Pangea
p/pangea-3
The world of security in a simple set of developer APIs
Luke Stahl

Secure Audit Log — Log important application events with a single line of code

Featured
20
When your developer captures app activity in the Pangea Secure Audit Log API, you’ll have full confidence that your log data was cryptographically secured with verifiable signatures, and strict access controls. It’s tamper-proof and easy for developers to add.
Replies
Best
Luke Stahl
Hunter
📌
Hello Product Hunters! We’ve made significant strides with our products since our initial beta launch and excited to share our Secure Audit Log service today. 29 million software developers by 2024. Every one of them should be worried about security — but how many can actually write secure apps? In 2022 insecure software cost the U.S. business $2.41 trillion. Don’t let that be your company. That’s where Pangea comes in. We have a secure functionality embeddable through APIs like Secure Audit Log. With our Secure Audit Log you’ll get Audit logging, search, and tamperproofing infrastructure fully managed by Pangea. Simply log important events with a single line of code. Pangea offers security services which can be used seamlessly with Audit Log such as Authentication, Authorization, Secrets Management, Entitlement and Licensing. Other security functions include PII Redaction, Embargo. We’ve also partnered with industry leaders CrowdStrike, ReversingLabs, DomainTools, and others to offer their intelligence services in a pay-as-you-go model through our APIs for developers. We’d love to hear your feedback as you build.
Oliver Friedrichs
Thanks for checking us out! The Secure Audit Log service really has some great features that make adding logging to your app easy, while providing industrial grade security: - Fully managed cloud hosted, so no deployment or infra on your end. - Tamperproof and immutable by design with cryptographic proofs to verify logs are unaltered. - Multi-tenant support out of the box to enable storage, viewing, and searching of logs by customer. - User definable schemas allowing custom columns for specific use cases and compliance frameworks. - Embeddable React component to enable search and log verification directly within your app. - Detection and removal of PII (Personally Identifiable Information) so that you can remain compliant. And more!
flo merian
💎 Pixel perfection
security isn't an afterthought anymore with Pangea -- it was about time. will definitely share it with my network. keep it up, ?makers!
Oliver Friedrichs
@fmerian thanks flo! appreciate it.. our goal is to turn the world of security into a simple set of API's.. please let us know what you think!
Ken W. Alger
💎 Pixel perfection
Pangea's Secure Audit Log makes this critical application feature incredibly straightforward to implement, manage, view, and maintain. Building security into your applications has become much simpler with their APIs. Secure Audit Log is just one more example of Pangea thinking of developers' needs and making our lives easier.
Looks great
J.J. Guy
I’m on my third startup — and they’ve all been security products. This is loooooong overdue! It is one of those areas that we’ve got to do right (especially as a security product selling to security customers who ask all the right questions) but always takes way too long! In today’s world, it should not be hard to build truly secure system - but unfortunately we will have a ways to go. Pangea’s Secure Audit Log service fills an important gap and gets us one step closer! Thank you!
Oliver Friedrichs
@jjguy Thanks J.J. appreciate your support! This is exactly what inspired Pangea.. reinventing the wheel every time just doesn't make sense! So let's just package the security element and let you focus on your own business logic.
Elizabeth Green
💎 Pixel perfection
The simplicity of logging important events with just one line of code is impressive. Kudos to the Pangea team for making security accessible and seamless!
Anuj Sharma
Absolutely impressed by the Pangea Secure Audit Log API! It's a game-changer for app activity tracking. With cryptographic security, verifiable signatures, and strict access controls, I have full confidence in the tamper-proof nature of my log data.
Luke Stahl
@anuj_sharma26 Thank you Anuj! Secure Audit Log is one of the first services we rolled out and something every application can utilize. We try to make things as simple as possible :)
Oliver Friedrichs
@anuj_sharma26 Thanks! It could normally take weeks to months to build your own.. and then you have to manage it all.. we've tried to make it as easy as possible!
verlaine j muhungu
the simplicity of APis makes me a believer for a safer cyber world, keep up the Excellent work