A single, cloud-native platform for workload compliance and security across the entire infrastructure stack, throughout the application lifecycle.
Cloud Posture Management
Identification of changes made to cloud configuration through service provider APIs, including host instances, security groups, IAM policy, and access keys.
Build-time and runtime application security, including developer feedback and live attack detection and blocking.
Real-time, continuous monitoring and protection for Linux and Windows virtual machine workloads.
RESTful APIs and built-in integrations that leverage existing incident response, investigation, and analytics tools.
Container & Kubernetes Security
Detection of risky behaviors, active threats, and configuration issues for containers, container orchestration, and managed container services.
Extend your team’s security expertise and resources with the Threat Stack Cloud SecOps Program℠.
Threat Stack Oversight℠
Reduce mean-time-to-respond with 24/7 monitoring and alert escalation from the Threat Stack Security Operations Center.
Threat Stack Insight℠
Improve your cloud security posture with deep security analytics and a dedicated team of Threat Stack experts who will help you set and achieve your security goals.
Follow along as the Threat Stack Security Team shows how a malicious actor leverages the unique characteristics of the public cloud to launch their attack.
See inside an active cryptomining malware campaign as Threat Stack’s Security Operations Center (SOC) details a recently discovered variant of the Shellbot malware.
Threat Stack offers unique solution packages to meet your cloud security goals.
Trade Up Program
Trade in any competitive solution and receive an invoice credit for current contract towards a Threat Stack plan, a dedicated on-boarding team, and customer service manager.
Compliance for Cloud Workloads
Demonstrate continuous monitoring to auditors with pre-built rulesets and compliance reports that map to major regulatory compliance requirements like PCI-DSS, HIPAA, and SOC 2.
Security for AWS
Integrate Threat Stack with AWS to monitor changes and misconfigurations across multiple accounts and services.
Monitor for anomalous or risky behaviors across host, container, and container orchestration to alert you to signs of compromise.
Detect and remediate vulnerabilities across your infrastructure.
File Integrity Monitoring
Monitor for creates, deletes, opens, and edits to secret files to identify nefarious activity and satisfy compliance requirements.
Correlate security signals across your entire infrastructure stack with flexible built-in integrations, APIs, and data lake integration for SIEM.
Bring Security and DevOps teams together: Deploy in minutes and auto-scale with configuration management tools and Kubernetes to monitor cloud-native resources throughout the build pipeline.
Monitor all of your de-coupled, stateless, polyglot services in a single solution, even when they’re built and deployed in separate pipelines by different teams.
Fargate Security Monitoring
Threat Stack fills the visibility gap for managed container services like AWS Fargate, with process tracking and detailed netflow metadata.
View Resource Center
Cloud security tips, insights, and ideas.
Stay up to date with the latest press releases, news, and events from Threat Stack.
Watch a sophisticated cloud attack and learn the necessary steps to prepare yourself.
Meet the Threat Stack leadership team.
Building a great company starts with building a great team.
55 Summer Street
Boston, MA 02110
Hear what our customers explain how Threat Stack has made them more successful and secure.
Become a Threat Stack Partner.
How can we help you?
Threat stack’s mission is to help companies securely leverage the business benefits of the cloud with real-time threat detection and proactive risk management across cloud workloads — improving their cloud security posture at every step.
Threat Stack is the leader in cloud security and compliance for infrastructure and applications, helping global enterprises securely leverage the business benefits of the cloud with proactive risk identification and real-time threat detection across cloud workloads. The Threat Stack Cloud Security Platform® delivers full stack security observability across the cloud management console, host, container, orchestration, managed containers, and serverless layers. Threat Stack provides the flexibility to consume telemetry within existing security workflows — or manages it with you through the Threat Stack Cloud SecOps Program℠ so you can respond to security incidents and improve your organization’s cloud security posture over time.
VP, AppSec Engineering
VP, Human Resources
Chairman & CEO
Threat Stack, Inc.
Scale Venture Partners
EVP Product Development
Director, Cloud Security Integration Services
As Threat Stack's Chairman & CEO, Brian is passionate about building disruptive technology companies, fueled by innovation and high-performing teams. A seasoned technology executive with over two decades of experience, Brian joined Threat Stack in 2015 from Industrial Defender where he was Founder and CEO, and which he saw through a successful acquisition by Lockheed Martin in April 2014.
