101 - 250 employees
Series C
B2B
SaaS
Security

Threat Stack Company Overview

Threat Stack enables DevOps and SecOps teams to innovate and scale securely, meeting complex cloud security needs by identifying and verifying insider threats, external attacks, and compliance gaps in real time. Purpose-built for today’s infrastructure, the Threat Stack Cloud Security Platform® and Threat Stack Cloud SecOps Program℠ combine continuous security monitoring and risk assessment to empower security and operations teams to better manage risk and compliance across their entire infrastructure, including cloud, hybrid-cloud, and containerized environments.

Jobs at Threat Stack

 
6 Jobs Listed
Clear Filters
Boston
Threat Stack enables DevOps and SecOps teams to innovate and scale security by providing full-stack security observability from the control plane up to the application layer. Purpose-built for todays infrastructure, the Threat Stack Cloud Security Platform and Cloud SecOps Program combine cloud-optimized intrusion defense, continuous security monitoring, and proactive risk assessment to help security and operations teams detect security incidents, achieve compliance, and secure infrastructure in transition. Threat Stack has recently added Application Security to the platform, empowering...
Software Engineering/QA
Boston
Threat Stack enables DevOps and SecOps teams to innovate and scale security by providing full-stack security observability from the control plane up to the application layer. Purpose-built for todays infrastructure, the Threat Stack Cloud Security Platform and Cloud SecOps Program combine cloud-optimized intrusion defense, continuous security monitoring, and proactive risk assessment to help security and operations teams detect security incidents, achieve compliance, and secure infrastructure in transition. Threat Stack has recently added Application Security to the platform, empowering...
Software Engineering/QA
Boston
Threat Stack enables DevOps and SecOps teams to innovate and scale security by providing full-stack security observability from the control plane up to the application layer. Purpose-built for todays infrastructure, the Threat Stack Cloud Security Platform and Cloud SecOps Program combine cloud-optimized intrusion defense, continuous security monitoring, and proactive risk assessment to help security and operations teams detect security incidents, achieve compliance, and secure infrastructure in transition. Building a great company starts with building a great team. Were dedicated to...
Sales & Business Development
Boston
Threat Stack enables DevOps and SecOps teams to innovate and scale security by providing full-stack security observability from the control plane up to the application layer. Purpose-built for todays infrastructure, the Threat Stack Cloud Security Platform and Cloud SecOps Program combine cloud-optimized intrusion defense, continuous security monitoring, and proactive risk assessment to help security and operations teams detect security incidents, achieve compliance, and secure infrastructure in transition. At Threat Stack, were building a continuous monitoring platform specifically targeted...
Customer Success
Boston
Threat Stack enables DevOps and SecOps teams to innovate and scale securely, meeting complex cloud security needs by identifying and verifying insider threats, external attacks, and compliance gaps in real time. Purpose-built for todays infrastructure, the Threat Stack Cloud Security Platform and Cloud SecOps Program combine continuous security monitoring and risk assessment to empower security and operations teams to better manage risk and compliance across their entire infrastructure, including cloud, hybrid-cloud, and containerized environments. We are defining the way Cloud Security is...
Marketing
Boston
Threat Stack enables growth-driven companies to scale securely and meet complex cloud security needs by identifying and verifying insider threats, external attacks, and data loss in real time. Purpose-built for todays infrastructure, the Threat Stack Cloud Security Platform and Cloud SecOps Program combine continuous security monitoring and risk assessment to empower security and operations teams to better manage risk and compliance across their entire infrastructure, including cloud, hybrid-cloud, multi-cloud, and containerized environments. At Threat Stack, were building a continuous...
Software Engineering/QA
55 Summer Street
Boston, MA 02210

Blog

March 19, 2019
Containers provide very important functionality: They package various software applications in “containers” to ensure that they are able to run correctly when moved from one computing environment to another. The container model has all its dependencies packaged into virtual containers. A container not only contains an application but all supporting packages that are needed to … Continue reading "Container Security Tips and Best Practices" The post Container Security Tips and Best Prac...
March 14, 2019
You probably know AWS as the leading cloud platform provider. These days, however, many companies are using additional cloud providers as well. According to Gartner’s October 2018 report “Market Insight: Multicloud Becomes Essential for Cloud IaaS Offerings,” 49% of organizations were approaching their cloud computing IaaS strategy through multi-cloud adoption in 2017, and that is … Continue reading "How to Achieve Full Stack, Multi-Cloud Security Observability" The post How to Achi...
March 12, 2019
More often than not we’ll need to go beyond a Severity 1 alert to figure out what a user (including a potentially malicious attacker) was doing on a system. Host events in particular only show a small part of the picture, and a single alert can’t always give you the context necessary to make an … Continue reading "How to Track Agent-Based User Activity" The post How to Track Agent-Based User Activity appeared first on Threat Stack. ...
March 7, 2019
In this post we’ll try to develop an understanding of a typical attacker’s mindset and then show you how companies like yours can use this knowledge to enhance their security posture. Before we dive in, however, let’s ask a basic question: What is a cyber attacker? A cyber attacker can be any entity — an … Continue reading "How to Understand Your Attacker’s Mindset" The post How to Understand Your Attacker’s Mindset appeared first on Threat Stack. ...
March 6, 2019
Cost Savings and Business Benefits Enabled by Threat Stack When investing in cloud security platforms and services, businesses naturally want to measure ROI beyond number of deterred attacks. After all, effective cloud security also protects customer data, intellectual property, organizational resources, organizational efficiency, and team productivity — all of which impact your bottom line. Recently, … Continue reading "The Economic Impact of Threat Stack – A Forrester Research Study...