VP, Investor Relations
Leading cloud security company empowers businesses to receive full-stack observability and control to run Kubernetes pods on AWS Fargate
BOSTON — Threat Stack, a leader in cloud security, announced it has expanded its AWS Fargate Security Monitoring to include Amazon Elastic Kubernetes Service (Amazon EKS). Using the Threat Stack Cloud Security Platform®, businesses can gain full-stack observability into AWS EKS on AWS Fargate within minutes to detect threats and maintain compliance throughout their cloud infrastructure.
In today’s complex cloud environments, security leaders must do their part in the Amazon Web Services (AWS) shared responsibility model by going beyond native monitoring tools to ensure the proper security protections are in place. Threat Stack’s Cloud Security Platform provides complete visibility into cloud environments at both the infrastructure and application layers to ensure critical applications and data are safe from cybercriminals.
As an AWS Partner, Threat Stack works to keep pace with new technology by developing the necessary capabilities for customers to securely take advantage of the benefits of containers, starting with its support for Amazon Elastic Container Service and now Amazon EKS. This added support allows organizations to run Kubernetes applications on AWS Fargate, providing a straightforward way to host applications without provisioning and managing the requisite infrastructure.
“Threat Stack continues to demonstrate the ability to innovate alongside customers through our new Amazon EKS on AWS Fargate offering,” said Chris Ford, Vice President of Product at Threat Stack. “As customers look to take advantage of running their Kubernetes cluster via AWS Fargate, they’re able to extend our industry-leading full-stack security observability at both the infrastructure and application layers through this new offering. This is just the latest example of yet another development we’ve made based on the important conversations we have with customers every day and the close-knit relationship we have as an AWS Partner.”
AWS Fargate removes the need to provision and manage servers, making it easy for companies to focus on building their applications and improving security through application isolation by design. Threat Stack supports AWS instances running on the AWS Fargate architecture with a low-touch agent deployment that delivers the full power of its cloud security platform. When using Amazon EKS on AWS Fargate, businesses can receive an industry-leading combination of telemetry collection, rules for known threats, and 24/7/365 support to help implement their daily security operations center (SOC). In addition, the Threat Stack Cloud Security Platform now enables customers to understand when containers make unexpected network connections or transfer data to unexpected IP addresses and investigate potential threats like data exfiltration or risky behavior.
To learn more about the technical details of how Threat Stack Container Security Monitoring for AWS Fargate is helping Threat Stack customers run AWS Fargate tasks while maintaining security observability, visit: https://www.threatstack.com/use-cases/aws-security/fargate-monitoring.
Threat Stack is now F5 Distributed Cloud App Infrastructure Protection (AIP). Start using Distributed Cloud AIP with your team today.
F5 is a multi-cloud application services and security company committed to bringing a better digital world to life. F5 partners with the world’s largest, most advanced organizations to secure and optimize every app and API anywhere—on premises, in the cloud, or at the edge. F5 enables organizations to provide exceptional, secure digital experiences for their customers and continuously stay ahead of threats. For more information, go to f5.com. (NASDAQ: FFIV)
You can also follow @F5 on Twitter or visit us on LinkedIn and Facebook for more information about F5, its partners, and technologies. F5 is a trademark, service mark, or tradename of F5, Inc., in the U.S. and other countries. All other product and company names herein may be trademarks of their respective owners.
# # #
This press release may contain forward looking statements relating to future events or future financial performance that involve risks and uncertainties. Such statements can be identified by terminology such as "may," "will," "should," "expects," "plans," "anticipates," "believes," "estimates," "predicts," "potential," or "continue," or the negative of such terms or comparable terms. These statements are only predictions and actual results could differ materially from those anticipated in these statements based upon a number of factors including those identified in the company's filings with the SEC.