Threat Stack Blog and Cloud Security News

Continuous security monitoring for your cloud.

Threat Stack Cloud Security Platform® Support for Windows & Hybrid Environments

by Venkat Pothamsetty , posted in Cloud Security, Intrusion Detection, Threat Stack Cloud Security Platform, Windows Agent, Windows

Windows Agent Release Blog Banner.jpg

As part of its ongoing mission to bring customers the most comprehensive and powerful cloud security solutions, Threat Stack has extended the capabilities of its Threat Stack Cloud Security Platform® to enable continuous security monitoring of Microsoft Windows and hybrid environments.

The new Windows agent adds to Threat Stack’s existing support for Linux environments, and enables companies to collect important information about users, processes, network connections, and files, as well as security events from Windows environments. The range and depth of detail provides a deep level of visibility and information that growing companies need in order to remain secure and compliant as they grow.

Read More [fa icon=long-arrow-right"]

Nov 21, 2016 11:39:59 AM

[fa icon="comment"] 0 Comments

The History of Intrusion Detection Systems (IDS) - Part 1

by Palen Schwab , posted in Cloud Security, Intrusion Detection, IDS, Cloud IDS, Intrusion Detection Systems


Great applied technology typically needs enabling partner technology, and it will struggle to make headway until that partner appears. For decades, Intrusion Detection System (IDS) technology struggled to deliver efficient, high quality intrusion monitoring, and is only now experiencing success with the arrival of an unintentional enabling partner technology – cloud computing.

Read More [fa icon=long-arrow-right"]

Sep 9, 2015 10:04:36 AM

[fa icon="comment"] 0 Comments

3 Reasons Why the Host Rules Cloud IDS

by Sam Bisbee , posted in Cloud Security, Intrusion Detection, IDS, Cloud IDS


To truly appreciate why companies like Threat Stack point to the Cloud as a watershed event in their corner of the software industry, one must push past the hype and worn platitudes about “the Cloud with a capital C.” The reality is that it is the side effects that have caused such a large impact, like cost of operation as a function of scaled purchasing power and the forcing of software-only solutions.

This has certainly been felt in intrusion detection systems (IDS). They have traditionally been deployed as network hardware devices enabled by access to the network infrastructure, but are struggling to find relevance in a world where the traditional network boundary no longer exists.

Read More [fa icon=long-arrow-right"]

Feb 5, 2015 1:44:00 PM

[fa icon="comment"] 0 Comments

Jul 16, 2014 4:58:00 PM

[fa icon="comment"] 0 Comments

Jul 14, 2014 4:58:00 PM

[fa icon="comment"] 0 Comments

University of Hawaii at Manoa College of Education Does Due Diligence to Monitor and Protect Sensitive Data With Threat Stack

by Kristin Dziadul , posted in Security Monitoring, HIPAA, FERPA, Compliance, Customers, Intrusion Detection, University of Hawaii



The University of Hawaii is a 10-campus University System. The UH Manoa campus is a research campus with remote staff and students on various islands and around the world. Over 400 faculty and staff at UH Manoa’s College of Education use hosted services to exchange private and sensitive material. A multitude of these users are online at any given point in time -- uploading information, exchanging ideas and storing sensitive information, all of which is private and protected by law. While in the process of deploying full-disk encryption and file storage and sync for all faculty and staff, they also needed a layer of complete monitoring.


The University of Hawaii system has experienced multiple data breaches which revealed personally identifiable information (PII). Since then, the University has experienced legislative pressure and is under legal mandate to further protect their data. On top of that, they have numerous other compliance regulations to meet, including FERPA and HIPPA, due to the sensitive nature of the data. The College of Education’s Technology and Distance Programs office is responsible for securing and protecting such data for the College.

“The data we store is protected by the law and it’s due diligence on our part to monitor instances for intrusion,” said Stephan Fabel, IT Manager at UH Manoa’s College of Education. “We want people to log on to the network and participate, but need to know that everything is protected while they are logged on.”

And because of their highly distributed computing architecture with broad access from students and faculty across the islands and beyond, they felt they did not have full control or insight on who was doing what and from where. “We needed to find a solution that ensures privacy, indemnifies us from fault by adhering to industry best practices, and creates a technical solution path for our various security policies,” said Fabel.


“With Cloud Sight, we’re able to see what happened, how it happened, and who did it. This is especially important for us to have given the distributed nature of our network and with the need to keep a history of activity in the event of a breach. No other solutions measured up,” Fabel explained.

“Cloud Sight provides us a way to gain a greater sense of control and insight as to who has done what on our instances at any time. It completes our security profile by protecting our network at the data level,” Fabel continued. He and his team achieve this level of control through Cloud Sight’s email notifications. “The daily summary emails are extremely useful as it allows us to view the context of any event and dive in deeper from there. We’re also notified of administrative changes made on an instance and can easily look into the history of any logged in session.”


“Cloud Sight closes the gap between application monitoring and network monitoring. Before Cloud Sight, we had no idea how to do this, but now it’s done automatically which is a great feeling. With Cloud Sight, we’re able to do our due diligence to monitor our hosts above and beyond government requirements,” concluded Fabel. They now know who has access, who did what, and can answer any intrusion question and show the audit trail if asked in a legal situation.

Since installing Cloud Sight by Threat Stack, UH Manoa’s College of Education:

  • Is protecting against PII data theft from all angles
  • Meets and exceeds HIPPA and FERPA regulations
  • Monitors and protects highly-distributed computing architecture with broad access

CloudSight is unlike traditional providers as its quick and easy to roll out, and automatic and scalable in the cloud, allowing them to pull up instances and immediately monitor and protect them with no manual involvement.

If you are interested in deploying Cloud Sight’s security monitoring solution for your business, visit or contact us today at

Read More [fa icon=long-arrow-right"]

Jun 17, 2014 5:00:00 PM

[fa icon="comment"] 0 Comments

Feb 21, 2014 5:18:00 PM

[fa icon="comment"] 0 Comments

Insider Threats: Your Biggest Risk

by Dustin Webber , posted in Threats, Intrusion Detection

While many companies have become exceptional at protecting against external threats, is there ever worry for attacks happening internally? Enterprises are focused on stabilizing perimeter defenses against outside hackers, but according to a recent report by Forrester, internal breaches have become the top source of breaches in 2013, with 36% of breaches originating from employees.  

Read More [fa icon=long-arrow-right"]

Dec 19, 2013 5:20:00 PM

[fa icon="comment"] 0 Comments

Subscribe via email:

Posts by Topic

see all