A few lucky attendees at RSAC took home one of our customer commissioned Phantom LEGO SOC kits thanks to a casual comment by Sourabh, our CTO. He remarked how Phantom’s open and extensible architecture works like LEGO for the SOC since you can assemble our playbooks, apps, and actions to support just about any use … Continue reading More SOC Lessons from LEGO
We are excited to announce another great opportunity to help our growing community automate more security workflows using the Phantom platform. We are calling these collaborative online sessions Phantom Playbook Jam Sessions.
If you're an existing member of the Phantom Community, you may have noticed that we recently announced Phantom v2.1 Early Access (EA) availability. For more information on the release, you can access the release notes as well as the download from the Phantom Community page. We felt it was appropriate to dedicate this week’s Tech Session to … Continue reading Phantom Tech Session: v2.1 Early Access
We started a new series on the blog recently, designed to offer experience-based best practices for approaching SOC Automation. While most understand the value of automation broadly, developing practical use cases is the first step in realizing the benefits of this emerging technology. While the possibilities for automation are nearly endless, many start the journey with … Continue reading What Are You Willing to Automate?
In case you missed the 2017 RSA conference this year, here are a couple of highlights from the Phantom perspective.
This should be an easy challenge for all of you! Take the playbooks you are already using, submit them, and give yourself a chance to win some cash. For this round we will be offering a $1,000 prize to the winner(s). Community contributors who make a submission also get a shot at making it into our Phantom Community Hall of Fame.
So what is a use case? What are the sections? I'm glad you asked. Here is my security version of a use case definition document...