We’re thrilled to announce today that Threat Stack has joined PagerDuty’s rapidly expanding partner ecosystem with a new integration now available to all customers! This integration allows you to easily manage your Threat Stack cloud security incidents directly within PagerDuty, a popular platform that allows engineering and IT teams to connect their operations systems, teams and data into a single, easy-to-use console, making managing and responding to incidents quick and easy.
We recently spoke with Threat Stack customer Jameel Al-Aziz, DevOps/Software Engineer for 6sense, and developed the following case study that showcases how Al-Aziz and his team are using Threat Stack. Al-Aziz also details in the case study the company-wide benefits they are realizing, including a shortened sales cycle, by having a continuous security monitoring solution in place. Below is their story.
For the second year in a row, Threat Stack will be attending and exhibiting at the AWS Enterprise Summit, this time at the Moscone Center in San Francisco. Throughout the past year alone, our integration with AWS has grown even deeper, helping customers effectively meet their responsibilities within the shared security model. We look forward to sharing the significant advances on our platform with the AWS community during the AWS Summit next week.
This week our product team, led by Chris Gervais, Threat Stack’s VP of Engineering, and Aaron Botsis, Threat Stack’s Product Manager, hosted a live Q&A webinar, diving into the intricacies of security for cloud-native environments and what Threat Stack is doing about it. Before the webinar, we asked attendees to submit their most pressing questions, letting them take the reigns in the discussion. We had many great questions come in and took care to cover as many as possible. We also demoed Threat Stack itself to show how the platform works and some recent updates based specifically on customer feedback.
Whether you’re a current Threat Stack customer or not, there is a lot you’ll be interested to learn in regards to proactively protecting your company’s cloud-resident data with Threat Stack. It is our single most important mission to help you answer the questions that matter most in regards to cloud security. That’s why we’ve developed an exclusive product webinar on March 24th where we’ll let you take the reins. We will be providing a lot of information that you may not yet know about Threat Stack’s capabilities, but a majority of the time will be spent answering your most pressing questions which you can submit to us prior to the webinar. We will take care to answer every question we can to elevate your knowledge about continuous cloud security and Threat Stack.
This is part of a series we’re calling ‘Securing Modern Infrastructure’, where we explore the implications of modern development and operations pipelines from a security perspective.
On Wednesday, Threat Stack was featured in an important GigaOM webinar panel, Iron Clad DevOps Security for Your EC2 Environments. The panel included our own Director of Ops and Support, Pete Cheslock, along with David Linthicum of GigaOM, Greg Ferro, Independent Analyst, and Matt Sarrel, Executive Director of Sarrel Group. It was a deeply informative hour-long discussion which David himself claimed as one of the best security webinars he’s had. We couldn’t agree more!
To truly appreciate why companies like Threat Stack point to the Cloud as a watershed event in their corner of the software industry, one must push past the hype and worn platitudes about “the Cloud with a capital C.” The reality is that it is the side effects that have caused such a large impact, like cost of operation as a function of scaled purchasing power and the forcing of software-only solutions.
This has certainly been felt in intrusion detection systems (IDS). They have traditionally been deployed as network hardware devices enabled by access to the network infrastructure, but are struggling to find relevance in a world where the traditional network boundary no longer exists.
Join Threat Stack’s Director of Ops & Support, Pete Cheslock, as he discusses the security needs of modern, DevOps-managed infrastructures with Greg Ferro, Independent Analyst, and Matt Sarrel, Executive Director of Sarrel Group, in next week’s GigaOM webinar.
With the lack of sophisticated security features in public cloud infrastructure environments like AWS, it’s critical for DevOps teams to implement audit trails in order to adhere to compliance and regulation mandates. Continuous security monitoring is the answer and on February 11th, Pete, Greg and Matt will be discussing the importance of having this new level of visibility into an entire EC2 attack surface.
As we prepare to move across the muddy Charles River from Cambridge to our new offices in Boston’s Innovation District, I find myself reflecting on our incredible progress in 2014. From RSA in February to AWS re:Invent in November, it has truly been a whirlwind highlighted by the awesome people that make up Threat Stack including our team, investors, partners, and most importantly, our customers. Thanks to all! So, what did we get done in 2014?