LAS VEGAS--(BUSINESS WIRE)--Please replace the contact information to the release dated November 14, 2014 with the following corrected contact.
The release reads:
THREAT STACK LAUNCHES CONTINUOUS SECURITY MONITORING SERVICE FOR CLOUD INFRASTRUCTURE AT AWS RE:INVENT
Solution Addresses Security & Privacy Concerns by Protecting Cloud Workloads from Intrusions & Data Loss
Threat Stack, the leading developer of purpose built cloud security solutions, announced today the general availability of its continuous security monitoring SaaS offering. On the heels of its oversubscribed beta program, Threat Stack officially launched its service at the AWS re:Invent 2014 user conference, where it was one of a handful of companies selected by Amazon Web Services (AWS) to join AWS’ CTO, Dr. Werner Vogels, on stage during his Start-up Launch Keynote address.
The Threat Stack service was created to address security and privacy needs associated with application workloads. By providing deep insight into their cloud's system activity, Threat Stack customers can add additional layers of security to protect their cloud-based servers against intrusions and data loss.
Threat Stack works with AWS to help customers meet their obligations in the shared responsibility model for security.
"We're fully committed to AWS and found that Threat Stack plays an important role in helping AWS customers meet their responsibilities within the shared security model," said Threat Stack customer, Prakash Mishra, CTO of Offerpop. "As a company that puts the security of our client's data front and center, having the ability to actively detect threats and take action is a must-have for us. Threat Stack plays a big role in helping companies like us do that."
“Amazon Web Services believes that security is paramount and welcomes new offerings that help our customers protect their workloads," said Stephen Schmidt, Chief Information Security Officer, Amazon Web Services, Inc. "Continuous security monitoring is an important element of a security architecture and we're excited to have Threat Stack as a member of the AWS Partner Network."
The introduction of a security monitoring solution built within the cloud, to protect cloud application environments, is a timely offering that addresses deployment and scalability needs to apply traditional “on-premise” solutions to the cloud.
"Cloud workloads present a unique set of needs when it comes to implementing security,” said Doug Cahill, CEO of Threat Stack. “One of them being that you can't install your traditional intrusion detection systems in the cloud because you don't have physical access to the network. Since Threat Stack uses a lightweight agent that resides on the host, it can easily be deployed using your favorite automation system and auto-scales to fit the needs of your environment. This flexibility to evolve and adapt to changing conditions is a result of our platform being built on AWS. Its unique set of web services allows us to provide our customers with a product that gives them the visibility and comprehensive coverage they need to improve their security posture across their entire cloud environment."
Threat Stack's service helps customers know their attack surface, uncover potential new threats, add color to their data, and boost their confidence and security with features such as:
Deep OS Auditing
Don’t just rely on system log files - use the definitive trail of logins, processes, network activity, and file changes from the operating system, augmented with Threat Stack’s backend intelligence.
Behavior-based Intrusion Detection
Build up your protection against zero-day attacks with host-level intrusion detection based on behavior changes, not on a signature list.
Record, zoom-in, and playback any user’s actions at any point in time, even if the machine no longer exists, using our TTY timeline.
Our platform monitors and records all the activity happening in your cloud, and sounds the alarms if suspicious behavior is detected. Get notified if a new node is seen on the network, if there are unauthorized configuration changes, unauthorized changes to your configuration or system, new users, changes to access rights, and anomalous behavior of any kind.
File Integrity Monitoring
Our event-driven, real-time, file integrity monitoring capability allows us to notice changes quicker, and at a lower system resource cost than previously used techniques.
DevOps Enabled Deployment
Threat Stack integrates with your favorite configuration management platforms such as Chef, Puppet and Ansible to easily deploy agents for maximum security.
Audit and correlate on Amazon Elastic Compute Cloud (Amazon EC2) instances to provide better context and determine the percentage of your infrastructure Threat Stack is protecting.
Threat Stack currently offers a 14-day, free trial of its software-as-a-service. Interested parties can sign up on the company's website: www.threatstack.com (AWS usage fees apply)
About Threat Stack
Threat Stack provides continuous security monitoring for public, private, and hybrid cloud infrastructures protecting servers, and the data they access, from intrusion and data loss. Built in the cloud, for the cloud, Threat Stack is the first and only intrusion detection and auditing service purpose-built for cloud environments where network-based controls cannot be deployed. Threat Stack is lead by a team with extensive security and cloud computing experience from companies such as Mandiant, Cloudant, Symantec, Bit9, Juniper, and Dyn. Threat Stack is headquartered in Cambridge, MA. For more information visit https://www.threatstack.com.