DevOps.com

  • Latest
    • Articles
    • Features
    • Most Read
    • News
    • News Releases
  • Topics
    • AI
    • Continuous Delivery
    • Continuous Testing
    • Cloud
    • Culture
    • DevSecOps
    • Enterprise DevOps
    • Leadership Suite
    • DevOps Practice
    • ROELBOB
    • DevOps Toolbox
    • IT as Code
  • Videos/Podcasts
    • DevOps Chats
    • DevOps Unbound
  • Webinars
    • Upcoming
    • On-Demand Webinars
  • Library
  • Events
    • Upcoming Events
    • On-Demand Events
  • Sponsored Communities
    • AWS Community Hub
    • CloudBees
    • IT as Code
    • Rocket on DevOps.com
    • Traceable on DevOps.com
    • Quali on DevOps.com
  • Related Sites
    • Techstrong Group
    • Container Journal
    • Security Boulevard
    • Techstrong Research
    • DevOps Chat
    • DevOps Dozen
    • DevOps TV
    • Digital Anarchist
  • Media Kit
  • About
  • AI
  • Cloud
  • Continuous Delivery
  • Continuous Testing
  • DevSecOps
  • Leadership Suite
  • Practices
  • ROELBOB
  • Low-Code/No-Code
  • IT as Code
  • More Topics
    • Application Performance Management/Monitoring
    • Culture
    • Enterprise DevOps

Home » News » Threat Stack Speeds Up Cloud Security Operations with New Alert Tagging and Daily Vulnerability Management Reporting

Threat Stack Speeds Up Cloud Security Operations with New Alert Tagging and Daily Vulnerability Management Reporting

By: Miles Blatstein on June 17, 2016 Leave a Comment

Only cloud security provider to offer alert tags to accelerate incident resolution; Daily vulnerability reporting including Amazon Machine Images (AMI) IDs

Recent Posts By Miles Blatstein
  • New Alluxio Release Accelerates Cloud Deployments for Analytics and Machine Learning
  • New Survey Identifies Major Gaps in Fast Data Use Despite Large Corporate Investments
  • Quali CloudShell 7.0 Helps Businesses Deliver Applications Faster with Public, Private, and Hybrid Cloud Support and Powerful Sandboxing Features
More from Miles Blatstein
Related Posts
  • Threat Stack Speeds Up Cloud Security Operations with New Alert Tagging and Daily Vulnerability Management Reporting
  • MDR for DevSecOps: How Managed Security Can Help You Shift Left
  • Threat Stack Announces Webhook API Integration Capabilities
    Related Categories
  • Latest News Releases
    Related Topics
  • cloud
  • devops
  • security
  • threat stack
  • threatstack
Show more
Show less

BOSTON – June 16, 2016 – Threat Stack, a leader in cloud security and compliance management, today announced feature enhancements designed to speed up security team velocity and improve efficiency with new alert tags and vulnerability management reporting capabilities of the Threat Stack Cloud Security Platform™ (CSP). Threat Stack CSP alert tags and vulnerability reporting provides security and operations users with previously unattainable, in-depth context about AWS instances, improves security incident response and allows organizations to easily track and manage vulnerabilities with detailed, easy-to-follow daily reports.

DevOps/Cloud-Native Live! Boston

“Both alert tags and vulnerability reports are features that enable customers to get even more visibility into what is happening on each server, across the infrastructure, saving hours of investigation during critical events or in depth audits,” said Venkat Pothamsetty, vice president of products and customer advocacy, Threat Stack. “We continue to work tirelessly to deliver features and enhancements that help to securely increase security and ops efficiency and productivity.”

Threat Stack’s alert tags integrate host data alerts with infrastructure tag information to provide detailed server-specific context to each alert. By clicking on a tag, users can now easily see the process details and cloud context behind each alert, including identifying the user that may have been involved. Typically, this level of detail is only attainable through hours spent manually reviewing logs. By automatically identifying which server the alert is related to, these tags enable security engineers to resolve the issue in minutes instead of hours. Over time, these alerts will provide even more context as the CSP scours increasing amounts of data.

