Request a demo

Request a demo

We’re Serious About Security

Panther was founded by a team of security practitioners who understand the immense importance of safeguarding your data. Learn more about how we ensure your data is secure, complete, and available.

LOVED BY THE WORLD’S BEST SECURITY ENGINEERING TEAMS

SOC2 (Type2) Compliant

Panther follows strict policies and procedures that meet all the Trust Services Criteria: security, availability, processing integrity, confidentiality, and privacy.

PCI Compliant

Panther meets the Payment Card Industry standards for credit card processing and encrypted Internet transactions.

ISO27001 Certified

Panther is ISO27001 certified and meets the standards for implementing and managing the Information Security Management System (ISMS) in both design and execution.

Infrastructure

Panther's entire hardware and software foundation is optimized to guarantee reliability and reduce security risk.

cloud

Serverless

Built for scale and fast time to value, Panther runs a completely serverless architecture using best-of-breed solutions like AWS Lambda, ECS Fargate, S3, and DynamoDB to handle massive workloads with zero-hassle administration.

cloud

Serverless

Built for scale and fast time to value, Panther runs a completely serverless architecture using best-of-breed solutions like AWS Lambda, ECS Fargate, S3, and DynamoDB to handle massive workloads with zero-hassle administration.

cloud

Serverless

Built for scale and fast time to value, Panther runs a completely serverless architecture using best-of-breed solutions like AWS Lambda, ECS Fargate, S3, and DynamoDB to handle massive workloads with zero-hassle administration.

cloud

Serverless

Built for scale and fast time to value, Panther runs a completely serverless architecture using best-of-breed solutions like AWS Lambda, ECS Fargate, S3, and DynamoDB to handle massive workloads with zero-hassle administration.

browser

Single-Tenant

By ensuring that each customer’s data is stored in a separate instance, Panther offers better uptime and reliability, leveraging performance and data security based on one instance instead of multiple.

browser

Single-Tenant

By ensuring that each customer’s data is stored in a separate instance, Panther offers better uptime and reliability, leveraging performance and data security based on one instance instead of multiple.

browser

Single-Tenant

By ensuring that each customer’s data is stored in a separate instance, Panther offers better uptime and reliability, leveraging performance and data security based on one instance instead of multiple.

browser

Single-Tenant

By ensuring that each customer’s data is stored in a separate instance, Panther offers better uptime and reliability, leveraging performance and data security based on one instance instead of multiple.

arrow-up

Availability

Panther commits to 99.9% service uptime through our SLA. Read more about our system availability.

arrow-up

Availability

Panther commits to 99.9% service uptime through our SLA. Read more about our system availability.

arrow-up

Availability

Panther commits to 99.9% service uptime through our SLA. Read more about our system availability.

arrow-up

Availability

Panther commits to 99.9% service uptime through our SLA. Read more about our system availability.

Data, Application and IT Security

Panther’s security-first culture puts security and trust at the forefront of every part of our business.

database

Data Security

All Panther data is encrypted with industry-standard cipher suites, whether at rest or in transit. Equally important, data is backed up to S3 continuously to ensure business continuity in the event of a failure.

database

Data Security

All Panther data is encrypted with industry-standard cipher suites, whether at rest or in transit. Equally important, data is backed up to S3 continuously to ensure business continuity in the event of a failure.

database

Data Security

All Panther data is encrypted with industry-standard cipher suites, whether at rest or in transit. Equally important, data is backed up to S3 continuously to ensure business continuity in the event of a failure.

database

Data Security

All Panther data is encrypted with industry-standard cipher suites, whether at rest or in transit. Equally important, data is backed up to S3 continuously to ensure business continuity in the event of a failure.

browser

Application Security

Security is baked into Panther’s application, and maintaining it is critical. Our code is analyzed via static application security testing (SAST) during continuous integration (CI) and post-deployment, and penetration testers regularly audit our application.

browser

Application Security

Security is baked into Panther’s application, and maintaining it is critical. Our code is analyzed via static application security testing (SAST) during continuous integration (CI) and post-deployment, and penetration testers regularly audit our application.

browser

Application Security

Security is baked into Panther’s application, and maintaining it is critical. Our code is analyzed via static application security testing (SAST) during continuous integration (CI) and post-deployment, and penetration testers regularly audit our application.

