threat-stack

Cloud Pinup: Threat Stack – Provides Added Security

Threat Stack

Leading cloud security company Threat Stack has launched an exciting new service ‘Oversight' that promises to add a highly-effective layer of automated security monitoring services. Oversight aims to provide real-time and continuous monitoring of a company's assets, and to warn customers of potential security threats as they emerge, giving security experts a valuable tool to increase response times and response effectiveness.

CloudTweaks reached out to CEO Brian Ahern for his views on the new Oversight service:

brian-ahernThreat Stack is the only public cloud security solution that leverages behavioral modeling inside the workload (server), in conjunction with log file alerts, to identify insider threats, external threats and data loss, while also assisting clients with regulatory reporting requirements. Other signature-based, vulnerability management and log-only solutions provide insufficient context to real threats inside public cloud workloads. Through a combination of our leading security approach with our world-class InfoSec team, the Oversight managed service allows companies to use their human capital to keep the business moving forward while counting on Threat Stack to monitor their cyber risk.

What makes Oversight interesting is its hands off nature. Fact is, hiring security staff, or contracting staff work out to security firms isn't cheap. Oversight can keep costs low by automating much of the work. Oversight won't be able to replace security staff for most companies, but it will add an extra, cost-effective layer of security. Threat Stack also gives its Oversight customers access to security professionals at their own company, who can help customize and adjust the Oversight service to make it highly effective.

Oversight works exclusively with Amazon Web Services (AWS). The service works by continuously monitoring a company's assets and then reporting when threats crop up. You can think of it as a sort of home security system for a company's web assets. When a problem arises, the alarms go off and the appropriate parties are notified, allowing them to quickly respond to the threat.

dashboard-full

By adding this layer of monitoring, Oversight will make it easier for a company's security staff to respond quickly and effectively to threats. Rather than having to add more security staff members, Oversight focuses on empowering the security staff a company already has on hand. This will help keep costs low all while increasing performance, which is key for any company operating in a competitive landscape.

Threat Stack's team consists of numerous industry experts. CEO Brian Ahern has a track record of developing disruptive products and is known industry-wide for his effective and efficient management skills. Ahern's last role was as the founder and CEO of Industrial Defender, which has since been acquired by Lockheed Martin. CTO Sam Bisbee also brings years of experience, having successfully scaled up SaaS startups, and having served as CXO at Cloudant, which was acquired by IBM. Add in Chris Gervais, the VP for engineering, who likewise has years of experience conducting high level technical development, and Threat Stack's team clearly has the skills needed to develop their products.

Unsurprisingly, Threat Stack has managed to secure major funding support from a variety of venture firms. Maria Cirino, Managing Partner from .406 Ventures, sits on the company's board of directors, as does Chris Lynch, a general partner from Atlas Ventures. Threat Stack has also secured partnerships with Amazon Web Services, Redhat, Google Cloud Platform, and Microsoft Azure, among others. Threat Stack is based out of Boston.

By Brian Brinker

CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in cloud connected technology information and consultancy services.

Are you a cloud services expert in a world of digital transformation? If so, contact us for information on how to become part of our growing cloud consultancy ecosystem.

CONTRIBUTORS

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

DDoS Attacks October 21st, 2016 went into the annals of Internet history for the large scale Distributed Denial of Service (DDoS) ...
How Big Data Can Empower Native Ads

How Big Data Can Empower Native Ads

Empower Native Ads The realm of big data is expanding an astonishing rate, and its presence can be felt across ...
Scale Matters in the Enterprise Cloud

Scale Matters in the Enterprise Cloud

The Enterprise Cloud What used to be an unknown and mysterious term, “the cloud” is now a common and mostly ...
Battle of the Clouds: Multi-Instance vs. Multi-Tenant Architecture

Battle of the Clouds: Multi-Instance vs. Multi-Tenant Architecture

Multi-Instance vs. Multi-Tenant Architecture  The cloud is part of everything we do. It’s always there backing up our data, pictures, ...
Two 2017 Trends From A Galaxy Far, Far Away

Two 2017 Trends From A Galaxy Far, Far Away

Reaching For The Stars People who know me know that I’m a huge Star Wars fan. I recently had the ...
Bryan Doerr

Cyber-Threats and the Need for Secure Industrial Control Systems

Secure Industrial Control Systems (ICS) Industrial Control Systems (ICS) tend to be “out of sight, out of mind.” These systems ...
The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the ...
Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and ...
Why ‘Data Hoarding’ Increases Cybersecurity Risk

Why ‘Data Hoarding’ Increases Cybersecurity Risk

Data Hoarding The proliferation of data and constant growth of content saved on premise, in cloud storage, or a non-integrated ...
Imminent IoT Eye-Tracking Technologies To Transform The Connected World

Imminent IoT Eye-Tracking Technologies To Transform The Connected World

IoT Eye Tracking Smelling may be the first of the perceptible senses, but the eye is the fastest moving organ ...

NEWS

Deloitte TMT Predictions: Machine Learning Deployments, On-Demand Content and Live Events Will Continue to Drive Growth

Deloitte TMT Predictions: Machine Learning Deployments, On-Demand Content and Live Events Will Continue to Drive Growth

NEW YORK, Dec. 12, 2017 /PRNewswire/ -- Deloitte forecasts double digital growth in machine learning deployments for the enterprise, an increasing worldwide ...
email as a service

Google Data Analysis, Artificial Intelligence and Predicting Vaccine Scares

Social media trends can predict tipping points in vaccine scares Analyzing trends on Twitter and Google can help predict vaccine ...
U.S. IT Sector Employment Expands by 8,100 Jobs in November, CompTIA Analysis Reveals

U.S. IT Sector Employment Expands by 8,100 Jobs in November, CompTIA Analysis Reveals

DOWNERS GROVE, Ill., Dec. 8, 2017 /PRNewswire-USNewswire/ -- New hiring in computer and electronics manufacturing and technology services and custom ...