32 Threat Stack Testimonials

Industry
Company Size
15 per page
  • 15
Reset
  • "I would definitely recommend Threat Stack to any type of organization, small or big, because it will help you achieve complete infrastructure security at an affordable cost."

  • "We know that, if we detect a malicious event, we are able to go back and search to see who launched the process, what it did, what it connected to, and how to proceed."

  • "Threat Stack not only provides a full security monitoring suite in a single affordable tool, it also goes beyond industry standard tools to give you incredibly detailed insight into the activity on your systems.”

  • “Threat Stack’s containerized agent has been key in supporting our transition to infrastructure as code, and being able to deploy our security tool as a daemonset enables us to streamline absolutely everything.”

  • “Threat Stack saved us hours previously spent chasing down security events, eliminating the need to hire another security resource."

  • "The number-one feature is the monitoring of interactive sessions on our Linux machines. We run an immutable environment, so that nothing is allowed to be changed in production. We're constantly monitoring to make sure that no one is violating that. Threat Stack is what allows us to do that."

  • “Threat Stack has saved us hours that we previously spent chasing down security events across a complex, immutable environment. As a result, we have eliminated the need to hire another full-time security person.”

  • “[Threat Stack] provides the security team with visibility into parts of the organization that were otherwise difficult to see into. We can get visibility into part of our infrastructure that we otherwise didn’t have access to or couldn’t see."

  • “We were looking at security event logs before, but Threat Stack gave us better visibility into some activities on our environment that we previously did not know."

  • "Every other security tool we've looked at is good at containers, or at Kubernetes, is good at AWS, or at instance monitoring. But nobody is good at tying all of those things together, and that's really where Threat Stack shines."

  • “Threat Stack enabled us to meet several PCI requirements simultaneously with one solution.”

  • "Having the actual SOC 2 framework dictate our actual controls has been extremely helpful for our other ones (HIPAA, GDPR). Extremely easy."

  • “By integrating Threat Stack with our AWS Profiles and leveraging the host agent, we innovated knowing that we would be alerted if anything was out of line with best practices.”

  • “Every other security tool we’ve looked is good at containers, or at Kubernetes, is good at AWS, or at instance monitoring. But nobody is good at tying all of those things together, and that’s really where Threat Stack shines.”

  • “The number-one feature is the monitoring of interactive sessions on our Linux machines. We run an immutable environment, so that nothing is allowed to be changed in production. We’re constantly monitoring to make sure that no one is violating that. Threat Stack is what allows is to do that.”