threat-stack

Cloud Pinup: Threat Stack – Provides Added Security

Threat Stack

Leading cloud security company Threat Stack has launched an exciting new service ‘Oversight' that promises to add a highly-effective layer of automated security monitoring services. Oversight aims to provide real-time and continuous monitoring of a company's assets, and to warn customers of potential security threats as they emerge, giving security experts a valuable tool to increase response times and response effectiveness.

CloudTweaks reached out to CEO Brian Ahern for his views on the new Oversight service:

brian-ahernThreat Stack is the only public cloud security solution that leverages behavioral modeling inside the workload (server), in conjunction with log file alerts, to identify insider threats, external threats and data loss, while also assisting clients with regulatory reporting requirements. Other signature-based, vulnerability management and log-only solutions provide insufficient context to real threats inside public cloud workloads. Through a combination of our leading security approach with our world-class InfoSec team, the Oversight managed service allows companies to use their human capital to keep the business moving forward while counting on Threat Stack to monitor their cyber risk.

What makes Oversight interesting is its hands off nature. Fact is, hiring security staff, or contracting staff work out to security firms isn't cheap. Oversight can keep costs low by automating much of the work. Oversight won't be able to replace security staff for most companies, but it will add an extra, cost-effective layer of security. Threat Stack also gives its Oversight customers access to security professionals at their own company, who can help customize and adjust the Oversight service to make it highly effective.

Oversight works exclusively with Amazon Web Services (AWS). The service works by continuously monitoring a company's assets and then reporting when threats crop up. You can think of it as a sort of home security system for a company's web assets. When a problem arises, the alarms go off and the appropriate parties are notified, allowing them to quickly respond to the threat.

dashboard-full

By adding this layer of monitoring, Oversight will make it easier for a company's security staff to respond quickly and effectively to threats. Rather than having to add more security staff members, Oversight focuses on empowering the security staff a company already has on hand. This will help keep costs low all while increasing performance, which is key for any company operating in a competitive landscape.

Threat Stack's team consists of numerous industry experts. CEO Brian Ahern has a track record of developing disruptive products and is known industry-wide for his effective and efficient management skills. Ahern's last role was as the founder and CEO of Industrial Defender, which has since been acquired by Lockheed Martin. CTO Sam Bisbee also brings years of experience, having successfully scaled up SaaS startups, and having served as CXO at Cloudant, which was acquired by IBM. Add in Chris Gervais, the VP for engineering, who likewise has years of experience conducting high level technical development, and Threat Stack's team clearly has the skills needed to develop their products.

Unsurprisingly, Threat Stack has managed to secure major funding support from a variety of venture firms. Maria Cirino, Managing Partner from .406 Ventures, sits on the company's board of directors, as does Chris Lynch, a general partner from Atlas Ventures. Threat Stack has also secured partnerships with Amazon Web Services, Redhat, Google Cloud Platform, and Microsoft Azure, among others. Threat Stack is based out of Boston.

By Brian Brinker

CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in cloud connected technology information and consultancy services.

Are you a cloud services expert in a world of digital transformation? If so, contact us for information on how to become part of our growing cloud consultancy ecosystem.

CONTRIBUTORS

Safeguarding Data Before Disaster Strikes

Safeguarding Data Before Disaster Strikes

Safeguarding Data  Online data backup is one of the best methods for businesses of all sizes to replicate their data ...
Battle of the Clouds: Multi-Instance vs. Multi-Tenant Architecture

Battle of the Clouds: Multi-Instance vs. Multi-Tenant Architecture

Multi-Instance vs. Multi-Tenant Architecture  The cloud is part of everything we do. It’s always there backing up our data, pictures, ...
10 Ways The Enterprise Can Prevent Data Leaks In The Cloud

10 Ways The Enterprise Can Prevent Data Leaks In The Cloud

Prevent Data Leaks In The Cloud More companies are turning to the cloud for storage. In fact, over 60 percent ...
The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the ...
Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and ...
Why ‘Data Hoarding’ Increases Cybersecurity Risk

Why ‘Data Hoarding’ Increases Cybersecurity Risk

Data Hoarding The proliferation of data and constant growth of content saved on premise, in cloud storage, or a non-integrated ...
Imminent IoT Eye-Tracking Technologies To Transform The Connected World

Imminent IoT Eye-Tracking Technologies To Transform The Connected World

IoT Eye Tracking Smelling may be the first of the perceptible senses, but the eye is the fastest moving organ ...
What’s Next In Cloud And Data Security For 2017?

What’s Next In Cloud And Data Security For 2017?

Cloud and Data Security It has been a tumultuous year in data privacy to say the least – we’ve had ...
Cloud-Based or On-Premise ERP Deployment? Find Out

Cloud-Based or On-Premise ERP Deployment? Find Out

ERP Deployment You know how ERP deployment can improve processes within your supply chain, and the things to keep in ...
What Futuristic Transportation Will Look Like In Your Lifetime

What Futuristic Transportation Will Look Like In Your Lifetime

Futuristic Transportation Being stuck in traffic or late for work because of a hold up on the dreaded commute could ...

NEWS

Hackers shut down infrastructure safety system in attack: FireEye

Hackers shut down infrastructure safety system in attack: FireEye

Hackers shut down infrastructure safety system (Reuters) - Hackers likely working for a nation-state recently penetrated the safety system of ...
U.S. IT Sector Employment Expands by 8,100 Jobs in November, CompTIA Analysis Reveals

U.S. IT Sector Employment Expands by 8,100 Jobs in November, CompTIA Analysis Reveals

DOWNERS GROVE, Ill., Dec. 8, 2017 /PRNewswire-USNewswire/ -- New hiring in computer and electronics manufacturing and technology services and custom ...
email as a service

Google Data Analysis, Artificial Intelligence and Predicting Vaccine Scares

Social media trends can predict tipping points in vaccine scares Analyzing trends on Twitter and Google can help predict vaccine ...