32 Threat Stack Testimonials

Industry
Company Size
15 per page
  • 15
Reset
  • "It’s helping me achieve my goals by training my own personnel and by helping me monitor my infrastructure. Threat Stack gave me that full suite of what I need in my infrastructure security solution."

  • "The number-one feature is the monitoring of interactive sessions on our Linux machines. We run an immutable environment, so that nothing is allowed to be changed in production. We're constantly monitoring to make sure that no one is violating that. Threat Stack is what allows us to do that."

  • “Threat Stack has been a great tool to have in our arsenal. We like the idea of sticking to our core business competencies healthcare, healthcare marketing, and strategic planning while being able to outsource other things that are valuable but simply outside our area of expertise. That’s why we partner …

  • "With Threat Stack, we can keep customer data safe and proactively strengthen our security posture instead of spending all our time reacting to events. If something happens, meaningful real-time alerts help us carry out rapid remediation. We have peace of mind knowing that our customers can trust us because we …

  • "With Threat Stack on our side, we can say with confidence that our cloud is buckled down."

  • "Every other security tool we've looked at is good at containers, or at Kubernetes, is good at AWS, or at instance monitoring. But nobody is good at tying all of those things together, and that's really where Threat Stack shines."

  • "Observability is hard in cloud environments. When you have servers you need host based detection on those systems. Threat Stack is a major component of helping Ping achieve its security goals. If you need host detection, you need Threat Stack. It’s as simple as that."

  • "Threat Stack provides the coverage, scalability, and visibility we need to ensure our customers’ security in all environments without sacrificing speed or efficiency."

  • “Threat Stack saved us hours previously spent chasing down security events, eliminating the need to hire another security resource."

  • "With Threat Stack, we quickly identified some AWS accounts which had services that would potentially be exposed and were able to remediate them prior to release of products.”

  • “With Threat Stack’s granular visibility into the environment, we can now enable our extended security team the rest of the organization with confidence.”

  • "The Threat Stack team has done a great job of digging in with us and giving us an understanding of more efficient ways to tune and act on priority alerts.”

  • “Every other security tool we’ve looked is good at containers, or at Kubernetes, is good at AWS, or at instance monitoring. But nobody is good at tying all of those things together, and that’s really where Threat Stack shines.”

  • "We know that, if we detect a malicious event, we are able to go back and search to see who launched the process, what it did, what it connected to, and how to proceed."

  • "Threat Stack not only provides a full security monitoring suite in a single affordable tool, it also goes beyond industry standard tools to give you incredibly detailed insight into the activity on your systems.”