32 Threat Stack Testimonials

Industry
Company Size
15 per page
  • 15
Reset
  • "With Threat Stack, we quickly identified some AWS accounts which had services that would potentially be exposed and were able to remediate them prior to release of products.”

  • “Every other security tool we’ve looked is good at containers, or at Kubernetes, is good at AWS, or at instance monitoring. But nobody is good at tying all of those things together, and that’s really where Threat Stack shines.”

  • “Partnering with AWS and Threat Stack gives us an advantage that other companies don’t have. It helps set us apart as a young company playing in a mature space.”

  • "I selected Threat Stack because it allows me to centrally monitor the security of our systems and reassures me that no one has been on our servers since the last time we logged in."

  • "With the features that Threat Stack provides, our conversations with even the biggest healthcare organizations have become much easier."

  • "Every other security tool we've looked at is good at containers, or at Kubernetes, is good at AWS, or at instance monitoring. But nobody is good at tying all of those things together, and that's really where Threat Stack shines."

  • “By integrating Threat Stack with our AWS Profiles and leveraging the host agent, we innovated knowing that we would be alerted if anything was out of line with best practices.”

  • “Threat Stack saved us hours previously spent chasing down security events, eliminating the need to hire another security resource."

  • "The number-one feature is the monitoring of interactive sessions on our Linux machines. We run an immutable environment, so that nothing is allowed to be changed in production. We're constantly monitoring to make sure that no one is violating that. Threat Stack is what allows us to do that."

  • “[Threat Stack] provides the security team with visibility into parts of the organization that were otherwise difficult to see into. We can get visibility into part of our infrastructure that we otherwise didn’t have access to or couldn’t see."

  • “Threat Stack’s containerized agent has been key in supporting our transition to infrastructure as code, and being able to deploy our security tool as a daemonset enables us to streamline absolutely everything.”

  • "The Threat Stack team has done a great job of digging in with us and giving us an understanding of more efficient ways to tune and act on priority alerts.”

  • “Threat Stack has been a great tool to have in our arsenal. We like the idea of sticking to our core business competencies healthcare, healthcare marketing, and strategic planning while being able to outsource other things that are valuable but simply outside our area of expertise. That’s why we partner …

  • “The number-one feature is the monitoring of interactive sessions on our Linux machines. We run an immutable environment, so that nothing is allowed to be changed in production. We’re constantly monitoring to make sure that no one is violating that. Threat Stack is what allows is to do that.”

  • "I would definitely recommend Threat Stack to any type of organization, small or big, because it will help you achieve complete infrastructure security at an affordable cost."