Receive awards updates:

Promote this Nomination

threat-stack-logo (1)
TS2TS1
  • Company (that provides the nominated product / solution / service): Threat Stack, Inc
  • Website: http://www.threatstack.com
  • Company size (employees): 100 to 499
  • Country: United States
  • Type of solution: Cloud/SaaS
  • Approximate number of users worldwide: Threat Stack's platform is deployed across more than 45,000 instances with over 1,800 users worldwide

What other awards did this nomination receive in the previous 12 months?

N/A

In 3 bullets, summarize why this product or service is different from the competition and deserves recognition:

- Threat Stack takes a behavior-based approach to security rather than the traditional signature-based approach. This detects malicious behavior much higher up the cyber kill chain before anything is actually executed and the infrastructure is compromised.

- It manages all back-end security operations from a single platform. Host-based IDS is the core of Threat Stack, but it also enables users to manage file integrity, understand all user and file actions, know where instances are connecting out to, who is trying to ping servers, know what vulnerabilities exist, and audit the configuration of their services.

- Out-of-the-box rulesets cover most any use case one would have at a higher level, and are all easily customizable to fit specific use cases. Threat Stack also shoulders the data processing load to minimize resource consumption on the user’s instances. Because of this, there is about 1–3% CPU consumption on the user’s box and no need to spin up additional instances to support Threat Stack.

Description

Threat Stack is a comprehensive Intrusion Detection Platform. With host-based IDS at the core, Threat Stack incorporates File Integrity Monitoring, Vulnerability Management, Threat Intelligence, and Configuration Auditing to deliver a full security platform that monitors for internal and external threats and answers the question of who did what, where, and when. Users are alerted in real time to potentially malicious activity and are provided with the best context possible around the alert, which reduces mean time to know about and resolve the issue from hours to minutes.

At Threat Stack, we’re adapting with our customers and the market as a whole as more teams shift towards a DevOps mindset. Direct integrations with configuration management, chatops, and containerization tools give Threat Stack users the confidence to move at the speed of DevOps without security coming up as a blocker at the end of a project, but rather a continuous check on everything being developed and pushed to production.

Sign Up for
Cybersecurity Excellence Awards Updates

Sign up for your award updates! Join thousands of cybersecurity marketers and professionals to receive the latest news about the upcoming Cybersecurity Excellence Awards.

Sign Up for
Cybersecurity Excellence Awards Updates

Sign up for your award updates! Join thousands of cybersecurity marketers and professionals to receive the latest news about the upcoming Cybersecurity Excellence Awards.