A single, cloud-native platform for workload compliance and security across the entire infrastructure stack, throughout the application lifecycle.
Cloud Posture Management
Identification of changes made to cloud configuration through service provider APIs, including host instances, security groups, IAM policy, and access keys.
Build-time and runtime application security, including developer feedback and live attack detection and blocking.
Real-time, continuous monitoring and protection for Linux and Windows virtual machine workloads.
RESTful APIs and built-in integrations that leverage existing incident response, investigation, and analytics tools.
Container & Kubernetes Security
Detection of risky behaviors, active threats, and configuration issues for containers, container orchestration, and managed container services.
Extend your team’s security expertise and resources with the Threat Stack Cloud SecOps Program℠.
Threat Stack Oversight℠
Reduce mean-time-to-respond with 24/7 monitoring and alert escalation from the Threat Stack Security Operations Center.
Threat Stack Insight℠
Improve your cloud security posture with deep security analytics and a dedicated team of Threat Stack experts who will help you set and achieve your security goals.
Follow along as the Threat Stack Security Team shows how a malicious actor leverages the unique characteristics of the public cloud to launch their attack.
See inside an active cryptomining malware campaign as Threat Stack’s Security Operations Center (SOC) details a recently discovered variant of the Shellbot malware.
Threat Stack offers unique solution packages to meet your cloud security goals.
Trade Up Program
Trade in any competitive solution and receive an invoice credit for current contract towards a Threat Stack plan, a dedicated on-boarding team, and customer service manager.
Compliance for Cloud Workloads
Demonstrate continuous monitoring to auditors with pre-built rulesets and compliance reports that map to major regulatory compliance requirements like PCI-DSS, HIPAA, and SOC 2.
Security for AWS
Integrate Threat Stack with AWS to monitor changes and misconfigurations across multiple accounts and services.
Monitor for anomalous or risky behaviors across host, container, and container orchestration to alert you to signs of compromise.
Detect and remediate vulnerabilities across your infrastructure.
File Integrity Monitoring
Monitor for creates, deletes, opens, and edits to secret files to identify nefarious activity and satisfy compliance requirements.
Correlate security signals across your entire infrastructure stack with flexible built-in integrations, APIs, and data lake integration for SIEM.
Bring Security and DevOps teams together: Deploy in minutes and auto-scale with configuration management tools and Kubernetes to monitor cloud-native resources throughout the build pipeline.
Monitor all of your de-coupled, stateless, polyglot services in a single solution, even when they’re built and deployed in separate pipelines by different teams.
Fargate Security Monitoring
Threat Stack fills the visibility gap for managed container services like AWS Fargate, with process tracking and detailed netflow metadata.
View Resource Center
eBooks & Whitepapers
Customer Case Studies & Testimonials
Cloud security tips, insights, and ideas.
Stay up to date with the latest press releases, news, and events from Threat Stack.
Watch a sophisticated cloud attack and learn the necessary steps to prepare yourself.
Meet the Threat Stack leadership team.
Building a great company starts with building a great team.
55 Summer Street
Boston, MA 02110
Hear what our customers explain how Threat Stack has made them more successful and secure.
Become a Threat Stack Partner.
How can we help you?
25 total posts.
April 29, 2020
According to Verizon’s 2019 Data Breach Investigations Report, web applications are the source of about one in four data breaches, and in 60 ...
September 27, 2018
Introducing containers into cloud infrastructure can lead to faster development cycles as well as more efficient use of infrastructure resources. ...
David M. Weinstein
October 26, 2017
Recognizing that the financial services industry is a significant target of cybersecurity threats, the New York State Department of Financial ...
Threat Stack Marketing Team
October 13, 2017
Five years is a blink of the eye in time, but in technology, a lot can happen. This year, we’re celebrating the fifth year of the Threat Stack ...
August 1, 2017
SOC 2 compliance is a crucial framework for technology and cloud computing companies today. As with many other compliance mandates, it is not a ...
June 23, 2017
Two interesting observations:
The average number of days that attackers were present on a victim’s network before being discovered is 146 days. ...
The Threat Stack Team
March 10, 2017
Yesterday, we hosted one of our most popular webinars to date: Steps for Establishing Your AWS Security Roadmap. Threat Stack’s VP of Engineering, ...
February 23, 2017
Security can be a huge sales and business enabler, as I've mentioned before. If your company and its prospective customers are in a regulated ...
February 1, 2017
When things are hectic at your organization, compliance may not feel like the highest priority. If you aren’t in an industry that absolutely ...
January 10, 2017
Few understand the concept of mitigating risk better than the insurance industry. The insurance industry faces a unique set of challenges when it ...
January 9, 2017
Compliance processes have a reputation for being expensive, time-consuming, and fraught with difficulties — and sometimes certifications are looked ...
December 28, 2016
One of our goals at Threat Stack is sharing information that will help you learn about the current cloud security threat landscape in order to ...
December 16, 2016
The USENIX LISA 2016 Conference wrapped up a week ago after a tremendous five-day program of workshops, training sessions, presentations, talks, and ...
November 15, 2016
Compliance is a complex, ongoing process. Between deciphering requirements into relatable terms, allocating a budget, and assembling a team for ...
October 7, 2016
We write about compliance (and talk to customers about it) pretty regularly, and if you’ve been following our blog over the last two months, then ...
September 30, 2016
Have you heard one about the bear and the two hikers?
A bear jumps out of the bush and starts chasing two hikers. They both start running for ...
September 8, 2016
Monitoring is the most reliable method of identifying and tracking users who are accessing data on company systems. Whether you’re on the lookout ...
September 1, 2016
Amazon Web Services (AWS) has pioneered the Shared Responsibility Model in the cloud. Basically, this model outlines how cloud service providers and ...
August 25, 2016
We’ve been talking a lot about compliance lately. That’s because, as more businesses are moving to the cloud and storing internal and customer ...
July 13, 2016
PCI DSS. HIPAA. SOC 2. SOX 404. Compliance can be a complicated and confusing beast, with plenty of acronyms and layers of regulations — not to ...
June 22, 2016
On Tuesday, June 21, I teamed up with Scott Ward, Solutions Architect at AWS, and Arup Chakrabarti, Director of Engineering at PagerDuty, to ...