VP, Investor Relations
The Threat Stack Cloud Security Platform Extends Security Observability to AWS Fargate Tasks
BOSTON, Mass. — Threat Stack, a leader in cloud security and compliance for infrastructure and applications, today announced the availability of Threat Stack Container Security Monitoring for AWS Fargate. Extending the observability provided by the Threat Stack Cloud Security Platform to AWS Fargate tasks will help Threat Stack customers detect threats and maintain compliance across all areas of their cloud infrastructure. The Threat Stack Cloud Security Platform® collects and correlates security telemetry from the cloud management console, host, containers, orchestration, managed container services and applications, giving Threat Stack customers a comprehensive view into their entire cloud environment.
AWS Fargate is a compute engine for Amazon Elastic Container Service (Amazon ECS) that allows users to run containers without having to manage servers or clusters. By supporting workloads within AWS Fargate managed containers, Threat Stack is ensuring customers maintain visibility and control while they achieve the business-benefits of the cloud and AWS Fargate.
Threat Stack customers can monitor several key aspects of AWS Fargate including processes and network activity within Fargate, application code running in Fargate container workloads and AWS CloudTrail logs alongside Fargate. The Threat Stack Cloud Security Platform now enables customers to understand when containers make unexpected network connections or transfer data to unexpected IP addresses and investigate potential threats like data exfiltration or risky behavior in AWS Fargate.
“Our ‘Leveraging DevSecOps to Secure Cloud-native Applications’ report shows the top container security challenge is aligning the architectural implementation of a container security control with the organization’s intended container deployment model,” said Doug Cahill, Senior Analyst and Group Practice Director, Cybersecurity, The Enterprise Strategy Group. “The ability of the Threat Stack Cloud Security Platform to secure multiple container consumption and deployment models is well suited for organizations that want flexibility for where their container-based applications are and will be deployed.”
“We’re very excited our customers now have the ability to extend their cloud security observability into AWS Fargate,” said Brian Ahern, CEO, Threat Stack. “Many of our customers are at the forefront of cloud adoption and Threat Stack Container Security Monitoring for AWS Fargate enables them to combine security telemetry from AWS Fargate with all other areas of the cloud infrastructure to maintain full stack security observability.”
To learn more about the technical details of how Threat Stack Container Security Monitoring for AWS Fargate is helping Threat Stack customers run AWS Fargate tasks while maintaining security observability read our blog: Introducing Threat Stack support for AWS Fargate.
Threat Stack is now F5 Distributed Cloud App Infrastructure Protection (AIP). Start using Distributed Cloud AIP with your team today.
F5 is a multi-cloud application services and security company committed to bringing a better digital world to life. F5 partners with the world’s largest, most advanced organizations to secure and optimize every app and API anywhere—on premises, in the cloud, or at the edge. F5 enables organizations to provide exceptional, secure digital experiences for their customers and continuously stay ahead of threats. For more information, go to f5.com. (NASDAQ: FFIV)
You can also follow @F5 on Twitter or visit us on LinkedIn and Facebook for more information about F5, its partners, and technologies. F5 is a trademark, service mark, or tradename of F5, Inc., in the U.S. and other countries. All other product and company names herein may be trademarks of their respective owners.
# # #
This press release may contain forward looking statements relating to future events or future financial performance that involve risks and uncertainties. Such statements can be identified by terminology such as "may," "will," "should," "expects," "plans," "anticipates," "believes," "estimates," "predicts," "potential," or "continue," or the negative of such terms or comparable terms. These statements are only predictions and actual results could differ materially from those anticipated in these statements based upon a number of factors including those identified in the company's filings with the SEC.