Pricing

Get Started Today

Open source

Community

End-to-End Visibility for Modern Security Teams

Deploy Panther

Enterprise

Team

Collaboration and Advanced Features for Teams

Get Pricing
Pro

Security at Scale with Max Performance

Get Pricing

Core


Real-Time Log Analysis

Real-Time Cloud Security

Real-Time Alerting

Automatic Remediation

200+ Built-in Detections

Data Analytics

Data Inputs


AWS S3

AWS SQS & SNS

Google Cloud Platform

SaaS Logs
5 Sources
Unlimited

Analytics and Investigations


Data Explorer

Indicator Search

Alerting


Alert Thresholds

Alert Summaries

Security and Compliance


Multi-Factor Authentication

Role-Based Access Control

SAML SSO (Okta, OneLogin, etc.)

Data Storage


Amazon S3

Parquet Conversion

Snowflake

Team Management


Users

Roles

Deployment


Self-hosted

Single-tenant SaaS

Customer Success


Community Slack

Detections Service Desk

Shared Slack Channel

SLA
M-F, 9x5
24x7

Open source

Community

End-to-End Visibility for Modern Security Teams

Core


Real-Time Log Analysis

Real-Time Cloud Security

Real-Time Alerting

Automatic Remediation

200+ Built-in Detections

Data Inputs


AWS S3

AWS SQS & SNS

Google Cloud Platform

Analytics and Investigations


Alerting


Alert Thresholds

Security and Compliance


Multi-Factor Authentication

Data Storage


Amazon S3

Team Management


Users

Roles

Deployment


Self-hosted

Customer Success


Community Slack

Enterprise

Team

Collaboration and Advanced Features for Teams

All Open Source features

Core


Data Analytics

Data Inputs


SaaS Logs

Analytics and Investigations


Data Explorer

Indicator Search

Alerting


Alert Summaries

Security and Compliance


Role-Based Access Control

SAML SSO (Okta, OneLogin, etc.)

Data Storage


Parquet Conversion

Deployment


Single-tenant SaaS

Customer Success


Detections Service Desk

SLA

Enterprise

Pro

Security at Scale with Max Performance

All Enterprise Cloud-Prem features

Data Inputs


SaaS Logs

Data Storage


Snowflake

Customer Success


Shared Slack Channel

SLA

Frequently Asked Questions

Looking for new cloud security solutions? Let us tell you about Panther.

What is Panther and how does it work?
Panther is an open source, cloud-native SIEM designed for threat detection, cloud security, and data analysis.
What are use cases for Panther?
Panther is a modern alternative to traditional SIEMs and the next step for security teams. Following are some of the common use-cases of Panther:

  • Detect Unauthorized Access: Analyze host-based logs to identify unauthorized access into systems that could indicate a breach
  • Power Your Investigations: Join data from various sources to determine if a potential compromise has occurred.
  • Threat Hunting: Quickly search all of your logs for matches against indicators of compromise by utilizing Panther’s standardized data fields
  • Achieve Compliance: Use built-in rules and policies as controls for SOC/PCI/HIPAA compliance
  • Secure Cloud Resources: Automatically fix misconfigurations that can cause extreme damage
What is Panther’s mission and who are the people behind it?
We understand that security teams struggle to keep up with scale, hiring, and overhead which is why we built Panther. Our mission is to build the most complete, reliable, and transparent security platform to help companies of all sizes protect against cybersecurity threats.

We are a team of security engineers who have spent years empowering detection for large companies such as Airbnb, Amazon, Riverbed, and more. Panther was founded by the core architect of StreamAlert, a cloud-native, log analysis solution. You can learn more about the team behind Panther here.

How does Panther compare to traditional SIEM and cloud security tools?

Panther is a complete cloud security and detection platform. At Panther, we believe the future of SIEM is cloud-based and engineering-focused. Here’s a quick snapshot to show how Panther compares against traditional SIEM and cloud security platforms.

Does Panther come with built-in rules?

Yes! Panther includes 200+ rules and policies to support standards such as CIS and others. Learn more in our docs about pre-built rules and policies.

Can Panther analyze network traffic?

Panther supports logs to analyze network traffic for suspicious activity. These are some of the popular log types that Panther supports currently:

Cloud

  • AWS VPC Flow Logs
  • AWS Application Load Balancer Logs 
  • AWS S3 Server Access 

Network

  • Suricata
  • Zeek/Bro
  • Palo Alto Networks Firewall

Host

  • Osquery

Application

  • Nginx

We are continuously adding new log types. To check out the complete, updated list of log types, visit Supported Logs on Panther Documentation.

Where can we send alerts?

Panther lets you dispatch alerts to your team and integrates into existing workflows using the following destinations. These are some of the popular destinations supported by Panther currently:

  • Ticketing
  • JIRA
  • Github
  • Asana

Messaging

  • Slack
  • MS Teams

Incident Management

  • Opsgenie
  • Pagerduty

Automation

  • Amazon SNS
  • Amazon SQS
Is Panther Open Source?
Yes! Check out our repository on Github.
Where does my data go?
Your data always stays within your own AWS account, encrypted.

Run Panther

Learn how to secure your cloud, network, applications, and endpoints with Panther Enterprise.