"The number-one feature is the monitoring of interactive sessions on our Linux machines. We run an immutable environment, so that nothing is allowed to be changed in production. We're constantly monitoring to make sure that no one is violating that. Threat Stack is what allows us to do that."
"Threat Stack not only provides a full security monitoring suite in a single affordable tool, it also goes beyond industry standard tools to give you incredibly detailed insight into the activity on your systems.”
"It’s helping me achieve my goals by training my own personnel and by helping me monitor my infrastructure. Threat Stack gave me that full suite of what I need in my infrastructure security solution."
"The Threat Stack team has done a great job of digging in with us and giving us an understanding of more efficient ways to tune and act on priority alerts.”
"With Threat Stack, we quickly identified some AWS accounts which had services that would potentially be exposed and were able to remediate them prior to release of products.”
“With Threat Stack’s granular visibility into the environment, we can now enable our extended security team the rest of the organization with confidence.”
“The number-one feature is the monitoring of interactive sessions on our Linux machines. We run an immutable environment, so that nothing is allowed to be changed in production. We’re constantly monitoring to make sure that no one is violating that. Threat Stack is what allows is to do that.”
"We know that, if we detect a malicious event, we are able to go back and search to see who launched the process, what it did, what it connected to, and how to proceed."
“We were looking at security event logs before, but Threat Stack gave us better visibility into some activities on our environment that we previously did not know."
"I would definitely recommend Threat Stack to any type of organization, small or big, because it will help you achieve complete infrastructure security at an affordable cost."
“We needed an automated solution that could quickly carry out the first round of analysis, so we could then make risk-based decisions based on clear, structured evidence.”
"Not only is Threat Stack easy to deploy, it’s easy to integrate with both new and existing tools. We now have continuous visibility into our processes and activities."
“Threat Stack’s containerized agent has been key in supporting our transition to infrastructure as code, and being able to deploy our security tool as a daemonset enables us to streamline absolutely everything.”
“[Threat Stack] provides the security team with visibility into parts of the organization that were otherwise difficult to see into. We can get visibility into part of our infrastructure that we otherwise didn’t have access to or couldn’t see."
"With the features that Threat Stack provides, our conversations with even the biggest healthcare organizations have become much easier."