Your Guide to Intrusion Detection for Modern Infrastructure
Many organizations that need cloud security are laboring behind a cloud of myths — unable to clearly define their requirements and match them to technology solutions and best practices that will enable them to operate securely at speed and scale in the cloud. Our new eBook — Myth Busting Intrusion Detection — is designed to clarify these issues. Read more “New eBook: Myth Busting Intrusion Detection”
As part of its ongoing mission to bring customers the most comprehensive and powerful cloud security solutions, Threat Stack has extended the capabilities of its Threat Stack Cloud Security Platform® to enable continuous security monitoring of Microsoft Windows and hybrid environments.
The new Windows agent adds to Threat Stack’s existing support for Linux environments, and enables companies to collect important information about users, processes, network connections, and files, as well as security events from Windows environments. The range and depth of detail provides a deep level of visibility and information that growing companies need in order to remain secure and compliant as they grow.
Read more “Threat Stack Cloud Security Platform® Support for Windows & Hybrid Environments”
Great applied technology typically needs enabling partner technology, and it will struggle to make headway until that partner appears. For decades, Intrusion Detection System (IDS) technology struggled to deliver efficient, high quality intrusion monitoring, and is only now experiencing success with the arrival of an unintentional enabling partner technology – cloud computing.
Read more “The History of Intrusion Detection Systems (IDS) – Part 1”
To truly appreciate why companies like Threat Stack point to the Cloud as a watershed event in their corner of the software industry, one must push past the hype and worn platitudes about “the Cloud with a capital C.” The reality is that it is the side effects that have caused such a large impact, like cost of operation as a function of scaled purchasing power and the forcing of software-only solutions.
This has certainly been felt in intrusion detection systems (IDS). They have traditionally been deployed as network hardware devices enabled by access to the network infrastructure, but are struggling to find relevance in a world where the traditional network boundary no longer exists.
Read more “3 Reasons Why The Host Rules Cloud IDS”
Cloud security was by far the biggest theme at the AWS Summit in New York this year. Specifically, intrusion detection in the cloud: How does it work? How can it provide what traditional solutions simply cannot? Since this topic deserves much more detailed attention, we have decided to host an entire webinar on this topic.
Read more “Webinar: Intrusion Detection for Elastic Cloud Deployments”
The only thing hotter than the streets of Manhattan last week was the New York AWS Summit! The event was packed with AWS users and those exploring moving into the cloud. In fact, there were so many users there that they ran out of badges!
Read more “The Hottest Cloud Topic at AWS Summit New York: Security”