Threat Stack

Premium
Read 32 Threat Stack reviews and testimonials from customers, explore 18 case studies and customer success stories, and watch 5 customer videos to see why companies chose Threat Stack as their Cloud Security Tools

Threat Stack provides continuous security monitoring for public, private, and hybrid cloud infrastructures protecting servers, and the data they access, from intrusion and data loss. Built in the cloud, for the cloud, Threat Stack is the first and only intrusion detection and auditing service purpose-built for cloud environments where network-based controls cannot be deployed.

Show more
Customer Rating Review Scorebased on 2668 reference ratings
4.7/5.0 (2668)

Featured Testimonials

  • "Observability is hard in cloud environments. When you have servers you need host based detection on those systems. Threat Stack is a major component of helping Ping achieve its security goals. If you need host detection, you need Threat Stack. It’s as simple as that."

  • "The Threat Stack team has done a great job of digging in with us and giving us an understanding of more efficient ways to tune and act on priority alerts.”

  • "I selected Threat Stack because it allows me to centrally monitor the security of our systems and reassures me that no one has been on our servers since the last time we logged in."

Featured Case Studies

  • Gaining Granular Security Control with Threat Stack on AWS

  • Reducing Time to Security Incident Detection in a Complex Environment

  • ZoomInfo Tackles Security and Compliance using Threat Stack

Featured Customer Videos

Additional Threat Stack Information & Resources

Read Threat Stack Reviews, Testimonials & Customer References from 32 real Threat Stack customers.

Browse Threat Stack Case Studies, Customer Success Stories, & Customer References from 18 businesses that use Threat Stack.

Watch Threat Stack Customer Videos to learn why 5 businesses chose Threat Stack.