This article is a part of a series describing key features of the Phantom Security Automation and Orchestration platform and how they work to improve the analyst experience and drive greater efficiency within the SOC. Introduction Analysts are easily overwhelmed in a SOC environment that uses many disparate tools. In fact, some SOCs have over … Continue reading Mission Control: On-Demand Action Execution
When analysts are working to understand, investigate, decide, and act on a security event, they need a view where all collected evidence for the event is easily accessible. The artifact table in Mission Control provides this view for Phantom users. The artifacts table makes data extremely quick and easy to access and operate on for an analyst.
Team Phantom is excited to announce that version 3.0 of the Phantom Platform is now Generally Available (GA)! This release significantly improves an analyst's experience with the platform, while also helping to improve key Security Operations Center (SOC) metrics like Mean Time to Resolution (MTTR). With hundreds of enhancements and upgrades, you'll notice improvements that … Continue reading Announcing Phantom 3.0: Improved Efficiency and Collaboration, Fully-Integrated Case Management, Mission Guidance™, and More!
This month we would like to congratulate Drew Snellgrove with GE as the Phantom Community Contributor of the Month for July 2017. Drew contributed significant amounts of valuable feedback during a recent beta program. His inputs have helped the Phantom team build a quality platform that every community member will benefit from.
I recently sat down with Frank Scholl, a Phantom Security Solutions Architect. I wanted to find out more about what a Security Solutions Architect does on a day-to-day basis and how this role enables Phantom customers to be successful with their Security Automation and Orchestration (SA&O) efforts. Frank, describe your role here at Phantom. What … Continue reading A Day in the Life of a Phantom Security Solutions Architect
It’s the security circle of life. New threats breed new security technologies and services. Security budgets continue to outpace the prior year’s. Gartner research estimates security spending will exceed $90 Billion in 2017. Expenditures have never been greater, and the rate of growth isn’t slowing down. Despite devoting more of our resources – both technology … Continue reading $90 Billion on Cyber Security and it’s not Enough?
Whaling is a specific kind of spear phishing attack that's targeted at your organization's high-profile business executives, top leaders, and other roles that have access to highly-sensitive information. The goal of this type of attack is to deceive a high-value target into divulging confidential company information. The attacker will usually attempt to obtain passwords, which they can then use to gain access to more information.