A single, cloud-native platform for workload compliance and security across the entire infrastructure stack, throughout the application lifecycle.
Cloud Posture Management
Identification of changes made to cloud configuration through service provider APIs, including host instances, security groups, IAM policy, and access keys.
Build-time and runtime application security, including developer feedback and live attack detection and blocking.
Real-time, continuous monitoring and protection for Linux and Windows virtual machine workloads.
RESTful APIs and built-in integrations that leverage existing incident response, investigation, and analytics tools.
Container & Kubernetes Security
Detection of risky behaviors, active threats, and configuration issues for containers, container orchestration, and managed container services.
Extend your team’s security expertise and resources with the Threat Stack Cloud SecOps Program℠.
Threat Stack Oversight℠
Reduce mean-time-to-respond with 24/7 monitoring and alert escalation from the Threat Stack Security Operations Center.
Threat Stack Insight℠
Improve your cloud security posture with deep security analytics and a dedicated team of Threat Stack experts who will help you set and achieve your security goals.
Follow along as the Threat Stack Security Team shows how a malicious actor leverages the unique characteristics of the public cloud to launch their attack.
See inside an active cryptomining malware campaign as Threat Stack’s Security Operations Center (SOC) details a recently discovered variant of the Shellbot malware.
Threat Stack offers unique solution packages to meet your cloud security goals.
Trade Up Program
Trade in any competitive solution and receive an invoice credit for current contract towards a Threat Stack plan, a dedicated on-boarding team, and customer service manager.
Compliance for Cloud Workloads
Demonstrate continuous monitoring to auditors with pre-built rulesets and compliance reports that map to major regulatory compliance requirements like PCI-DSS, HIPAA, and SOC 2.
Security for AWS
Integrate Threat Stack with AWS to monitor changes and misconfigurations across multiple accounts and services.
Monitor for anomalous or risky behaviors across host, container, and container orchestration to alert you to signs of compromise.
Detect and remediate vulnerabilities across your infrastructure.
File Integrity Monitoring
Monitor for creates, deletes, opens, and edits to secret files to identify nefarious activity and satisfy compliance requirements.
Correlate security signals across your entire infrastructure stack with flexible built-in integrations, APIs, and data lake integration for SIEM.
Bring Security and DevOps teams together: Deploy in minutes and auto-scale with configuration management tools and Kubernetes to monitor cloud-native resources throughout the build pipeline.
Monitor all of your de-coupled, stateless, polyglot services in a single solution, even when they’re built and deployed in separate pipelines by different teams.
Fargate Security Monitoring
Threat Stack fills the visibility gap for managed container services like AWS Fargate, with process tracking and detailed netflow metadata.
View Resource Center
eBooks & Whitepapers
Customer Case Studies & Testimonials
Cloud security tips, insights, and ideas.
Stay up to date with the latest press releases, news, and events from Threat Stack.
Watch a sophisticated cloud attack and learn the necessary steps to prepare yourself.
Meet the Threat Stack leadership team.
Building a great company starts with building a great team.
55 Summer Street
Boston, MA 02110
Hear what our customers explain how Threat Stack has made them more successful and secure.
Become a Threat Stack Partner.
How can we help you?
August 4, 2020
As customers evaluate and design new forms of managed container architectures, Threat Stack will be there to provide a detailed view into running ...
Investigating Kubernetes Attack Scenarios in Threat Stack (part 1)
The Curious Case of the Sunday Morning Alarm: Debugging Disk Performance in the Cloud
Diving Deeper Into Runtimes: Kubernetes, CRI, and Shims
Cloud Security Insights, Thoughts, and Ideas
July 3, 2018
Here’s the third blog post in our 4-part series of AWS Security Tips and Quotes, which is designed to help you evolve and strengthen your ...
June 27, 2018
While the technologies, processes, and cultural shifts of DevOps have improved the ability of software teams to deliver reliable work rapidly and ...
June 26, 2018
As part of its mission, Threat Stack has always brought its readers security-related content to help them make informed decisions that will ...
June 25, 2018
If you’re on a Security team, chances are you may be able to leverage some of the Operations team’s existing tools for log management and SIEM. ...
June 22, 2018
Gartner estimates that 50 percent of companies will use container technology by 2020, up from less than 20 percent in 2017. The operational benefits ...
June 21, 2018
With more companies than ever leveraging cloud services like AWS, and with cloud environments becoming more and more complex, it’s imperative that ...
June 20, 2018
You’re in the midst of an infrastructure transition, and you have a million and one things on your plate. Whether you are deploying containers for ...
June 19, 2018
While reacting to alerts and incidents after they occur will always be a reality of the security professional’s job, a purely reactive security ...
June 15, 2018
Mean Time To Detect (MTTD) and Mean Time To Know (MTTK) are two of the most important metrics in security operations. Respectively, they measure the ...
June 12, 2018
A Definition of AWS PCI Compliance,
Benefits, Requirements, & More
If your organization processes credit or debit card payments, PCI compliance ...
June 8, 2018
Earlier this week, we published a post that explains how to develop an Incident Response Plan (IRP) to prepare for when an incident inevitably ...
June 6, 2018
How Multinational Companies May be Affected by Their Subsidiaries’ Noncompliance
— by Lindsey Ullian, Threat Stack Compliance ...
June 5, 2018
According to a 2018 IBM study on cybersecurity resilience, 77 percent of firms surveyed lack proper incident response plans, while 69 percent report ...
June 1, 2018
With revenue from the cloud computing sector expected to hit $411 billion by 2020, it's no wonder that more and more companies are shifting their ...
May 30, 2018
Organizations are migrating from virtual server workloads to containers at a frenzied pace, buying into the increasingly popular technology and ...
May 29, 2018
With the popularity of container environments on the rise, we’ve seen many Threat Stack customers undergoing infrastructure transitions of late. ...
May 24, 2018
There’s no precisely defined career track for DevOps engineers because they’re typically developers or sysadmins who develop an interest in other ...
May 22, 2018
The deadline for the General Data Protection Regulation (GDPR) is fast approaching, with May 25 marking the official day of reckoning. The updates to ...
May 18, 2018
Developers gonna develop. That’s why we’re developers. We want to set some implementation goal and then make that a reality. We like to stay ...
May 16, 2018
More companies are moving to the cloud than ever before. Amazon Web Services (AWS) is one of the most popular cloud platforms, and for good reason: ...
May 10, 2018
We champion a security-first DevOps culture at Threat Stack, and I’ve had the opportunity of building DevOps best practices into the company since ...