Threat Stack

Premium
Read 32 Threat Stack reviews and testimonials from customers, explore 18 case studies and customer success stories, and watch 5 customer videos to see why companies chose Threat Stack as their Cloud Security Tools

Threat Stack provides continuous security monitoring for public, private, and hybrid cloud infrastructures protecting servers, and the data they access, from intrusion and data loss. Built in the cloud, for the cloud, Threat Stack is the first and only intrusion detection and auditing service purpose-built for cloud environments where network-based controls cannot be deployed.

Show more
Customer Rating Review Scorebased on 2732 reference ratings
4.7/5.0 (2732)

Featured Testimonials

  • "Threat Stack gives us full visibility into exactly what is happening, at anytime."

  • "We know that, if we detect a malicious event, we are able to go back and search to see who launched the process, what it did, what it connected to, and how to proceed."

  • “By integrating Threat Stack with our AWS Profiles and leveraging the host agent, we innovated knowing that we would be alerted if anything was out of line with best practices.”

Featured Case Studies

  • Simple - Customer Case Study

  • Threat Stack Helps Ping Identity Achieve Cloud Security Observability in Rapidly Scaling Environment

  • Threat Stack Secures Highfive’s Evolving Infrastructure

Featured Customer Videos

Additional Threat Stack Information & Resources

Read Threat Stack Reviews, Testimonials & Customer References from 32 real Threat Stack customers.

Browse Threat Stack Case Studies, Customer Success Stories, & Customer References from 18 businesses that use Threat Stack.

Watch Threat Stack Customer Videos to learn why 5 businesses chose Threat Stack.