Cloud Security Platform
A single, cloud-native platform for workload compliance and security across the entire infrastructure stack, throughout the application lifecycle.
Threat Stack Oversight (SOC)
Reduce mean-time-to-respond with 24/7/365 monitoring and alert escalation from the Threat Stack Security Operations Center.
Threat Stack Insight
Improve your cloud security posture with deep security analytics and a dedicated team of Threat Stack experts who will help you set and achieve your security goals.
File Integrity Monitoring
Container & Kubernetes Security
Cloud Security Posture Management
Application Security Monitoring
Cloud Compliance Overview
Insider Threat Detection
Fargate Security Monitoring
ThreatML - Cloud Machine Learning
Security Research Center
Case Studies & Testimonials
View Resource Center
Cloud security tips, insights, and ideas.
Stay up to date with the latest press releases, news, and events from Threat Stack.
Watch a sophisticated cloud attack and learn the necessary steps to prepare yourself.
October 7, 2020
Any cybersecurity team that has had to respond to a compliance audit knows that it’s a lot easier to monitor for specific risks as they occur, ...
Introducing Threat Stack support for AWS Fargate
Investigating Kubernetes Attack Scenarios in Threat Stack (part 1)
The Curious Case of the Sunday Morning Alarm: Debugging Disk Performance in the Cloud
Cloud Security Insights, Thoughts, and Ideas
November 17, 2020
In early 2020, organizations were already moving quickly towards the cloud before the COVID-19 pandemic put their journey into fifth gear. How fast ...
October 15, 2020
In case you missed them, in recent blogs we did a deep dive into Threat Stack’s ability to provide extensive cloud security telemetry and hinted at ...
September 23, 2020
There’s a lot of value in Threat Stack’s deep, continuous telemetry. By casting a wide net, our customers get the complete story about what’s ...
September 21, 2020
Amazon Web Services (AWS) Fargate is a compute engine for Amazon Elastic Container Service (ECS). With Fargate, you don’t need to provision and ...
September 10, 2020
AWS is one of the largest and most popular cloud computing platforms. Amazon first began offering IT infrastructure services to businesses back in ...
August 11, 2020
Threat Stack collects tens of billions of events per day, which helps customers understand their environment, identify undesirable activity, and ...
August 4, 2020
As customers evaluate and design new forms of managed container architectures, Threat Stack will be there to provide a detailed view into running ...
July 30, 2020
Free and open source DevOps tools can help DevOps teams streamline their development processes and speed development cycles, when carefully selected ...
July 9, 2020
As the rapid adoption of new ephemeral cloud deployment options, like containers and kubernetes, gives DevOps teams more flexibility, it is more ...
June 18, 2020
Evaluating Your Security Mechanisms
Throughout the IT industry, security mechanisms are used to allow or deny access to objects, such as a file, by ...
June 10, 2020
Every company that uses applications in one way or another must operate in a service-oriented digital world where application development has to be ...
June 9, 2020
Threat Stack has an event processing pipeline that processes millions of messages per second sent to us by customer agents, our internal services, ...
June 3, 2020
Let's be honest: trying to deploy your apps alone is a bad idea. Trying to upgrade and configure hundreds of computers across an extensive ...
May 27, 2020
It’s not just healthcare providers who handle protected health information (PHI), but also a growing number of companies in the broader health and ...
May 21, 2020
Testing the applications you create is a necessary part of writing code. Finding the right tools to perform different testing functions can be ...
May 19, 2020
In part one of this two-part series, I showed how Threat Stack captures detailed metadata about operating system behaviors as they happen. I used the ...
April 29, 2020
According to Verizon’s 2019 Data Breach Investigations Report, web applications are the source of about one in four data breaches, and in 60 ...
April 23, 2020
Kubernetes operators are getting better at protecting the clusters from external attacks. This is a success story for many companies that adopted ...
April 9, 2020
This morning the Threat Stack Security Operations Center (SOC) released its Q1 report of key findings and trends among Threat Stack customers. This ...
April 7, 2020
Telecommuting — also known as working from home (WFH), remote working, and a number of other names — has been around for about 50 years, having ...