It’s December, which in Boston means we’re stocking up on L.L. Bean boots and hunkering down for a cold, snowy winter. 2015 has been an incredible year here at Threat Stack — this last quarter, in particular. We’ve been hard at work developing several important integrations to the Threat Stack platform as well as celebrating a few very big milestones. But most of all, we wanted to take a moment to thank you — our incredible community — for all of your support since our launch out of beta last year, and for providing feedback that has inspired several of this quarter’s featured announcements (see below).
To see what we’ve been up to this quarter and what Threat Stack has to offer you (just in case you’ve been considering a solution like ours for 2016), take a look at our year-end update:
Read more “Threat Stack Year-End Update”
As we prepare to move across the muddy Charles River from Cambridge to our new offices in Boston’s Innovation District, I find myself reflecting on our incredible progress in 2014. From RSA in February to AWS re:Invent in November, it has truly been a whirlwind highlighted by the awesome people that make up Threat Stack including our team, investors, partners, and most importantly, our customers. Thanks to all! So, what did we get done in 2014?
Read more “Our 2014 Retrospective”
At Threat Stack, we’ve started the new year off with a bang by getting straight to work on many new exciting features that we can’t wait to share with you! No more eggnog, traveling to the in-laws’ house or singing carols — our heads are down making our flagship product Cloud Sight better than ever.
Performance & Speed
This past month we worked tirelessly to make the task of tracking, auditing, and displaying forensic information for an organization even easier and faster than before.
To see an overview of how this now works, take a peek at this screencast demonstrating a vulnerable cloud deployment. As you saw (you watched the screencast, right?!) because of poor user and password management, multiple systems were compromised. Just like Superman, Cloud Sight swept in and reconstructed a full timeline of events — from the introduction of a new user right down to the nitty-gritty details of the rootkit installed after the compromise.
Read more “Threat Stack January Update”