Outside of work Brian enjoys spending time with his two children, attending their sporting events, traveling, skiing, and boating. Brian holds an Electrical Engineering degree from the University of Vermont.
As Threat Stack’s Chief Security Officer, Sam is responsible for leading the company's strategic security roadmap for its continuous monitoring service, purpose-built for cloud environments. Sam brings highly relevant experience in distributed systems in public, private, and hybrid cloud environments, as well as proven success scaling SaaS startups. Sam was most recently the CXO at Cloudant (acquired by IBM in February 2014).
As the Chief Financial Officer at Threat Stack, Kevin is responsible for leading Finance and Administration. Kevin brings more than 20 years of financial and operational experience at high-growth technology start ups. Prior to joining Threat Stack, Kevin was the CFO of DataGravity and CFO of Azuki Systems (acquired by Ericsson). A CPA, Kevin started his finance career at Deloitte and gained valuable experience working at notable companies such as RSA, Cisco Systems, and Salary.com.
Jim McDonough has spent more than 10 years running sales teams in early- and expansion-stage software companies including Attend.com, Smartbear software, and Mashery (acquired by Intel in 2013), where he opened the Boston office and built out the Inside Sales team. As Vice President, Revenue at Threat Stack, Jim is responsible for developing a predictable and repeatable sales process to ensure Threat Stack’s continuing growth in the cloud security market.
Peter Basile is a high energy marketing executive with over 20 years experience developing and leading teams to define and deliver differentiated brand experiences that grow market share and build customer loyalty. Peter has held executive positions at Lionbridge Technologies, Salary.com, and Applause App Quality. At Threat Stack, Peter is responsible for building a modern demand engine that aligns messaging with customer personas and building alignment between sales and marketing.
Chris is the Vice President of Product at Threat Stack, where he is responsible for Product Management and User Experience. He brings more than 20 years of experience leading product teams and building innovative security solutions, including Data Loss Prevention, Enterprise Mobility Management, and Secure Cloud Collaboration. Prior to joining Threat Stack, Chris was Chief Product Officer at Blue Cedar Networks and Senior Vice President of Product Management at Intralinks, a secure cloud collaboration platform.
Kevin Baughman is the Vice President of Engineering at Threat Stack where he is responsible for providing strategic guidance across all of Threat Stack’s engineering teams as they continue to optimize the delivery of the Threat Stack Cloud Security Platform. Prior to joining Threat Stack Kevin was the Vice President of Engineering at Applause and Founding Engineer at Nasuni. He also has experience across several engineering organizations including Hitachi Vantara and EMC Technology Ventures Group. Kevin holds a Bachelor’s Degree in Computer Science from the University of Massachusetts, Lowell.
Sabin Thomas is the Vice President of Kernel and Application Security Engineering at Threat Stack and is focused on building innovative products in cloud security. Sabin has co-founded two successful security companies, most recently the cloud native application security firm Bluefyre, acquired by Threat Stack. Prior to that, Sabin co-founded Codiscope (acquired by Synopsys), that created developer tools for secure code analysis and developer focused eLearning, where he ran multiple teams across engineering, ops and support efforts. At Rakuten, Sabin also managed engineering teams responsible for Rakuten's platforms for payment technology, loyalty, fraud detection, advertising and search. Sabin holds a Master of Science degree in Engineering and Management from the Massachusetts Institute of Technology.
As Threat Stack’s Vice President of Human Resources, Kathleen is responsible for the company’s strategic people initiatives and fostering a company culture that emulates Threat Stack’s values. Kathleen brings more than 20 years of progressive human resources experience in the high-tech industry leading all aspects of human resource management. She has built and led numerous human resources teams for both start-up and Fortune 500 corporations. Prior to joining Threat Stack, she held various key leadership roles to include Continuum Management Services as Vice President of Human Resources and SmartBear Software as Chief People Officer, where she introduced new HR strategies and organizational design to drive employee engagement and cultural change. Kathleen was also the principal of an independent consulting firm, SK Consulting focused on the creation of innovative people strategies for start-ups, primarily in the high-tech industry.