Cloud Security Platform
A single, cloud-native platform for workload compliance and security across the entire infrastructure stack, throughout the application lifecycle.
Threat Stack Oversight (SOC)
Reduce mean-time-to-respond with 24/7/365 monitoring and alert escalation from the Threat Stack Security Operations Center.
Threat Stack Insight
Improve your cloud security posture with deep security analytics and a dedicated team of Threat Stack experts who will help you set and achieve your security goals.
File Integrity Monitoring
Intrusion Detection
Container & Kubernetes Security
Vulnerability Assessment
Cloud Security Posture Management
Application Security Monitoring
Cloud Compliance Overview
DevSecOps Security
Microservice Security
Insider Threat Detection
AWS Security
Fargate Security Monitoring
CloudTrail Monitoring
AWS Graviton2 / Arm Support
ThreatML - Cloud Machine Learning
Integrations
XDR Solutions
Security Research Center
Customers
Case Studies & Testimonials
Video Overview
Reviews
View Resource Center
Blog
Cloud security tips, insights, and ideas.
Newsroom
Stay up to date with the latest press releases, news, and events from Threat Stack.
Press Kit
Watch a sophisticated cloud attack and learn the necessary steps to prepare yourself.
Please enable JavaScript in your browser for better use of the website, some features like forms and videos use Javascript in order to display the elements.
Twenty years of experience as a security engineer at Trusteer (IBM Security), Core Security Technologies, and Threat Stack, has made Anthony a valuable member of Threat Stack's security engineering team. Anthony helps Threat Stack's customers deploy, configure, fine-tune, and manage their continuous security monitoring so they can run secure and compliant, without sacrificing time and resources.
13 total posts.
Anthony Alves
April 9, 2018
As a SaaS organization, you may be well-versed in the world of cloud computing and feel confident that the cloud is as secure as any on-prem or data ...
December 19, 2017
Every organization orchestrates their infrastructure in their own way, but more often than not, most cloud environments have a lot in common. Since ...
December 12, 2017
In today’s cloud-based environments, security threats can move faster and do more damage than ever before. To avoid a financial and technological ...
September 26, 2017
Post updated by: Christian Lappin, Threat Stack Senior Security Engineer & David Weinstein, Threat Stack Senior Security Engineer Four ...
July 13, 2017
Mean Time To Know (or MTTK for short) is one of the most important metrics in security operations. It measures how efficient the security team is at ...
June 13, 2017
Pop quiz: What’s the difference between vulnerable and exploitable? As we’ve written before, a vulnerability is a weakness in a software ...
April 25, 2017
We’ve written before about the importance of looking inward, rather than out, when it comes to evaluating what types of cyberattacks are the ...
April 13, 2017
Security teams are expected to do a lot these days. From properly configuring the cloud environment, to protecting the organization from today’s ...
April 10, 2017
In a time when security consciousness is high and stories about security breaches are all too frequently in the headlines, your security team needs ...
November 29, 2016
A big difference in the way on-premises infrastructures and cloud infrastructures are implemented centers on the way that user permissions are ...
June 14, 2016
Whether you intend to use managed services to handle your organization’s cloud security or have decided to create and manage your own security ...
March 25, 2016
Compiling the right set of security solutions to meet your company’s unique requirements is no easy feat. The security needs of each company can ...
October 28, 2015
While the XOR DDoS Trojan has been active for over a year, we’ve seen a recent surge of coverage and blog posts recently. We’ve also seen the ...
This site uses cookies to provide better user experience. By using this site, you are accepting our use of cookies. View Privacy Policy.