We have another exciting partner and community playbook lined up for the Tech Session this week! We are featuring a new Phantom app that integrates with PhishMe’s Phishing Defense Cloud. We talk often about the depth, or completeness, of Phantom apps. The PhishMe app is no exception, providing seven actions that span ingestion as well as … Continue reading PhishMe Joins the Next Phantom Tech Session
Team Phantom is excited to announce the General Availability of our latest Phantom platform release, version 2.1! Here is a sample of what you'll find. Updated Dashboard Metrics and Executive Reporting The main dashboard of the Phantom platform has been re-imagined and now includes more automation and usage metrics. From the platform dashboard, you … Continue reading Announcing Phantom 2.1 General Availability
The focus of next week’s GITEC Summit is described as: The continued transition and transformation surrounding the development, implementation, management, and use of information technology for mission-critical functions. Government transformation is also a theme that resonates here at Phantom. Many are surprised to learn that government transformation was actually the impetus for Phantom. Before I … Continue reading Phantom and the U.S. Government’s Digital Transformation
This entry is part of a series that outlines key criteria to consider when evaluating Security Automation & Orchestration (SA&O) platforms. This entry focuses on the automation engine, one of eight core components of an SA&O platform. Like the orchestrator component we explored in the first entry of this series, the automation engine component is another critical area when evaluating an SA&O platform.
Automation has become so relevant to the mainstream; in our cars, our homes, and even our music. Allow me to digress a bit. The DAW (Digital Audio Workstation) is a mainstay in modern music production. In short, it’s HW or SW that musicians use to record, edit, and produce audio. If you’ve used tools like GarageBand, then you’ve experienced music production capabilities like that of a DAW.
I’ve been involved in information technology and the information security space for over twenty years and have seen an industry that’s been constantly trying to solve common IT security threats with a plethora of software and hardware tools. In the early days, antivirus appeared to be the right solution to the problem. As the sophistication of attacks … Continue reading My Journey to Security Automation & Orchestration
This entry is the first in a series that outline key criteria to consider when evaluating Security Automation & Orchestration (SA&O) platforms. Here at Phantom, we define security orchestration as “the machine-based coordination of a series of interdependent security actions across a complex infrastructure.” Considering this definition, it’s easy to derive that one of the … Continue reading Top Three Criteria of an Orchestrator