Only cloud security provider to offer alert tags to accelerate incident resolution; Daily vulnerability reporting including Amazon Machine Images (AMI) IDs
BOSTON – June 16, 2016 – Threat Stack, a leader in cloud security and compliance management, today announced feature enhancements designed to speed up security team velocity and improve efficiency with new alert tags and vulnerability management reporting capabilities of the Threat Stack Cloud Security Platform™ (CSP). Threat Stack CSP alert tags and vulnerability reporting provides security and operations users with previously unattainable, in-depth context about AWS instances, improves security incident response and allows organizations to easily track and manage vulnerabilities with detailed, easy-to-follow daily reports.
“Both alert tags and vulnerability reports are features that enable customers to get even more visibility into what is happening on each server, across the infrastructure, saving hours of investigation during critical events or in depth audits,” said Venkat Pothamsetty, vice president of products and customer advocacy, Threat Stack. “We continue to work tirelessly to deliver features and enhancements that help to securely increase security and ops efficiency and productivity.”
Threat Stack’s alert tags integrate host data alerts with infrastructure tag information to provide detailed server-specific context to each alert. By clicking on a tag, users can now easily see the process details and cloud context behind each alert, including identifying the user that may have been involved. Typically, this level of detail is only attainable through hours spent manually reviewing logs. By automatically identifying which server the alert is related to, these tags enable security engineers to resolve the issue in minutes instead of hours. Over time, these alerts will provide even more context as the CSP scours increasing amounts of data.
Daily vulnerability reporting from Threat Stack gives users a comprehensive breakdown of system-wide vulnerabilities including Amazon Machine Images (AMI) ID’s for Amazon EC2 users, not commonly available in traditional vulnerability reports. This level of reporting not only provides details on remedial actions or Common Vulnerabilities and Exposures (CVE) management, but also creates a record to demonstrate daily vulnerability management in case of an audit.
“Threat Stack provides an unmatched level of security and visibility across our infrastructure,” said Jon Debonis, VP of Information Security/CISO, Blend Labs. “Using one single dashboard, we always know who is doing what on our machines saving us hours of investigation and reducing our time to resolution.”
Both features are now immediately available to all Threat Stack users. For more information on Threat Stack, please visithttps://threatstack.com.
About Threat Stack
Threat Stack enables growth-driven companies to scale with confidence by identifying and verifying insider threats, external attacks and data loss in real-time. The only fully integrated, cloud-native continuous monitoring solution that gives customers instant visibility and automatically responds to changes in their environment, Threat Stack provides the coverage needed to run secure and compliant, in all environments, without sacrificing speed and efficiency. For more information, or to start a free trial, visit threatstack.com.