Threat Stack Blog and Cloud Security News

Continuous security monitoring for your cloud.

IoT Meets Continuous Security Monitoring at Ayla Networks

by Adrian Caceres , posted in Cloud Security, Continuous Security Monitoring, IoT, Internet of Things

TS16031_ThreatStack_AylaNetworks_BlogImg.jpg

Ayla Networks is an Internet of Things (IoT) cloud platform-as-a-service (PaaS) company that enables manufacturers to build connected products. With more than 75 customers worldwide, many of whom are Fortune 1000 companies, Ayla knows that delivering a fast and secure platform is vital to our business. As a security-conscious company running completely in the cloud, we take a cloud-native approach to security and compliance. In this post, I’ll explain why we chose this approach and how we are implementing it today.
Read More [fa icon=long-arrow-right"]

Aug 11, 2016 9:07:23 AM

[fa icon="comment"] 0 Comments

“The Call is Coming from Inside the House” Insider Threats Pose Major Security Concerns for Enterprise

by Brian Ahern , posted in Threats, Continuous Security Monitoring, Vulnerability Detection, Continuous Cloud Security, Security in the cloud

Internal-Threats


Security is a major concern and potential road block for companies starting up in the cloud or considering a move into the cloud. Incidents such as the most recent high-profile attack on “online cheating site” Ashley Madison do little to assuage those fears as companies must consider how to best protect themselves from external and insider threats

Read More [fa icon=long-arrow-right"]

Jul 23, 2015 11:53:03 AM

[fa icon="comment"] 0 Comments

Iron Clad DevOps Security for your EC2 Environments: Webinar with GigaOM

by Palen Schwab , posted in Continuous Security Monitoring, Webinar, SecDevOps, SecOps, EC2

 

Gigaom-Webinar-Banner

Join Threat Stack's Director of Ops & Support, Pete Cheslock, as he discusses the security needs of modern, DevOps-managed infrastructures with Greg Ferro, Independent Analyst, and Matt Sarrel, Executive Director of Sarrel Group, in next week's GigaOM webinar. 

With the lack of sophisticated security features in public cloud infrastructure environments like AWS, it's critical for DevOps teams to implement audit trails in order to adhere to compliance and regulation mandates. Continuous security monitoring is the answer and on February 11th, Pete, Greg and Matt will be discussing the importance of having this new level of visibility into an entire EC2 attack surface. 

Read More [fa icon=long-arrow-right"]

Feb 2, 2015 11:33:00 AM

[fa icon="comment"] 1 Comment

A New Way to See Your EC2 Environment

by Aaron Botsis , posted in Continuous Security Monitoring, AWS, EC2, AWS Security

For companies using AWS for their cloud infrastructure, one of the biggest challenges faced by infrastructure teams is the ability to get a complete view of their entire EC2 environment quickly and easily.   

Read More [fa icon=long-arrow-right"]

Dec 22, 2014 4:50:55 PM

[fa icon="comment"] 0 Comments

SaaS Platform Runs a Tight Ship Using Threat Stack’s Cloud Security Monitoring

by Kristin Dziadul , posted in Continuous Security Monitoring, Logging, Compliance, Customers, Populi

Populi

Case Study: Populi Runs a Tight Ship Using Threat Stack’s Complete Cloud Security Monitoring

ABOUT POPULI

Populi provides a SaaS-based college management platform, allowing people, academics, admissions, billing, scheduling and communications to all work together seamlessly in the cloud. A customer and security-focused company, Populi cares deeply about what customer data their tools and systems are transmitting. They know what’s at stake and provide to users everything from encrypted logins to PCI-compliant technology and daily backups.

CHALLENGES

While Populi has many enterprise-grade security practices in place, they were still not confident that every aspect of their environment was being properly monitored. Populi had a network IDS in place but did not have complete visibility into the activity on their growing number of hosted systems. James Hill, CTO of Populi, needed the peace of mind that he could view everything from server logins to logged in activity so that he could be alerted as soon as possible about any potential malicious activity.

In addition, it is important that they always meet and exceed PCI requirements since they work with highly confidential information. “Anyone who is responsible should go beyond regulations to protect customer data,” Hill explained. To do this, they needed to move their logs off site to a centralized location. This all led him to Threat Stack’s flagship product, Cloud Sight.

THE SOLUTION

“I selected Cloud Sight because it allows me to centrally monitor the security of our systems and reassures me that no one has been on our servers since the last time my team and I logged in,” said Hill. “Cloud Sight does everything I need; it acts as a ‘burglar alarm’, alerting me when anything suspicious happens.”

In addition, they now have centralized off-server logs available indefinitely on Cloud Sight, exceeding their compliance regulations.

RESULTS

Now, Hill and his team can confidently say that they have a proactive security posture across their entire environment. Especially after the Heartbleed Bug was announced, he was glad to have Cloud Sight in place. “Getting Cloud Sight allowed us to stop maintaining individual packages on individual boxes and aggregate ourselves,” said Hill. While Cloud Sight monitors their systems 24/7, the Populi team is able to focus on the core of their business and sleep easier at night.

Populi is also even better positioned to protect their client data from any incident small or large, as they are now exceedingly compliant to PCI, HIPAA, and FERPA regulations.  

Since installing Cloud Sight by Threat Stack, Populi:

  • Rests assured that they have the right heterogeneous cloud security monitoring in place.
  • Exceeds PCI, HIPAA and FERPA regulations to protect client data.
  • Can fix potential security issues before anyone else can try to capitalize on a vulnerability.

Unlike traditional providers, Cloud Sight is built for heterogeneous cloud environments and instantly provisions new instances, alleviating resources so that Populi can instead focus on the core of their business.

Threat Stack offers Cloud Sight worldwide on subscription and consumption-based cloud appropriate pricing models with an easy self-service account set up. If you are interested in deploying Cloud Sight’s security monitoring solution for your business, visit http://threatstack.com or contact us today at sales@threatstack.com.

Read More [fa icon=long-arrow-right"]

May 28, 2014 5:10:00 PM

[fa icon="comment"] 0 Comments

Cloud Security Is Always Your Responsibility

by Jen Andre , posted in Cloud Security, Continuous Security Monitoring, Endpoint Behavioral Profiling

Too many times we hear and read about how insecure the cloud is or worse -- that the cloud is already secure because IaaS providers have security groups and protection capabilities. These ideologies are all too common and far too wrong. By using outsourced cloud infrastructure, you are only outsourcing your infrastructure, not your security. Security is always your responsibility.  

Read More [fa icon=long-arrow-right"]

Dec 18, 2013 5:21:00 PM

[fa icon="comment"] 0 Comments

Subscribe via email:

Posts by Topic

see all