A single, cloud-native platform for workload compliance and security across the entire infrastructure stack, throughout the application lifecycle.
Cloud Posture Management
Identification of changes made to cloud configuration through service provider APIs, including host instances, security groups, IAM policy, and access keys.
Build-time and runtime application security, including developer feedback and live attack detection and blocking.
Real-time, continuous monitoring and protection for Linux and Windows virtual machine workloads.
RESTful APIs and built-in integrations that leverage existing incident response, investigation, and analytics tools.
Container & Kubernetes Security
Detection of risky behaviors, active threats, and configuration issues for containers, container orchestration, and managed container services.
Extend your team’s security expertise and resources with the Threat Stack Cloud SecOps Program℠.
Threat Stack Oversight℠
Reduce mean-time-to-respond with 24/7 monitoring and alert escalation from the Threat Stack Security Operations Center.
Threat Stack Insight℠
Improve your cloud security posture with deep security analytics and a dedicated team of Threat Stack experts who will help you set and achieve your security goals.
Follow along as the Threat Stack Security Team shows how a malicious actor leverages the unique characteristics of the public cloud to launch their attack.
See inside an active cryptomining malware campaign as Threat Stack’s Security Operations Center (SOC) details a recently discovered variant of the Shellbot malware.
Threat Stack offers unique solution packages to meet your cloud security goals.
Trade Up Program
Trade in any competitive solution and receive an invoice credit for current contract towards a Threat Stack plan, a dedicated on-boarding team, and customer service manager.
Compliance for Cloud Workloads
Demonstrate continuous monitoring to auditors with pre-built rulesets and compliance reports that map to major regulatory compliance requirements like PCI-DSS, HIPAA, and SOC 2.
Security for AWS
Integrate Threat Stack with AWS to monitor changes and misconfigurations across multiple accounts and services.
Monitor for anomalous or risky behaviors across host, container, and container orchestration to alert you to signs of compromise.
Detect and remediate vulnerabilities across your infrastructure.
File Integrity Monitoring
Monitor for creates, deletes, opens, and edits to secret files to identify nefarious activity and satisfy compliance requirements.
Correlate security signals across your entire infrastructure stack with flexible built-in integrations, APIs, and data lake integration for SIEM.
Bring Security and DevOps teams together: Deploy in minutes and auto-scale with configuration management tools and Kubernetes to monitor cloud-native resources throughout the build pipeline.
Monitor all of your de-coupled, stateless, polyglot services in a single solution, even when they’re built and deployed in separate pipelines by different teams.
Fargate Security Monitoring
Threat Stack fills the visibility gap for managed container services like AWS Fargate, with process tracking and detailed netflow metadata.
View Resource Center
eBooks & Whitepapers
Customer Case Studies & Testimonials
Cloud security tips, insights, and ideas.
Stay up to date with the latest press releases, news, and events from Threat Stack.
Watch a sophisticated cloud attack and learn the necessary steps to prepare yourself.
Meet the Threat Stack leadership team.
Building a great company starts with building a great team.
55 Summer Street
Boston, MA 02110
Hear what our customers explain how Threat Stack has made them more successful and secure.
Become a Threat Stack Partner.
How can we help you?
As Threat Stack's Product Marketing Manager, Tim helps drive the conversation around cloud security. In the past he's worked in sales engineering and malware research. When not in front of a computer, he loves songwriting and listening to music. Tim is still not the lead singer of Rancid.
21 total posts.
February 24, 2017
We’ve written before about what it means to meet compliance standards without going completely overboard. Today, we want to talk about how that ...
February 17, 2017
Investing in SecOps doesn’t just mean hiring folks who know how to blend together software development, IT operations, and security skillsets. It ...
February 1, 2017
When things are hectic at your organization, compliance may not feel like the highest priority. If you aren’t in an industry that absolutely ...
January 31, 2017
Your incident management process is greatly impacted by the tools you have available to carry it out. Technology should be your friend when it comes ...
January 27, 2017
Automating security processes and workflows can help teams lower Mean Time To Resolution (MTTR), maintain or strengthen an organization’s security ...
January 24, 2017
In Part 1 of this two-part series, we put a magnifying glass on some of the top cloud security trends and lessons learned in 2016. In Part 2, we’re ...
January 23, 2017
What’s your priority: to become a Security Company or be a Secure Company?
If you’re truly in the security business, then of course you’ll ...
January 19, 2017
The conversations about cloud security are changing rapidly. A few years ago, companies were hesitant to even talk about moving to the cloud because ...
January 11, 2017
Organizations wait to implement security solutions for a variety of reasons. One that we often hear is that they’re looking to land that cloud ...
January 5, 2017
I watched a Twilight Zone marathon over the New Year’s weekend, and it got me wondering about today’s Internet of Things (IoT). Are “Things” ...
December 29, 2016
It’s the end of the year — a classic time for reflection. So before we charge into 2017, let’s ask:
What went well in the world of ...
December 28, 2016
One of our goals at Threat Stack is sharing information that will help you learn about the current cloud security threat landscape in order to ...
December 12, 2016
Exploits feed on vulnerabilities. Vulnerabilities, in turn, pave the way for exploits. These closely related security concepts are often confused, ...
December 7, 2016
It’s no secret that there’s a huge talent shortage in the security space today. With a low supply and high demand, salaries have surged, ...
November 30, 2016
As we hurtle into the future, it often seems that talk in the tech media revolves around cloud computing. But the reality for many companies, ...
November 18, 2016
Security is a shared responsibility when you run your business on Amazon Web Services (AWS). To hold up your end of the bargain, there are many best ...
At Threat Stack, we develop security software, so it’s important to us that people have the technology they need to manage security issues in ...
November 8, 2016
One of the first things any security practitioner will tell you to do is keep your software up to date. It’s the number one way to protect against ...
October 26, 2016
Last Friday, multiple massive distributed denial ofservice (DDoS) attacks hit Dyn, an internet performance management company headquartered in New ...
October 24, 2016
The cloud is very different from on-premise infrastructure in several key ways. Some of these differences become apparent when it comes to external ...
October 18, 2016
Last week I spent two fantastic days in Washington, DC attending the AppSecUSA Conference on behalf of Threat Stack, one of the event’s Silver ...