BOSTON--(BUSINESS WIRE)--Threat Stack, the leader in cloud infrastructure security, today announced that it has successfully completed the Type 2 Service Organization Control (SOC 2) examination of the Threat Stack Cloud Security Platform®. For the second consecutive year, Threat Stack completed the Type 2 SOC 2 examination with zero exceptions listed. Conducted by Schellman & Company, LLC, the SOC 2 examination reports on the security and availability of the Threat Stack Cloud Security Platform.
In addition to its own Type 2 SOC 2 examination, Threat Stack helps its customers simplify cloud compliance management with full stack cloud security observability, continuous monitoring, alerting, investigation, and verification of cloud infrastructure through the Threat Stack Cloud Security Platform. Threat Stack helps its customers achieve compliance with SOC 2, PCI, GDPR, ISO 270001, HIPAA, and other compliance frameworks with both pre-built compliance rulesets and the ability to create custom rulesets.
“We’re very proud to have successfully completed our Type 2 SOC 2 examination with zero exceptions for the second straight year,” said Sam Bisbee, CSO, Threat Stack. “With the help of the Threat Stack Cloud Security Platform we have greatly simplified the compliance examination process both internally and for our customers, eliminating a significant pain-point.”
For more information on how Threat Stack helps its customers achieve SOC 2, PCI, GDPR, ISO 27001, HIPAA, and other compliance frameworks visit: www.threatstack.com/cloud-compliance
About Threat Stack
Threat Stack enables DevOps and SecOps teams to innovate and scale securely by providing full stack cloud security observability from the control plane to the application layer. Purpose-built for today’s infrastructure, the Threat Stack Cloud Security Platform® and Cloud SecOps Program℠ combine cloud optimized intrusion defense, continuous security monitoring, and proactive risk assessment to help Security and Operations teams detect security incidents, achieve compliance, and deploy containers securely.
For more information or to schedule a demo, visit threatstack.com.