32 Threat Stack Testimonials

Industry
Company Size
15 per page
  • 15
Reset
  • “The number-one feature is the monitoring of interactive sessions on our Linux machines. We run an immutable environment, so that nothing is allowed to be changed in production. We’re constantly monitoring to make sure that no one is violating that. Threat Stack is what allows is to do that.”

  • "As Sigstr turns the corner from a young startup to a stable and established company, implementing a security solution like Threat Stack helps Sigstr reach the next step.”

  • “Threat Stack has saved us hours that we previously spent chasing down security events across a complex, immutable environment. As a result, we have eliminated the need to hire another full-time security person.”

  • “Threat Stack has been a great tool to have in our arsenal. We like the idea of sticking to our core business competencies healthcare, healthcare marketing, and strategic planning while being able to outsource other things that are valuable but simply outside our area of expertise. That’s why we partner …

  • "We like dealing with Threat Stack because they offer a complete solution. Threat Stack backs its technology with security insights and expertise through its Insight and Oversight services while most of their competitors rely on partners to provide services."

  • “Partnering with AWS and Threat Stack gives us an advantage that other companies don’t have. It helps set us apart as a young company playing in a mature space.”

  • "It’s helping me achieve my goals by training my own personnel and by helping me monitor my infrastructure. Threat Stack gave me that full suite of what I need in my infrastructure security solution."

  • "The Threat Stack team has done a great job of digging in with us and giving us an understanding of more efficient ways to tune and act on priority alerts.”

  • “[Threat Stack] provides the security team with visibility into parts of the organization that were otherwise difficult to see into. We can get visibility into part of our infrastructure that we otherwise didn’t have access to or couldn’t see."

  • "Observability is hard in cloud environments. When you have servers you need host based detection on those systems. Threat Stack is a major component of helping Ping achieve its security goals. If you need host detection, you need Threat Stack. It’s as simple as that."

  • “With Threat Stack’s granular visibility into the environment, we can now enable our extended security team the rest of the organization with confidence.”

  • "Threat Stack not only provides a full security monitoring suite in a single affordable tool, it also goes beyond industry standard tools to give you incredibly detailed insight into the activity on your systems.”

  • “We were looking at security event logs before, but Threat Stack gave us better visibility into some activities on our environment that we previously did not know."

  • "Having the actual SOC 2 framework dictate our actual controls has been extremely helpful for our other ones (HIPAA, GDPR). Extremely easy."

  • "We know that, if we detect a malicious event, we are able to go back and search to see who launched the process, what it did, what it connected to, and how to proceed."