Announcing Phantom 2.1 General Availability

Team Phantom is excited to announce the General Availability of our latest Phantom platform release, version 2.1!   Here is a sample of what you'll find. Updated Dashboard Metrics and Executive Reporting The main dashboard of the Phantom platform has been re-imagined and now includes more automation and usage metrics. From the platform dashboard, you … Continue reading Announcing Phantom 2.1 General Availability

Phantom and the U.S. Government’s Digital Transformation

The focus of next week’s GITEC Summit is described as: The continued transition and transformation surrounding the development, implementation, management, and use of information technology for mission-critical functions. Government transformation is also a theme that resonates here at Phantom.  Many are surprised to learn that government transformation was actually the impetus for Phantom. Before I … Continue reading Phantom and the U.S. Government’s Digital Transformation

The Automation Engine

This entry is part of a series that outlines key criteria to consider when evaluating Security Automation & Orchestration (SA&O) platforms. This entry focuses on the automation engine, one of eight core components of an SA&O platform. Like the orchestrator component we explored in the first entry of this series, the automation engine component is another critical area when evaluating an SA&O platform.

What Does Audio Production Have in Common With Security?

Automation has become so relevant to the mainstream; in our cars, our homes, and even our music. Allow me to digress a bit. The DAW (Digital Audio Workstation) is a mainstay in modern music production. In short, it’s HW or SW that musicians use to record, edit, and produce audio. If you’ve used tools like GarageBand, then you’ve experienced music production capabilities like that of a DAW.

My Journey to Security Automation & Orchestration

I’ve been involved in information technology and the information security space for over twenty years and have seen an industry that’s been constantly trying to solve common IT security threats with a plethora of software and hardware tools. In the early days, antivirus appeared to be the right solution to the problem. As the sophistication of attacks … Continue reading My Journey to Security Automation & Orchestration

Top Three Criteria of an Orchestrator

This entry is the first in a series that outline key criteria to consider when evaluating Security Automation & Orchestration (SA&O) platforms. Here at Phantom, we define security orchestration as “the machine-based coordination of a series of interdependent security actions across a complex infrastructure.” Considering this definition, it’s easy to derive that one of the … Continue reading Top Three Criteria of an Orchestrator