"Your data may have been exposed". The reason you hear this statement is to meet compliance with the Health Insurance Portability and Accountability Act (HIPAA). This law is a critical aspect of protecting sensitive patient information and identifia...
Audit logs are a critical component of enterprise systems, providing a detailed record of activities within an information system. They serve as the backbone for security monitoring, compliance, and operational analysis, making them indispensable for...
Wow, what a year! As I reflect on 2023, I’m so proud of what the team at Pangea has accomplished. Looking back at all of the product launches, awards, and events that filled our year, I can't help but feel gratitude for our incredible team, and for t...
We started Pangea in "interesting times" (October 2021), amidst COVID and all the anxiety around work from home, mental stress issues, social distancing, etc. Since then, there have been tremendous shifts in the technology industry. In just the last ...
✍ This article was written by author Ian Forrest In a previous post, I wrote about audit logs and the compliance frameworks which rely on them. What I didn’t cover is what you need to include in your audit logs to make them useful. After many years...
✍ This article was written by author Ian Forrest In my previous blog post, I wrote about how one might go about building a Tamperproof Logging Implementation. A good-sized chunk of that post was about how one could use Merkle Trees to verify the in...
SOC 2 Type 2
HIPAA Compliant
ISO/IEC 27001
ISO/IEC 27701
Use Cases
Case Studies
Services
Developers
Explore
Connect
Service Status
Company
636 Ramona St, Palo Alto, CA 94301
Pangea is a Sample Vendor for Composable Security APIs in the 2024 App Sec Hype Cycle™ report