We primarily use the solution for threat and vulnerability management. We look at it for cloud security. It ingests logs, however, it also has an agent that runs on the servers. It picks up vulnerabilities in-house. It has rules for different types of like actions that could be considered, in terms of suspicious or malicious activity. We pretty much audit and we can to pick out and do remediation or prevent potential attacks.
Our primary use case for Threat Stack comes from the fact that we are a smaller company and we don't have dedicated security resources. The biggest thing we need is auditing logs and the agent on all of our machines, and then using their SecOps program to help us filter and analyze that data, because we obviously don't have the manpower to do that. So our biggest use case is collecting all the data, having them there to watch our backs and to help give us recommendations on what we can fix, and to help us in case there is an incident, where they can help us track everything.
Sr. Director Information and Security for PureCloud at Genesys Telecommunications Laboratories
Real User
2019-03-31T09:41:00Z
Mar 31, 2019
We're using Threat Stack for multiple purposes. We use it for file integrity management and we also use it as an intrusion detector, using it to monitor the interactive sessions on our Linux machines. We also do CloudTrail analysis and alerting.
Our primary use case is to validate our AWS configurations, as well as to provide endpoint protection to our hosts in the cloud. Our primary use of the tool is to gain actionable insights into our cloud infrastructure. The dashboard and daily audits of our environments give us a plan of action for items that we may need to remediate going forward, or for new resources which may need a configuration checkup.
Learn what your peers think about Threat Stack Cloud Security Platform. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
It is a daily visibility and alerting tool for both general security as well as SOX compliance. We use it to monitor privilege escalation, access to our AWS environment, EC2 instances, spotting of EC2 instances, etc., as well as vulnerability and patch management. We have the standard threat visibility dashboard and alerting platform and we also have their assisted service they launched mid last year, a monthly threat evaluation/vulnerability assessment which they send.
The primary use case of Threat Stack, is the file integrity monitoring. If any change happens at the file level on the net server, then it should send us a report back.
Threat Stack Cloud Security Platform is a CWPP (Cloud Workload Protection Platform) that provides your organization with comprehensive security for modern applications and APIs. It is designed specifically for monitoring cloud environments, vulnerabilities, covering workloads, infrastructure, and compliance. The solution offers application infrastructure protection for all layers of your infrastructure stack and delivers the necessary observability for proactive and targeted remediation...
We primarily use the solution for threat and vulnerability management. We look at it for cloud security. It ingests logs, however, it also has an agent that runs on the servers. It picks up vulnerabilities in-house. It has rules for different types of like actions that could be considered, in terms of suspicious or malicious activity. We pretty much audit and we can to pick out and do remediation or prevent potential attacks.
Our primary use case for Threat Stack comes from the fact that we are a smaller company and we don't have dedicated security resources. The biggest thing we need is auditing logs and the agent on all of our machines, and then using their SecOps program to help us filter and analyze that data, because we obviously don't have the manpower to do that. So our biggest use case is collecting all the data, having them there to watch our backs and to help give us recommendations on what we can fix, and to help us in case there is an incident, where they can help us track everything.
We're using Threat Stack for multiple purposes. We use it for file integrity management and we also use it as an intrusion detector, using it to monitor the interactive sessions on our Linux machines. We also do CloudTrail analysis and alerting.
Our primary use case is security.
Our primary use case is to validate our AWS configurations, as well as to provide endpoint protection to our hosts in the cloud. Our primary use of the tool is to gain actionable insights into our cloud infrastructure. The dashboard and daily audits of our environments give us a plan of action for items that we may need to remediate going forward, or for new resources which may need a configuration checkup.
We have multiple use cases of equal importance: * endpoint security * cloud platform monitoring * orchestration security.
It is a daily visibility and alerting tool for both general security as well as SOX compliance. We use it to monitor privilege escalation, access to our AWS environment, EC2 instances, spotting of EC2 instances, etc., as well as vulnerability and patch management. We have the standard threat visibility dashboard and alerting platform and we also have their assisted service they launched mid last year, a monthly threat evaluation/vulnerability assessment which they send.
The primary use case of Threat Stack, is the file integrity monitoring. If any change happens at the file level on the net server, then it should send us a report back.