32 Threat Stack Testimonials

Industry
Company Size
15 per page
  • 15
Reset
  • "Observability is hard in cloud environments. When you have servers you need host based detection on those systems. Threat Stack is a major component of helping Ping achieve its security goals. If you need host detection, you need Threat Stack. It’s as simple as that."

  • "Not only is Threat Stack easy to deploy, it’s easy to integrate with both new and existing tools. We now have continuous visibility into our processes and activities."

  • “[Threat Stack] provides the security team with visibility into parts of the organization that were otherwise difficult to see into. We can get visibility into part of our infrastructure that we otherwise didn’t have access to or couldn’t see."

  • “We were looking at security event logs before, but Threat Stack gave us better visibility into some activities on our environment that we previously did not know."

  • “The number-one feature is the monitoring of interactive sessions on our Linux machines. We run an immutable environment, so that nothing is allowed to be changed in production. We’re constantly monitoring to make sure that no one is violating that. Threat Stack is what allows is to do that.”

  • “Threat Stack’s containerized agent has been key in supporting our transition to infrastructure as code, and being able to deploy our security tool as a daemonset enables us to streamline absolutely everything.”

  • "Threat Stack gives us full visibility into exactly what is happening, at anytime."

  • “Every other security tool we’ve looked is good at containers, or at Kubernetes, is good at AWS, or at instance monitoring. But nobody is good at tying all of those things together, and that’s really where Threat Stack shines.”

  • “Threat Stack saved us hours previously spent chasing down security events, eliminating the need to hire another security resource."

  • "The number-one feature is the monitoring of interactive sessions on our Linux machines. We run an immutable environment, so that nothing is allowed to be changed in production. We're constantly monitoring to make sure that no one is violating that. Threat Stack is what allows us to do that."

  • "Threat Stack not only provides a full security monitoring suite in a single affordable tool, it also goes beyond industry standard tools to give you incredibly detailed insight into the activity on your systems.”

  • “With Threat Stack’s granular visibility into the environment, we can now enable our extended security team the rest of the organization with confidence.”

  • "With Threat Stack, we can keep customer data safe and proactively strengthen our security posture instead of spending all our time reacting to events. If something happens, meaningful real-time alerts help us carry out rapid remediation. We have peace of mind knowing that our customers can trust us because we …

  • "With Threat Stack, we quickly identified some AWS accounts which had services that would potentially be exposed and were able to remediate them prior to release of products.”

  • “Threat Stack enabled us to meet several PCI requirements simultaneously with one solution.”