February is the month of love, and we may be biased, but we’re head over heels for the new and improved Threat Stack! If you’ve been keeping up with us on our blog or over on Twitter recently, you’ve noticed that we started 2016 off with a pretty big bang. From a completely new platform to several key new features, we wanted to share it all with you today.
Introducing the Threat Stack Cloud Security Platform™
In February, we were thrilled to announce the launch of the Threat Stack Cloud Security Platform™ (CSP), the industry’s first fully integrated cloud security suite. It took all the willpower we could muster to keep it a secret while we were heads down building this new end-to-end platform covering vulnerability management, infrastructure monitoring, threat intelligence, compliance reporting and more. It’s exciting to now have it out for the world to see, and we’ve been getting tons of positive feedback from customers.
Here’s a sneak peek at what you’ll see:
New Feature Highlights
Wrapped into the launch of the Threat Stack Cloud Security Platform™ were a number of exciting new features that are deserving of their own attention. They include:
New and improved security dashboard
Threat Stack’s new dashboard streamlines the way you see vulnerabilities (prioritizing the top 10 by CVSS score), host activity and CloudTrail activity. This is all to say that you can take action even faster on the alerts that matter most.
With the launch of the Threat Stack Cloud Security Platform™ came our new Vulnerability Management feature, offering the ability to track patches and fixes in your cloud environment. By examining installed packages at the host level (or the source of truth, as we like to call it), Threat Stack can identify packages with security patches and quickly prioritizes workflows so you can take action, keeping your immutable infrastructure up to date and protected. Read more about Threat Stack’s Vulnerability Management functionality in this blog post.
Our new Threat Intelligence capabilities pinpoint known “bad” IP addresses that are connecting with your environment, indicating an attacker is attempting to gain command and control access to your systems or services. By corrolating our threat intelligence with our workload data, Ops and Security teams receive alerts the moment abnormal activity is detected, allowing you to take action before the attackers do. Read more about Threat Stack’s Threat Intelligence functionality in this blog post.
For current customers who want to activate these new features, simply follow the directions in our knowledgebase article about how to turn on CSP features. New customers can simply sign up for Threat Stack and dive right in with our free trial!
Weekly Community Q&A
We are hosting a new weekly product Q&A series featuring Threat Stack’s Solution Engineering (SE) team. It will feature our new Threat Stack Cloud Security Platform™, diving into all the new functionality above and, of course, your questions.
Here are the details:
What: Product Q&A
When: Every Tuesday at 4:00pm EST
Where: Online (link: https://www.gotomeet.me/threatstack) or by phone (dial-in: (408) 650-3123, Access Code: 522-658-349)
Whew! That’s it for now, but we have much more we’re cooking up for you throughout 2016. If you aren’t a customer yet, be sure to schedule a demo with one of our cloud security experts to learn more about how the Threat Stack Cloud Security Platform™ can help your organization run secure and compliant in the cloud.