Threat Stack Announces Unified Application Security Solution

Published June 18, 2019


Suzanne DuLong
VP, Investor Relations
(206) 272-7049

Holly Lancaster
WE Communications
(415) 547-7054

New Threat Stack Application Security Monitoring Solution Extends Security Observability Across the Entire Cloud Stack at No Additional Cost

BOSTON, Mass. — Threat Stack, the leader in cloud security and compliance for infrastructure and applications, today announced Threat Stack Application Security Monitoring, its new unified application security solution. Threat Stack Application Security Monitoring will now be included as part of the Threat Stack Cloud Security Platform® at no additional cost.

With the addition of runtime application self protection and risk detection capabilities to the Threat Stack Cloud Security Platform, Threat Stack is the only security vendor to provide full stack security observability from the cloud management console to the application layer. Threat Stack Application Security Monitoring will be available for public demo at AWS re:Inforce on June 25 and 26 in booth 614.

The addition of Threat Stack Application Security Monitoring to the Threat Stack Cloud Security Platform will help customers connect the dots with contextualized information from every aspect of the cloud stack throughout the entire software development lifecycle. By correlating information from the cloud management console, containers, container orchestration, and application layers, Threat Stack customers can quickly and accurately identify risk and ongoing attacks across their cloud environment.

Features available in Threat Stack Application Security Monitoring include:

  • Proactive Risk Reduction – Leveraging insight and contextual information across the cloud stack, Threat Stack helps developers proactively reduce risk during development.
  • Targeted Real-time Attack Blocking – Threat Stack enables users to selectively block attacks like Cross Site Scripting (XSS), SQL Injection (SQLi), and NoSQL Injection (NoSQLi) without the risk of blocking large amounts of legitimate traffic.
  • Improved Insight Across the Stack – With full context from every aspect of the cloud stack, Threat Stack connects the dots and correlates data across the entire software development lifecycle to reduce false positives.
  • Developer Context and eLearning – Threat Stack provides in-depth context and risk reduction recommendations on every alert, helping developers learn best practices for secure coding on an ongoing basis.

“With the rapid adoption of cloud-native architectures – including microservices, containers, and serverless – application security is more important than ever,” said Brian M. Ahern, CEO, Threat Stack. “While there are many application security options available, the addition of Threat Stack Application Security Monitoring makes Threat Stack the first to enable cloud security observability across the full stack and full lifecycle in a single solution.”

To learn more about Threat Stack Application Security Monitoring, visit, read Threat Stack’s blog: “Threat Stack Launches New Unified Application Security Monitoring Solution,” or meet with Threat Stack in booth 614 at AWS re:Inforce on June 25 and 26.

Threat Stack is now F5 Distributed Cloud App Infrastructure Protection (AIP). Start using Distributed Cloud AIP with your team today.

About F5

F5 is a multi-cloud application services and security company committed to bringing a better digital world to life.​​​​​​​ F5 partners with the world’s largest, most advanced organizations to secure and optimize every app and API anywhere—on premises, in the cloud, or at the edge. F5 enables organizations to provide exceptional, secure digital experiences for their customers and continuously stay ahead of threats. For more information, go to (NASDAQ: FFIV)

You can also follow @F5 on Twitter or visit us on LinkedIn and Facebook for more information about F5, its partners, and technologies. F5 is a trademark, service mark, or tradename of F5, Inc., in the U.S. and other countries. All other product and company names herein may be trademarks of their respective owners.

# # #

This press release may contain forward looking statements relating to future events or future financial performance that involve risks and uncertainties. Such statements can be identified by terminology such as "may," "will," "should," "expects," "plans," "anticipates," "believes," "estimates," "predicts," "potential," or "continue," or the negative of such terms or comparable terms. These statements are only predictions and actual results could differ materially from those anticipated in these statements based upon a number of factors including those identified in the company's filings with the SEC.