BOSTON - February 2, 2017 --
Threat Stack, the leader in cloud-native security and compliance management, today announced the launch of its new packaging model for the Threat Stack Cloud Security Platform® (CSP), strengthening the company’s commitment to customers of all sizes throughout their cloud maturity. Each package is custom built to align with three Cloud Security Maturity phases: Auditing the environment; Continuously monitoring and alerting; Investigating events and remediation. This new model enables the security of a customer’s journey from just getting started in the cloud to an approach focused on analysis, investigation and remediation.
“Traditionally companies amass several tools as security maturity evolves over time, becoming costly and resource intensive,” said Brian M. Ahern, Chairman and CEO, Threat Stack. “The new Threat Stack Cloud Security Platform® packaging is designed to enhance security visibility, reduce operating costs and maximize company resources through flexible package selection aligning with company security maturity and infrastructure security requirements.”
Threat Stack CSP is now available in three package options:
According to Gartner, Inc., “Effective control over the use of cloud computing is not about saying ‘no’; it’s about having the ability to know what is being done within the public cloud, and to provide affirmative answers to questions from managers, board members, auditors, regulators and partner organizations that cloud computing is being used effectively and appropriately, utilizing the innate advantages of the product model to reduce the potential for security incidents.”1 Threat Stack CSP provides the visibility and reporting capabilities across all its package options to ensure the effective and appropriate use of the cloud.
Unlike point solutions currently on the market, Threat Stack CSP offers the breadth of security capabilities needed to improve an organization’s cloud security posture in one integrated, cloud native platform. Those capabilities include AWS configuration auditing, host intrusion detection, vulnerability assessment, threat intelligence and workflow integrations.
To learn more about Threat Stack CSP’s new package options, or to schedule a live demo, please visit https://www.threatstack.com/plans.
1 Gartner, Clouds Are Secure: Are You Using Them Securely? , Jay Heiser, July 2016[H1]
About Threat Stack
Threat Stack enables growth-driven companies to scale with confidence by identifying and verifying insider threats, external attacks and data loss in real-time. The only fully integrated, cloud-native continuous monitoring solution that gives customers instant visibility and automatically responds to changes in their environment, Threat Stack provides the coverage needed to run secure and compliant, in all environments, without sacrificing speed and efficiency. For more information, or to start a free trial, visit threatstack.com.
Lindsay Sollima
fama PR for Threat Stack
(617) 986-5026
threatstack@famapr.com