It’s December, which in Boston means we’re stocking up on L.L. Bean boots and hunkering down for a cold, snowy winter. 2015 has been an incredible year here at Threat Stack — this last quarter, in particular. We’ve been hard at work developing several important integrations to the Threat Stack platform as well as celebrating a few very big milestones. But most of all, we wanted to take a moment to thank you — our incredible community — for all of your support since our launch out of beta last year, and for providing feedback that has inspired several of this quarter’s featured announcements (see below).
To see what we’ve been up to this quarter and what Threat Stack has to offer you (just in case you’ve been considering a solution like ours for 2016), take a look at our year-end update:
AWS CloudTrail and Docker Integrations Released
This fall at AWS re:Invent, we had many things to celebrate. Not only was it our one year anniversary since we launched Threat Stack out of beta, but we also launched two exciting integrations — CloudTrail and Docker — to help you further strengthen and streamline your cloud security monitoring.
Our VP of Products, Venkat Pothamsetty, explains the new integrations perfectly when he says, “Docker use is exploding and the correlation of a host-based intrusion detection system (HIDS) with Docker and AWS CloudTrail is what gives users the vital context they need to act swiftly on a security incident.”
Threat Stack’s Docker integration includes out-of-the-box default rules — the Docker Base Rule Set — as well as the ability for users to easily apply custom rulesets to fit their environments. With this integration, container activity flows through and integrates seamlessly into the security, operations and compliance feature sets of Threat Stack, empowering companies to operate quickly and with confidence. Our Senior Software Engineer, Nathan Cooprider, wrote a fantastic blog post on exactly how our Docker integration works. Check it out.
Threat Stack’s CloudTrail integration is purpose-built to bridge the visibility gap between your AWS services and core systems running in your cloud. With this integration, you can now get alerted about changes to your AWS environment and make the connection as to whether any of these changes had any adverse effects on your security posture.
These integrations give AWS customers additional information they can use to evaluate their security strategies, ensuring all activity within their application environments is secure and compliant. We’re happy to show you more.
Threat Stack’s Security Monitoring Service Oversight Launched
This September we announced our new managed security monitoring service, Oversight. Oversight gives you access to Threat Stack experts who can deploy, configure, fine-tune and manage your security monitoring for you. As your first line of defense, Threat Stack’s experts ensure that your data is continuously monitored, notifying you of changes and compiling an audit trail to reduce risk. Oversight also manages priority issues and escalations, without taxing internal security and ops teams.
With Oversight, you get all of the benefits of a continuous security monitoring solution without the need for an in-house team to manage the process, returning valuable time to IT and ops teams to focus on your growing business.
Wondering if Oversight is a good fit for your organization? Check out our blog post outlining the seven signs you’re a good candidate for a managed cloud security solution. To learn more about Oversight, check out our full announcement.
Product Update: New Alert View
Having instant, actionable data is the key to maintaining a secure cloud environment. This is something we focus intently on, ensuring you have quick access to the alerts most deserving of your attention. That’s why this quarter we further enhanced our Alert widget on the Threat Stack dashboard and created a more efficient Alert view. This dashboard view gives you enhanced visibility into priority alerts the moment you log into Threat Stack. Check it out:
Ringing in 2016
Q4 2015 was pretty exciting over here at Threat Stack, but we can’t wait to share what we’re cooking up for 2016. If you aren’t a customer yet, be sure to schedule a demo with one of our cloud security experts to learn more about how Threat Stack’s cloud-native continuous monitoring solution can help your organization run secure and compliant in the cloud.
See these new integrations and features for yourself.