Threat Stack Announces Enhanced Support for Businesses Transitioning to Container-Based Infrastructure and Kubernetes
May 23 2018 - 8:30AM
Business Wire
Threat Stack® Cloud SecOps Program Now Offers
Businesses Enhanced Visibility and Expertise to Effectively Manage
Container-Based Cloud Environments
Threat Stack, the leader in Cloud Infrastructure Security, today
announced enhancements to the Threat Stack Cloud Security Platform®
and Cloud SecOps Program. Threat Stack now provides security and IT
leaders transitioning to container-based infrastructure the
expertise and enhanced security visibility necessary to effectively
manage the addition of container-based cloud environments.
Gartner estimates that 50 percent of companies will use
container technology by 2020, up from less than 20 percent in 2017.
Operations teams are accelerating the transition to container-based
infrastructure to reduce operational complexity; however, even when
adding containers and kubernetes, they frequently underestimate the
visibility required in these complex, heterogeneous environments.
Threat Stack’s integrated offering minimizes risk across the attack
surface, providing unparalleled visibility and actionable analytics
across host and container environments.
“As organizations add containers and container orchestration to
virtual environments, their attack surface is growing rapidly,
requiring a new approach to security,” said Aditya Joshi, Threat
Stack EVP of Products and Technology. “Our customers can now
leverage Threat Stack across diverse infrastructure portfolios with
unprecedented visibility into workloads no matter how their DevOps
teams deploy or evolve them. They can embed security operating
principles seamlessly to make certain security is planned work, and
not an interruption.”
Threat Stack’s enhanced security now monitors behaviors in both
the underlying host infrastructure and containers. With built-in
support for CIS benchmarks and best practices, Threat Stack
provides comprehensive visibility into several potential threats in
containerized infrastructure:
- Container misconfiguration and unwanted
changes;
- Unauthorized changes or access to
secret files;
- Anomalous inbound and outbound network
connections to and from containers;
- User and process activity, including
shell commands executed from within containers.
These new features are now available to current Threat Stack
customers.
To learn more about how Threat Stack secures cloud
infrastructures in transition, please go to Securing Containerized
Environments, or view the company’s latest video: Securing Evolving
Infrastructures.
About Threat StackThreat Stack enables growth-driven
companies to scale securely and meet complex cloud security needs
by identifying and verifying insider threats, external attacks, and
data loss in real time. Purpose-built for today’s infrastructure,
the Threat Stack Cloud Security Platform and Cloud SecOps Program
combine continuous security monitoring and risk assessment to
empower security and operations teams to better manage risk and
compliance across their entire infrastructure, including cloud,
hybrid-cloud, multi-cloud, and containerized environments.
For more information, or to start a free cloud security trial,
visit threatstack.com.
View source
version on businesswire.com: https://www.businesswire.com/news/home/20180523005283/en/
fama PR for Threat StackTed Weismann,
617-986-5009threatstack@famapr.com