browser

Application Security

Security is baked into Panther’s application, and maintaining it is critical. Our code is analyzed via static application security testing (SAST) during continuous integration (CI) and post-deployment, and penetration testers regularly audit our application.

cog

IT Security

All of Panther’s laptops leverage full-disk encryption — and are managed, upgraded, and patched with best-in-class mobile device management (MDM) solution. Our hardware is protected by an endpoint security agent that provides NGAV and EDR/EPP capabilities, with 24/7/365 monitoring.

cog

IT Security

All of Panther’s laptops leverage full-disk encryption — and are managed, upgraded, and patched with best-in-class mobile device management (MDM) solution. Our hardware is protected by an endpoint security agent that provides NGAV and EDR/EPP capabilities, with 24/7/365 monitoring.

cog

IT Security

All of Panther’s laptops leverage full-disk encryption — and are managed, upgraded, and patched with best-in-class mobile device management (MDM) solution. Our hardware is protected by an endpoint security agent that provides NGAV and EDR/EPP capabilities, with 24/7/365 monitoring.

cog

IT Security

All of Panther’s laptops leverage full-disk encryption — and are managed, upgraded, and patched with best-in-class mobile device management (MDM) solution. Our hardware is protected by an endpoint security agent that provides NGAV and EDR/EPP capabilities, with 24/7/365 monitoring.

Identity & Access Management

IAM layers over Panther’s entire business, as identity validation and policy alignment is critical for every aspect of the company.

grid-2

Internal Applications

Our identity provider (IdP) governs access to internal applications, which requires multi-factor authentication.

grid-2

Internal Applications

Our identity provider (IdP) governs access to internal applications, which requires multi-factor authentication.

grid-2

Internal Applications

Our identity provider (IdP) governs access to internal applications, which requires multi-factor authentication.

grid-2

Internal Applications

Our identity provider (IdP) governs access to internal applications, which requires multi-factor authentication.

cloud

Cloud Resources

Access to cloud resources is managed through AWS IAM. Panther strictly follows the model of least privilege, only assigning access to the resources and services necessary. We also leverage MFA comprehensively.

cloud

Cloud Resources

Access to cloud resources is managed through AWS IAM. Panther strictly follows the model of least privilege, only assigning access to the resources and services necessary. We also leverage MFA comprehensively.

cloud

Cloud Resources

Access to cloud resources is managed through AWS IAM. Panther strictly follows the model of least privilege, only assigning access to the resources and services necessary. We also leverage MFA comprehensively.

cloud

Cloud Resources

Access to cloud resources is managed through AWS IAM. Panther strictly follows the model of least privilege, only assigning access to the resources and services necessary. We also leverage MFA comprehensively.

Vendor Management

Every vendor relationship represents a security risk, so third party risk management plays a crucial role in Panther’s security posture.

search

Review

All vendors we leverage go through a review process in which their security controls are reviewed extensively.

search

Review

All vendors we leverage go through a review process in which their security controls are reviewed extensively.

search

Review

All vendors we leverage go through a review process in which their security controls are reviewed extensively.

search

Review

All vendors we leverage go through a review process in which their security controls are reviewed extensively.

circle-check

Authorized Third Party Vendors

We also maintain a list of subprocessors and notify our customers of any changes.

circle-check

Authorized Third Party Vendors

We also maintain a list of subprocessors and notify our customers of any changes.

circle-check

Authorized Third Party Vendors

We also maintain a list of subprocessors and notify our customers of any changes.

circle-check

Authorized Third Party Vendors

We also maintain a list of subprocessors and notify our customers of any changes.

Let’s build together

Request a Demo

Let’s build together

Request a Demo

Let’s build together

Request a Demo

Let’s build together

Request a Demo

Product

Solutions

Integrations

Pricing

Detection Coverage

Resources

Case Studies

Blog

Podcasts

Webinars

Solution Briefs

Events

Workshops

Support

Documentation

Knowledge Base

Release Notes

Status

Community

Company

About Us

Careers

Partners

News

Trust

© 2024 Panther Labs

|

Terms of Service

Privacy Policy

|

Sitemap

Product
Resources
Support
Company
Product

Solutions

Integrations

Pricing

Detection Coverage

Resources

Case Studies

Blog

Podcasts

Webinars

Solution Briefs

Events

Workshops

Support

Documentation

Knowledge Base

Release Notes

Status

Community

Company

About Us

Careers

Partners

News

Trust