32 Threat Stack Testimonials

Industry
Company Size
15 per page
  • 15
Reset
  • “The number-one feature is the monitoring of interactive sessions on our Linux machines. We run an immutable environment, so that nothing is allowed to be changed in production. We’re constantly monitoring to make sure that no one is violating that. Threat Stack is what allows is to do that.”

  • "With Threat Stack, we can keep customer data safe and proactively strengthen our security posture instead of spending all our time reacting to events. If something happens, meaningful real-time alerts help us carry out rapid remediation. We have peace of mind knowing that our customers can trust us because we can trust Threat Stack!”

  • "Threat Stack gives us full visibility into exactly what is happening, at anytime."

  • "Threat Stack provides the coverage, scalability, and visibility we need to ensure our customers’ security in all environments without sacrificing speed or efficiency."

  • “We needed an automated solution that could quickly carry out the first round of analysis, so we could then make risk-based decisions based on clear, structured evidence.”

  • "Having the actual SOC 2 framework dictate our actual controls has been extremely helpful for our other ones (HIPAA, GDPR). Extremely easy."

  • “Threat Stack’s containerized agent has been key in supporting our transition to infrastructure as code, and being able to deploy our security tool as a daemonset enables us to streamline absolutely everything.”

  • "We like dealing with Threat Stack because they offer a complete solution. Threat Stack backs its technology with security insights and expertise through its Insight and Oversight services while most of their competitors rely on partners to provide services."

  • "I selected Threat Stack because it allows me to centrally monitor the security of our systems and reassures me that no one has been on our servers since the last time we logged in."

  • "Every other security tool we've looked at is good at containers, or at Kubernetes, is good at AWS, or at instance monitoring. But nobody is good at tying all of those things together, and that's really where Threat Stack shines."

  • “[Threat Stack] provides the security team with visibility into parts of the organization that were otherwise difficult to see into. We can get visibility into part of our infrastructure that we otherwise didn’t have access to or couldn’t see."

  • “Threat Stack enabled us to meet several PCI requirements simultaneously with one solution.”

  • “Every other security tool we’ve looked is good at containers, or at Kubernetes, is good at AWS, or at instance monitoring. But nobody is good at tying all of those things together, and that’s really where Threat Stack shines.”

  • “Threat Stack saved us hours previously spent chasing down security events, eliminating the need to hire another security resource."

  • "The number-one feature is the monitoring of interactive sessions on our Linux machines. We run an immutable environment, so that nothing is allowed to be changed in production. We're constantly monitoring to make sure that no one is violating that. Threat Stack is what allows us to do that."