Daily vulnerability reporting from Threat Stack gives users a comprehensive breakdown of system-wide vulnerabilities including Amazon Machine Images (AMI) ID’s for Amazon EC2 users, not commonly available in traditional vulnerability reports. This level of reporting not only provides details on remedial actions or Common Vulnerabilities and Exposures (CVE) management, but also creates a record to demonstrate daily vulnerability management in case of an audit.

“Threat Stack provides an unmatched level of security and visibility across our infrastructure,” said Jon Debonis, VP of Information Security/CISO, Blend Labs. “Using one single dashboard, we always know who is doing what on our machines saving us hours of investigation and reducing our time to resolution.”

Both features are now immediately available to all Threat Stack users. For more information on Threat Stack, please visithttps://threatstack.com.

About Threat Stack

Threat Stack enables growth-driven companies to scale with confidence by identifying and verifying insider threats, external attacks and data loss in real-time. The only fully integrated, cloud-native continuous monitoring solution that gives customers instant visibility and automatically responds to changes in their environment, Threat Stack provides the coverage needed to run secure and compliant, in all environments, without sacrificing speed and efficiency. For more information, or to start a free trial, visit threatstack.com.

 

Filed Under: Latest News Releases Tagged With: cloud, devops, security, threat stack, threatstack

Sponsored Content
Featured eBook
Hybrid Cloud Security 101

Hybrid Cloud Security 101

No matter where you are in your hybrid cloud journey, security is a big concern. Hybrid cloud security vulnerabilities typically take the form of loss of resource oversight and control, including unsanctioned public cloud use, lack of visibility into resources, inadequate change control, poor configuration management, and ineffective access controls ... Read More
« CloudHealth Partners with Datadog, Connecting Cloud Performance Metrics to Cloud Costs for Enterprise and Fast-Growing Technology Companies
Existential Angst »

TechStrong TV – Live

Click full-screen to enable volume control
Watch latest episodes and shows

Upcoming Webinars

Accelerating Continuous Security With Value Stream Management
Monday, May 23, 2022 - 11:00 am EDT
The Complete Guide to Open Source Licenses 2022
Monday, May 23, 2022 - 3:00 pm EDT
Building a Successful Open Source Program Office
Tuesday, May 24, 2022 - 11:00 am EDT

Latest from DevOps.com

DevSecOps Deluge: Choosing the Right Tools
May 20, 2022 | Gary Robinson
Managing Hardcoded Secrets to Shrink Your Attack Surface 
May 20, 2022 | John Morton
DevOps Institute Releases Upskilling IT 2022 Report 
May 18, 2022 | Natan Solomon
Creating Automated GitHub Bots in Go
May 18, 2022 | Sebastian Spaink
Is Your Future in SaaS? Yes, Except …
May 18, 2022 | Don Macvittie

Get The Top Stories of the Week

  • View DevOps.com Privacy Policy
  • This field is for validation purposes and should be left unchanged.

Download Free eBook

The State of Open Source Vulnerabilities 2020
The State of Open Source Vulnerabilities 2020

Most Read on DevOps.com

Why Over-Permissive CI/CD Pipelines are an Unnecessary Evil
May 16, 2022 | Vladi Sandler
Apple Allows 50% Fee Rise | @ElonMusk Fans: 70% Fake | Micro...
May 17, 2022 | Richi Jennings
Making DevOps Smoother
May 17, 2022 | Gaurav Belani
DevOps Institute Releases Upskilling IT 2022 Report 
May 18, 2022 | Natan Solomon
Why Data Lineage Matters and Why it’s so Challenging
May 16, 2022 | Alex Morozov

On-Demand Webinars

DevOps.com Webinar ReplaysDevOps.com Webinar Replays
  • Home
  • About DevOps.com
  • Meet our Authors
  • Write for DevOps.com
  • Media Kit
  • Sponsor Info
  • Copyright
  • TOS
  • Privacy Policy

Powered by Techstrong Group, Inc.

© 2022 ·Techstrong Group, Inc.All rights reserved.