Panther
Connect the Praetorian Guard Platform with Panther's cloud-native SIEM for consolidated threat detection.
Overview
The Panther integration connects the Praetorian Guard Platform (PGP) with Panther's cloud-native SIEM platform. This integration enables security teams to import security alerts, detection rule findings, and log analysis results from Panther into PGP, providing a consolidated view of threat detection data alongside other attack surface information.
Panther is a modern SIEM built for cloud-scale security operations, offering real-time detection, automated alert triage, and deep log analysis across cloud and on-premise environments. By integrating Panther with PGP, organizations can correlate SIEM-generated alerts with vulnerability data and asset inventories from other security tools, creating a more comprehensive security posture view.
The integration operates in a read-only capacity, retrieving alert and detection data from Panther without modifying any rules, alerts, or configurations within your Panther deployment.
What the Integration Does
The Panther integration performs the following operations during each sync cycle:
Validates credentials — Authenticates with the Panther API using the provided API token and verifies connectivity to the Panther instance.
Imports security alerts — Retrieves alerts generated by Panther's detection rules, including severity, status, alert context, and associated log events.
Imports detection metadata — Retrieves information about the detection rules that triggered alerts, providing context about the types of threats being identified.
Maps findings to assets — Associates Panther alerts with the relevant assets in PGP based on source identifiers such as IP addresses, hostnames, and cloud resource ARNs.
All operations are strictly read-only. PGP does not create, modify, resolve, or delete any alerts, rules, or configurations in Panther.
Prerequisites
Before configuring the Panther integration, ensure you have:
Panther account with an active subscription
API token with read permissions generated from the Panther console
Panther instance URL — The base URL of your Panther deployment
Generating a Panther API Token
Log in to your Panther console.
Navigate to Settings > API Tokens.
Click Create API Token.
Provide a descriptive name (e.g., "PGP Integration").
Assign the token read-only permissions for alerts and detections.
Click Create and copy the generated token — it will not be shown again.
Setup
To configure the Panther integration in PGP:
Navigate to the Integrations page in PGP.
Locate Panther and click Connect.
Enter the required credentials in the configuration form.
Click Save to activate the integration.
Configuration Fields
What Data Is Synced
Assets
PGP creates asset records for resources referenced in Panther alerts, including:
Risks
PGP creates risk records for security alerts and detection findings from Panther:
API Endpoints Used
The integration uses the Panther GraphQL and REST APIs. All requests are authenticated using the Authorization: Bearer <api_token> header.
Troubleshooting
Security and Data Handling
Read-only access — The integration only reads alert and detection data from Panther. It does not create, modify, resolve, or delete any alerts, detection rules, log sources, or configurations.
Credential storage — The API token is stored encrypted within PGP and is never exposed in logs or the user interface after initial configuration.
Data transfer — All communication between PGP and Panther occurs over HTTPS using TLS encryption.
Minimal data retrieval — The integration retrieves only the alert metadata and context needed to create meaningful asset and risk records in PGP, avoiding unnecessary transfer of raw log data.