Threat Stack Blog and Cloud Security News

Continuous security monitoring for your cloud.

Threat Stack Cloud Security Platform: Streamlined Workflows, Part 2

by Megan Rees Ahigian , posted in Cloud Security, Threat Stack Cloud Security Platform, HIDS, Workflow Enhancements, Server Management, Software Vulnerability Assessment & Management

CSP Streamlined Workflow Part2.jpg

In the first part of 2016, Threat Stack’s Product Development team concentrated on its goal of continuing to build a powerful, cloud-based security platform with all the features users need to keep their cloud environments protected as they scale.

More recently, we have focused on our second goal — streamlining workflows in three key areas of our Cloud Security Platform® — to ensure that it is easy to use and customize, thus enabling users to move as fast as possible while they prioritize security issues and strengthen their organization’s security.

In Part 1 of this series I explained how we streamlined our Host Intrusion Detection (HIDS) workflows. In Part 2, I am going to describe improvements we’ve made to workflows in the following two areas:

  • Server Management
  • Software Vulnerability Assessment and Management

Read More [fa icon=long-arrow-right"]

Nov 30, 2016 11:31:06 AM

[fa icon="comment"] 0 Comments

Subscribe via email:

Posts by Topic

see all