BOSTON--(BUSINESS WIRE)--Threat Stack, the leader in cloud security and compliance for infrastructure and applications, today announced new capabilities that help security teams quickly detect and remediate threats in cloud infrastructure.
Threat Stack now enriches Linux host and container events in real time with EC2 metadata like VPC, security group, and DNS names. This added data allows customers to build targeted, infrastructure-aware rules, and machine learning models that dramatically reduce false positives and reduce alert investigation time to minutes.
By correlating workload events with cloud trail events in the Threat Stack Cloud Security Platform, Threat Stack customers will also be able to more rapidly identify threats that span multiple layers of cloud infrastructure.
Finally, enriching workload events with EC2 metadata further informs ThreatML, Threat Stack’s machine learning engine that collects, normalizes, and analyzes over 60 billion events per day from customer cloud infrastructure. Threat Stack combines the anomaly detection from ThreatML with a pre-built and configurable ruleset to detect both known and unknown threats in real time.
“With insight into every layer of cloud infrastructure, Threat Stack already had the most in-depth and broad security telemetry in the industry today," said Brian Ahern, CEO, Threat Stack. “The addition of EC2 metadata to our security telemetry is a huge win for our customers as it enables security teams to further reduce their mean time and get back to focusing on proactive security faster.”
To learn more about this release and how Threat Stack leverages the industry’s most advanced cloud security telemetry visit our blog.
About Threat Stack
Threat Stack is the leader in cloud security and compliance for infrastructure and applications, helping companies securely leverage the business benefits of the cloud with proactive risk identification and real-time threat detection across cloud workloads. The Threat Stack Cloud Security Platform® delivers full stack security observability across the cloud management console, host, container, orchestration, managed containers, and serverless layers. Threat Stack provides the flexibility to consume telemetry within existing security workflows — or manages it with you through the Threat Stack Cloud SecOps Program℠ so you can respond to security incidents and improve your organization’s cloud security posture over time.
For more information or to schedule a free demo, visit threatstack.com.