BOSTON – November 21, 2016 —
Threat Stack, a leader in Cloud Security and Compliance Management, today announced that it has extended the capabilities of the Threat Stack Cloud Security Platform® (CSP) to enable continuous security monitoring of Microsoft Windows and hybrid environments.
The release of the new Windows agent adds to Threat Stack’s existing support for Linux environments, and enables Threat Stack to collect important information about users, process, network and file information, and security events from Windows environments. This degree of detail provides a deep-level of visibility and compliance that growing companies need.
“Threat Stack’s ability to support Windows allows us to use the same powerful security platform to maintain compliance and monitor suspicious activity across all of our servers,” said Ken Dezio, CTO, iData. “Customers entrusting us with their Windows applications and data benefit greatly from our improved visibility of vulnerabilities and potential threats.”
New capabilities available with the Windows agent include the continuous monitoring of Windows security logs to provide customers with an added layer of insight, ensuring internal controls and processes are met for compliance reporting purposes. Additionally, customers that want to deploy both the Linux and Windows agents in a hybrid environment can easily do this with Threat Stack CSP.
“The Threat Stack team is constantly looking for new and meaningful ways to support its customers,” said Venkat Pothamsetty, Vice President, Products and Customer Advocacy, Threat Stack. “Today’s companies work across a wide range of integrated environments, and the Threat Stack Windows agent allows us to provide continuous security monitoring and intrusion detection in whatever environment best supports their needs.”
Threat Stack Cloud Security Platform was recently named SearchCloudApplications’ Editor’s Choice for Innovation. Threat Stack CSP provides the only cloud security monitoring platform that brings together best practices auditing, real-time host level monitoring, compliance reporting and workflow integrations into one shared platform, supporting all aspects of customers’ cloud security needs, from early stage to rapid growth. Its cloud-native architecture automatically scales up or down with the capacity of customers’ infrastructures to ensure continuous visibility across elastic environments, including on-premise, private cloud, public cloud and hybrid environments.
These new capabilities are immediately available to all Threat Stack users. For more information on Threat Stack, please visit threatstack.com.