29 total resources.

Case Study
Salesloft Case Study

Learn how Salesloft works with Threat Stack to secure their cloud environment, and leverages the Oversight 24/7/265 SOC to support their cloud ...

Case Study
Threat Stack anchors disaster recovery for its authentication service on Amazon Aurora

View Resource

Testimonial
Threat Stack Testimonial – Philip Gavlan, Wag!

Learn how Wag! uses Threat Stack to secure their AWS ECS infrastructure in this video ...

Testimonial
Threat Stack Testimonial – Ryan Ivis, Ping Identity

Learn how Ping Identity uses Threat Stack to improve their security observability using REST API to create actionable insights in their AWS ...

Case Study
Ping Identity Case Study

Learn how Ping Identity moved from an open source tool to Threat Stack to gain enhanced security observability within their existing ...

Case Study
Wag! Case Study

Learn how Threat Stack secures Wag!'s AWS ECS environment to gain run time visibility into containers. ...

Case Study
Springbuk Case Study

Learn how Springbuk uses Threat Stack to monitor their entire cloud infrastructure including EC2, ECS, host, and containers. ...

Case Study
Omada Health Case Study

Omada Health uses Threat Stack to help them secure their cloud infrastructure and maintain HIPAA ...

Case Study
Ayla Networks Case Study

Ayla Networks uses Threat Stack to improve their cloud-native security and compliance program with a small DevOps ...

Testimonial
IT Central Customer Reviews

A summary of the top customer reviews collected by IT Central Station in ...

Testimonial
Overseeing and Maintaining an AWS Cloud Environment With Threat Stack – Lola

With Threat Stack, you can manage all your agents to see the tasks they’re performing while being able to spot any irregularities in your network. ...

Case Study
Stratasan Case Study

Learn how Stratasan worked with Threat Stack to streamline HIPAA compliance and increase security ...

Case Study
Highfive Case Study

View Resource

Testimonial
Threat Stack Testimonial – Eric Cohen, Genesys

View Resource

Case Study
Threat Stack Secures Lola’s Kubernetes-Based Infrastructure

Learn how Lola.com built a highly elastic and scalable containerized infrastructure while maintaining PCI compliance and security confidence in their ...

Testimonial
Container Security: Taking a Layered Approach to Infrastructure Security

View Resource

Testimonial
Threat Stack Testimonial – Remi Cattiau, Nuxeo

View Resource

Case Study
How to Build and Mature a SecOps Program in the Cloud

View Resource

Testimonial
Threat Stack Testimonial – Martin Rues, Outreach

Outreach CISO, Martin Rues, describes how Threat Stack gives him visibility into his cloud infrastructure, while supplementing his team with experts ...

Video
Threat Stack Explainer Video

View Resource

Webinar
How to Build and Mature a SecOps Program in the Cloud

Watch this video for practical advice to help you build and mature a cloud secops program for your ...