Announcing Phantom 3.0: Improved Efficiency and Collaboration, Fully-Integrated Case Management, Mission Guidance™, and More!

Team Phantom is excited to announce that version 3.0 of the Phantom Platform is now Generally Available (GA)!   This release significantly improves an analyst's experience with the platform, while also helping to improve key Security Operations Center (SOC) metrics like Mean Time to Resolution (MTTR). With hundreds of enhancements and upgrades, you'll notice improvements that … Continue reading Announcing Phantom 3.0: Improved Efficiency and Collaboration, Fully-Integrated Case Management, Mission Guidance™, and More!

A Day in the Life of a Phantom Security Solutions Architect

I recently sat down with Frank Scholl, a Phantom Security Solutions Architect. I wanted to find out more about what a Security Solutions Architect does on a day-to-day basis and how this role enables Phantom customers to be successful with their Security Automation and Orchestration (SA&O) efforts. Frank, describe your role here at Phantom. What … Continue reading A Day in the Life of a Phantom Security Solutions Architect

$90 Billion on Cyber Security and it’s not Enough?

It’s the security circle of life. New threats breed new security technologies and services. Security budgets continue to outpace the prior year’s. Gartner research estimates security spending will exceed $90 Billion in 2017. Expenditures have never been greater, and the rate of growth isn’t slowing down. Despite devoting more of our resources – both technology … Continue reading $90 Billion on Cyber Security and it’s not Enough?

Playbook: Escalate Whaling and Other Attacks Targeting Executives

Whaling is a specific kind of spear phishing attack that's targeted at your organization's high-profile business executives, top leaders, and other roles that have access to highly-sensitive information. The goal of this type of attack is to deceive a high-value target into divulging confidential company information. The attacker will usually attempt to obtain passwords, which they can then use to gain access to more information.

Tech Session: Hear From a Community App Developer

In Security Automation & Orchestration (SA&O), connectors to different technologies that already exist in customer environments are critical to the success of a SA&O platform deployment. When talking to customers and partners, I often find myself saying, “An orchestration platform is useless if it doesn’t orchestrate across all necessary technologies.” That is why connectors are … Continue reading Tech Session: Hear From a Community App Developer