A single, cloud-native platform for workload compliance and security across the entire infrastructure stack, throughout the application lifecycle.
Cloud Posture Management
Identification of changes made to cloud configuration through service provider APIs, including host instances, security groups, IAM policy, and access keys.
Build-time and runtime application security, including developer feedback and live attack detection and blocking.
Real-time, continuous monitoring and protection for Linux and Windows virtual machine workloads.
RESTful APIs and built-in integrations that leverage existing incident response, investigation, and analytics tools.
Container & Kubernetes Security
Detection of risky behaviors, active threats, and configuration issues for containers, container orchestration, and managed container services.
Extend your team’s security expertise and resources with the Threat Stack Cloud SecOps Program℠.
Threat Stack Oversight℠
Reduce mean-time-to-respond with 24/7 monitoring and alert escalation from the Threat Stack Security Operations Center.
Threat Stack Insight℠
Improve your cloud security posture with deep security analytics and a dedicated team of Threat Stack experts who will help you set and achieve your security goals.
Follow along as the Threat Stack Security Team shows how a malicious actor leverages the unique characteristics of the public cloud to launch their attack.
See inside an active cryptomining malware campaign as Threat Stack’s Security Operations Center (SOC) details a recently discovered variant of the Shellbot malware.
Threat Stack offers unique solution packages to meet your cloud security goals.
Trade Up Program
Trade in any competitive solution and receive an invoice credit for current contract towards a Threat Stack plan, a dedicated on-boarding team, and customer service manager.
Compliance for Cloud Workloads
Demonstrate continuous monitoring to auditors with pre-built rulesets and compliance reports that map to major regulatory compliance requirements like PCI-DSS, HIPAA, and SOC 2.
Security for AWS
Integrate Threat Stack with AWS to monitor changes and misconfigurations across multiple accounts and services.
Monitor for anomalous or risky behaviors across host, container, and container orchestration to alert you to signs of compromise.
Detect and remediate vulnerabilities across your infrastructure.
File Integrity Monitoring
Monitor for creates, deletes, opens, and edits to secret files to identify nefarious activity and satisfy compliance requirements.
Correlate security signals across your entire infrastructure stack with flexible built-in integrations, APIs, and data lake integration for SIEM.
Bring Security and DevOps teams together: Deploy in minutes and auto-scale with configuration management tools and Kubernetes to monitor cloud-native resources throughout the build pipeline.
Monitor all of your de-coupled, stateless, polyglot services in a single solution, even when they’re built and deployed in separate pipelines by different teams.
Fargate Security Monitoring
Threat Stack fills the visibility gap for managed container services like AWS Fargate, with process tracking and detailed netflow metadata.
View Resource Center
Cloud security tips, insights, and ideas.
Stay up to date with the latest press releases, news, and events from Threat Stack.
Watch a sophisticated cloud attack and learn the necessary steps to prepare yourself.
Meet the Threat Stack leadership team.
Building a great company starts with building a great team.
55 Summer Street
Boston, MA 02110
Hear what our customers explain how Threat Stack has made them more successful and secure.
Become a Threat Stack Partner.
How can we help you?
97 total posts.
April 7, 2020
Telecommuting — also known as working from home (WFH), remote working, and a number of other names — has been around for about 50 years, having ...
December 10, 2019
At Threat Stack, we attend a lot of conferences: They can be a powerful way to connect with like-minded professionals and educate yourself on ...
June 27, 2019
The last day of the first AWS re:Inforce conference has wrapped up and it’s time to take the lessons we learned back to the office and put them ...
June 26, 2019
Note: For a recap of Day 2, please take a look at AWS re:Inforce Recap: A Look Back at the First AWS Security Show.
Day 1 of AWS re:Inforce ...
June 6, 2019
Q&A With Michael Race, Senior Consultant in Cloud/Infrastructure Security and DevSecOps at Stott and May
Hiring and retaining talent in ...
February 26, 2019
— Joe Baker, Manager Software Engineering
From time to time the Engineering, Operations, and Security groups at Threat Stack ...
November 30, 2018
Another year at AWS re:Invent has come and gone. As usual it was a jam packed show full of exciting announcements, great keynotes, sessions, and ...
March 15, 2018
Congratulations to Evident.io on having your cloud story acquired by Palo Alto Networks. Your vision, passion, and commitment have been rightly ...
February 28, 2018
Good CEOs are committed to moving their companies forward, increasing revenue, and ensuring that their teams are productive. When business challenges ...
Threat Stack Marketing Team
February 22, 2018
The SaaS subscription model can make churn an unavoidable issue because there’s nothing to prevent customers from cutting ties with one provider ...
January 15, 2018
The other week we outlined a number of resolutions to put you on the path to a cyber-secure 2018. In this post we’re going to direct you to some of ...
Threat Stack Product Team
January 3, 2018
Chris Ford, VP of Product, and Pete Cheslock, Senior Director of Operations and Support
Instead of the “predictions” that are ...
October 12, 2017
Want to take a peek at the World’s Worst Data Breaches? Here you ...
September 28, 2017
Before I started working at Threat Stack, security was not always at the top of my priority list. Now, as the CFO of a leading cloud security ...
September 21, 2017
Threat Stack Welcomes New Massachusetts Cybersecurity Growth and Development Center
Last week, during the inaugural Cybersecurity Forum, ...
September 12, 2017
Aligning security with your organization’s greater business needs is becoming increasingly important, but how do you actually do it? What it ...
June 21, 2017
Leveraging Security in the Sales Process
Security is more than just a good business practice. It also serves as insurance for your customers that ...
June 15, 2017
Key Takeaways From the Gartner Security & Risk Management Summit 2017
I just got back from the Gartner Security & Risk Management Summit ...
April 24, 2017
Often when we talk about security, we focus on the mechanics of how to keep technical infrastructure safe. It can be easy to forget that operational ...
April 19, 2017
A message from Cicada was discovered on Pastebin at the end of April 2017. It read "Beware false paths. Always verify PGP signature from ...
March 8, 2017
At Threat Stack we have developed best practices around cloud security — when it should be introduced, what it should cover at each stage of the ...