Press Release

Threat Stack Announces Enhanced Support for Businesses Transitioning to Container-Based Infrastructure and Kubernetes

Threat Stack® Cloud SecOps Program Now Offers Businesses Enhanced Visibility and Expertise to Effectively Manage Container-Based Cloud Environments

BOSTON — May 23, 2018 — Threat Stack, the leader in Cloud Infrastructure Security, today announced enhancements to the Threat Stack Cloud Security Platform® and Cloud SecOps Program. Threat Stack now provides security and IT leaders transitioning to container-based infrastructure the expertise and enhanced security visibility necessary to effectively manage the addition of container-based cloud environments.

Gartner estimates that 50 percent of companies will use container technology by 2020, up from less than 20 percent in 2017. Operations teams are accelerating the transition to container-based infrastructure to reduce operational complexity; however, even when adding containers and kubernetes, they frequently underestimate the visibility required in these complex, heterogeneous environments. Threat Stack’s integrated offering minimizes risk across the attack surface, providing unparalleled visibility and actionable analytics across host and container environments.

“As organizations add containers and container orchestration to virtual environments, their attack surface is growing rapidly, requiring a new approach to security,” said Aditya Joshi, Threat Stack EVP of Products and Technology. “Our customers can now leverage Threat Stack across diverse infrastructure portfolios with unprecedented visibility into workloads no matter how their DevOps teams deploy or evolve them. They can embed security operating principles seamlessly to make certain security is planned work, and not an interruption.”

Threat Stack’s enhanced security now monitors behaviors in both the underlying host infrastructure and containers. With built-in support for CIS benchmarks and best practices, Threat Stack provides comprehensive visibility into several potential threats in containerized infrastructure:

  • Container misconfiguration and unwanted changes;
  • Unauthorized changes or access to secret files;
  • Anomalous inbound and outbound network connections to and from containers;
  • User and process activity, including shell commands executed from within containers.

These new features are now available to current Threat Stack customers.

To learn more about how Threat Stack secures cloud infrastructures in transition, please go to Securing Containerized Environments.

About Threat Stack

Threat Stack enables growth-driven companies to scale securely and meet complex cloud security needs by identifying and verifying insider threats, external attacks, and data loss in real time. Purpose-built for today’s infrastructure, the Threat Stack Cloud Security Platform and Cloud SecOps Program combine continuous security monitoring and risk assessment to empower security and operations teams to better manage risk and compliance across their entire infrastructure, including cloud, hybrid-cloud, multi-cloud, and containerized environments.

For more information, or to start a free cloud security trial, visit

Media Contact

fama PR for Threat Stack
Ted Weismann, 617-986-5009
[email protected]