Follow Phantom on their other social channels!
About Us
Company Size:
11-50 employees
Company Type:
Palo Alto, CA
Phantom is the 1st purpose-built, community-powered security automation & orchestration platform that integrates existing products to provide a layer of “connective tissue” between them. Phantom executes digital “Playbooks” to achieve in seconds what may take hours to accomplish with the ...
Read more
Promoted Content
Automation & Orchestration Whitepaper
Will Automation Take Away All Our Jobs? January 19, 2017 / CP Morey
It’s a theme that seems common in TED Talks lately, and one we’ve even covered before on the blog. Though this particular talk sheds light on an angle which I hadn’t considered before watching David’s talk.“The number of bank tellers has DOUBLED since the ATM was invented.”It seems so counterintuitive, until you consider how bank tellers have evolved their role to include other services ultimately becoming more valuable to their employers and teammates along the way.Th ...
Automation and Orchestration: Were Do We Go From Here?
Join Founder & CEO, Oliver Friedrichs, to learn more about the Phantom's vision and strategic direction -
Enrich Security Events with External Threat Intelligence
Today’s post continues an ongoing series on Phantom playbooks; which the platform uses to automate and orchestrate your security operations plan. This example examines one of the sample playbooks included with the Phantom 2.0 platform release.  Register for the upcoming webinar on Friday, October 21st at 12 PM EDT. Learn all about Phantom V2.0 and their extended coverage. The Phantom platform can automatically gather threat intelligence for you and enrich inbound security events. With t ...
Automatically Secure Compromised Accounts
Today’s post continues an ongoing series on Playbooks; which Phantom uses to automate and orchestrate your security operations plan. Flashpoint gives their threat intelligence subscribers the ability to see compromised user names, passwords, email addresses, and other credentials. This information can be ingested daily and distributed over email. When an analyst receives an email from Flashpoint, the first step is to check the information against the organization’s known users to ident ...
Trigger a Playbook with Your iPhone
Today’s post continues an ongoing series on Playbooks, which Phantom uses to automate and orchestrate your security operations plan. Last week, we featured a Playbook that automates malware analysis triggered by an email alert from FireEye. It’s a common scenario, and one with a demonstrable ROI – many companies say the investigation process takes upwards of 30 minutes manually, when automation completes the work in just seconds. Another theme we’ve explored on the blog relates ...
Defining Security Automation & Orchestration
We’re starting a series on the blog to explore Security Automation & Orchestration as a new technology. Comments will be enabled on this series as we’re hoping to see participation from the community. When considering the series, we were reminded of the story about the blind men and the elephant. In this fable, each man touches the elephant and describes his experience. They all touch a different part, but only one part, such as the side or the tusk. When the men compare notes, they a ...

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play

Support Cybrary

Donate Here to Get This Month's Donor Badge

Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?