Threat Stack and JASK Partner to Reduce Time to Respond to Security Incidents Across Entire Customer Security Infrastructure

Published June 12, 2019


Suzanne DuLong
VP, Investor Relations
(206) 272-7049

Holly Lancaster
WE Communications
(415) 547-7054

Combination of JASK ASOC cloud-native SIEM and Threat Stack Cloud Security Platform to Speed Incident Response Times and Improve Productivity

BOSTON — June 12, 2019 — Threat Stack, the leader in cloud security and compliance for infrastructure and applications, and JASK, the provider of the industry’s first cloud-native SIEM platform, today announced a partnership designed to help security operations teams reduce the time and effort needed to detect and respond to cloud security incidents identified by the Threat Stack Cloud Security Platform®.

“Cloud sprawl is a major issue with businesses that creates blind spots for IT and security teams,” said Rob Fry, CTO, JASK. “With Threat Stack, our customers gain in-depth insights across their cloud infrastructure, including hosts, containers, container orchestration, and applications, and can implement automated security policies to empower analysts to focus on high-value risk-reduction activities.”

As the leader in cloud security and compliance for infrastructure and applications, Threat Stack helps businesses proactively reduce risk and respond to security incidents by providing contextual insight based on signals from across the entire cloud infrastructure stack, from the cloud management console to the application layer.

When Threat Stack’s platform is paired with the JASK ASOC cloud-native SIEM platform, joint customers will be able to automate the correlation and analysis of threat intelligence, enabling security analysts to become proactive threat hunters and drastically reducing the time needed to investigate incidents.

“Providing the powerful cloud security telemetry generated by the Threat Stack Cloud Security Platform to JASK’s cloud-native SIEM is a powerful combination,” said Brian M. Ahern, CEO, Threat Stack. “It enables our joint customers to correlate signals from across the cloud stack with other security tools to quickly identify and remediate threats across the entire security ecosystem.”

To learn more about how the Threat Stack and JASK integration can help businesses secure their cloud infrastructure, visit:

Threat Stack is now F5 Distributed Cloud App Infrastructure Protection (AIP). Start using Distributed Cloud AIP with your team today.

About F5

F5 is a multi-cloud application services and security company committed to bringing a better digital world to life.​​​​​​​ F5 partners with the world’s largest, most advanced organizations to secure and optimize every app and API anywhere—on premises, in the cloud, or at the edge. F5 enables organizations to provide exceptional, secure digital experiences for their customers and continuously stay ahead of threats. For more information, go to (NASDAQ: FFIV)

You can also follow @F5 on Twitter or visit us on LinkedIn and Facebook for more information about F5, its partners, and technologies. F5 is a trademark, service mark, or tradename of F5, Inc., in the U.S. and other countries. All other product and company names herein may be trademarks of their respective owners.

# # #

This press release may contain forward looking statements relating to future events or future financial performance that involve risks and uncertainties. Such statements can be identified by terminology such as "may," "will," "should," "expects," "plans," "anticipates," "believes," "estimates," "predicts," "potential," or "continue," or the negative of such terms or comparable terms. These statements are only predictions and actual results could differ materially from those anticipated in these statements based upon a number of factors including those identified in the company's filings with the SEC.