scanner_dev Profile Banner
Scanner Profile
Scanner

@scanner_dev

Followers
71
Following
500
Media
8
Statuses
36

World’s Fastest & Most Scalable Security Data Lake

San Francisco
Joined August 2022
Don't wanna be here? Send us removal request.
@scanner_dev
Scanner
5 months
Legacy SIEMs: all noise, no signal. Scanner: built for teams who actually want to fix things. - 1,000s of useless alerts? Nope. - Context first. Triage in seconds. That’s why @tryramp, @getpostman & @Lemonade_Inc ditched the bloat. 🔗
scanner.dev
Security teams at modern tech companies are expected to move fast and most importantly stay secure while doing it. As infrastructure scales and complexity increases, alert volume follows suit. It’s...
0
0
1
@scanner_dev
Scanner
5 months
0
0
0
@scanner_dev
Scanner
5 months
FloQast was stuck with short log retention, rising SIEM costs, and way too much friction - so they made a switch. Now they analyze 100TB+ in seconds, keep 12+ months of EDR data, and query straight from S3, no handoff and no headaches. Read about it
scanner.dev
1
1
2
@scanner_dev
Scanner
6 months
Resetting MFA at 3AM? Logging in from two continents in an hour? If it's in your Okta logs, it's worth investigating. New guide: How to build a real detection pipeline from Okta → Grove → Substation → Scanner. Here is the full guide: https://t.co/dtpjYQAFqE
Tweet card summary image
scanner.dev
This knowledge base article provides a step-by-step guide to monitoring Okta System Logs for threat detection. Learn how to collect logs via API, enrich them using Substation, and analyze them with...
0
0
0
@scanner_dev
Scanner
6 months
Big news: https://t.co/0pFz8MD6cW is hitting the stage at @BlueTeamCon 2025 Cliff’s heading to Chicago this Sept to talk AI + SecOps — specifically, how modern security teams can boost productivity without burning out. Let’s connect IRL: 🔗
Tweet card summary image
blueteamcon.com
Learn more about our BTC 2025 talk: AI as the SOC Sidekick: Streamlining Security Without Stepping Over Humans.
0
1
3
@scanner_dev
Scanner
7 months
Awesome product, @cotoolai! And thanks for the shoutout at 0:34! 😀 Teamwork makes the dream work
@ycombinator
Y Combinator
7 months
Cotool (@cotoolai) is an agentic security platform that eliminates manual and repetitive work for security teams. It helps teams investigate faster, automates common tasks, and documents work in seconds. https://t.co/Bahz5TuDSz Congrats on the launch, @maxpollard415,
3
1
13
@scanner_dev
Scanner
8 months
Changelog: You can now transform your logs as they flow into your Scanner indexes. - Add normalized Elastic Common Schema (ECS) fields to popular log source types. - Auto-parse JSON strings and "key=value" pairs. - And more... Transformers - more than meets the eye.
1
1
3
@CliftonCrosland
Cliff Crosland
10 months
anyone using data lakes for their logs? doing an info session next week about good methods we're seeing these days, particularly what detection & response teams are doing. come share how you do things! https://t.co/fGyf18HLeV
0
1
1
@scanner_dev
Scanner
10 months
New Feature Announcement: 🔍Visual Query Builder – Build & switch between visual & text queries seamlessly. Auto-complete & easy visualization included! 🛡️ MITRE-Tagged Detection Rules – Organize & analyze rules with built-in & custom tags. Learn more:
1
0
3
@scanner_dev
Scanner
11 months
Join our hands-on webinar Jan 30 to learn how to streamline and deploy security detections with Scanner's schemaless log search index in your S3 bucket. UI & code-first approaches, GitHub integration—no complex schemas or heavy engineering. https://t.co/Ss78VM9Jkb
0
0
0
@scanner_dev
Scanner
11 months
Announcing a major expansion of Scanner's detection capabilities with ready-to-use rules across 12 critical log sources bringing our total to 214 detection rules, covering 11 MITRE ATT&CK tactics and 45 techniques.
0
0
0
@scanner_dev
Scanner
11 months
Explore the key benefits of Security Data Lakes, including advanced use cases for threat hunting, streamlined detection and response workflows, and their role in GenAI-powered analysis. https://t.co/DCsfOkOfNw
0
0
0
@scanner_dev
Scanner
1 year
Struggling with Datadog log costs? Security teams face challenges balancing Standard Logs, Flex Logs & Cloud SIEM. Learn how @scanner_dev helps optimize performance and detections, cuts costs, and enhances @datadoghq's power & efficiency. https://t.co/2bBOZBP3Jo
0
0
0
@scanner_dev
Scanner
1 year
The @scanner_dev Playground is live! Dive into an interactive demo with AWS CloudTrail logs to experience a full threat investigation scenario. Sign up now and start exploring at https://t.co/k4QMYkHpkR.
scanner.dev
We’re excited to announce that the Scanner Playground environment is now available for users to explore. The Playground is a hands-on, interactive way to experience Scanner, walking users through a...
0
0
0
@scanner_dev
Scanner
1 year
Congrats to the Scanner team for launching Detection Rules As Code! Our users can now manage detection rules directly in their own GitHub repos, improving collaboration, change management, continuous delivery, and streamlining threat detection development https://t.co/rpFaqN36oR
0
0
1
@scanner_dev
Scanner
1 year
Announcing the release of Scanner for @ProjectJupyter, allowing users to analyze & visualize years of logs using Jupyter notebooks via the Scanner Python SDK for Response-as-Code and Advanced threat hunting on historical logs https://t.co/9B0Mtkmkfk
0
0
0
@scanner_dev
Scanner
2 years
Our co-founders @CliftonCrosland and Steven Wu kicked off our first day at #RSAC with so many great conversations with security leaders from all over the globe that came to learn more about @scanner_dev. Come visit us at the Early Stage Expo tomorrow or Thursday. See you there!
0
0
3
@scanner_dev
Scanner
2 years
Announcing Scanner for Splunk which makes it easy to leverage logs in S3 for advanced threat hunting and detection - all while staying entirely within the Splunk UI. Teams can now gain visibility into historical & high-volume logs while saving up to 80-90%
0
0
0
@scanner_dev
Scanner
2 years
Introducing our new Threat Detection Rules to help alert teams whenever there are misconfigs, indicators of compromise, and various kinds of threat activity. Teams can even chain detections together w/ Jupyter notebooks to investigate advanced threats
Tweet card summary image
scanner.dev
The amount of cryptocurrency stolen or mined via server hijacking annually is pretty staggering. It’s estimated that almost 1/20th of North Korea’s economy each year is the illegal acquisition of...
0
0
0