Threat Stack announced enhancements to the Threat Stack Cloud Security Platform and Cloud SecOps Program. Threat Stack now provides security and IT leaders transitioning to container-based infrastructure the expertise and enhanced security visibility necessary to effectively manage the addition of container-based cloud environments.
Threat Stack’s integrated offering minimizes risk across the attack surface, providing unparalleled visibility and actionable analytics across host and container environments.
“As organizations add containers and container orchestration to virtual environments, their attack surface is growing rapidly, requiring a new approach to security,” said Aditya Joshi, Threat Stack EVP of Products and Technology. “Our customers can now leverage Threat Stack across diverse infrastructure portfolios with unprecedented visibility into workloads no matter how their DevOps teams deploy or evolve them. They can embed security operating principles seamlessly to make certain security is planned work, and not an interruption.”
Threat Stack’s enhanced security now monitors behaviors in both the underlying host infrastructure and containers. With built-in support for CIS benchmarks and best practices, Threat Stack provides comprehensive visibility into several potential threats in containerized infrastructure:
- Container misconfiguration and unwanted changes;
- Unauthorized changes or access to secret files;
- Anomalous inbound and outbound network connections to and from containers;
- User and process activity, including shell commands executed from within containers.
These new features are now available to current Threat Stack customers.