organization, showcase your skills, share with the community, and maybe win a $2,500 prize!

Series: Defining Security Automation & Orchestration – Automatic Action & Remediation

We started a series on the blog in May to explore Security Automation & Orchestration as a new technology.  We enabled comments on the series as we are hoping to see participation from the community. In that first post, we shared a list of key characteristics for Security Automation & Orchestration.  Providing “Automatic Action & … Continue reading Series: Defining Security Automation & Orchestration – Automatic Action & Remediation

Automating Ethics

I joined Phantom as few weeks ago to lead our partner program.  A number of factors attracted me to automation and the opportunity at Phantom. When it comes to automation, saving time is clearly a big driver.  Customers are routinely taking manual, labor intensive processes that can take hours and reducing them to automation tasks … Continue reading Automating Ethics

Series: Defining Security Automation & Orchestration – Automatic Ingestion & Enrichment of Data

We started a series on the blog in May to explore Security Automation & Orchestration as a new technology.  We enabled comments on the series as we are hoping to see participation from the community. In that first post, we shared a list of key characteristics for Security Automation & Orchestration.  Providing “Automatic Ingestion & … Continue reading Series: Defining Security Automation & Orchestration – Automatic Ingestion & Enrichment of Data

Series: Defining Security Automation & Orchestration – Decision Making Support

We started a series on the blog in May to explore Security Automation & Orchestration as a new technology.  We enabled comments on the series as we are hoping to see participation from the community. In that first post, we shared a list of key characteristics for Security Automation & Orchestration.  Providing “Decision Making Support” … Continue reading Series: Defining Security Automation & Orchestration – Decision Making Support