Threat Stack Improves Security Observability in Kubernetes With New Behavioral Analysis Capabilities

Published April 23, 2019


Suzanne DuLong
VP, Investor Relations
(206) 272-7049

Holly Lancaster
WE Communications
(415) 547-7054

Enhancements to the Threat Stack Cloud Security Platform Enable Customers to Adopt Kubernetes Without Sacrificing Visibility and Security

BOSTON, Mass. — Threat Stack, the leader in cloud infrastructure security and compliance, today announced enhancements to the Threat Stack Cloud Security Platform® that provide customers with complete security observability of Kubernetes-managed containers. The improved visibility of Kubernetes environments enables Threat Stack’s customers to leverage container infrastructure without increasing risk or relying on multiple point solutions to achieve full stack cloud security observability.

As companies adopt Kubernetes to help orchestrate their container infrastructure, security processes and policies have been slow to adapt. This has led to increased risk as companies deploy containers without the appropriate security processes and tools in place. Threat Stack is enabling its customers to securely adopt containers and Kubernetes by eliminating the additional risk associated with the lack of visibility into their container infrastructure.

New features included in the Threat Stack Cloud Security Platform designed to improve visibility into Kubernetes environments include:

  • Integration With Kubernetes API Endpoints – The Threat Stack Cloud Security Platform can pull data from Kubernetes in multiple ways, providing more flexibility depending on the customer use case.
  • Real-Time Behavioral Analysis of Kubernetes Environments – Through a new direct integration with Kubernetes, the platform will enable Threat Stack customers to identify signs of risky behavior or intrusion in their Kubernetes environments.
  • Proactive Identification of Misconfigurations – New monitoring of Kubernetes logs will identify misconfigurations within Kubernetes that have the potential to introduce risk into the environment.
  • Improved Kubernetes Ruleset – New rules will detect behaviors such as pod creation or deletion, pod starts and stops, node behavior events, login events, and configuration changes.

“Nearly every company realizes the cost efficiencies and reliability containers offer, but in the rush to achieve these benefits, many have overlooked the risks associated with the lack of visibility often found in container infrastructure,” said Aditya Joshi, Executive Vice President, Product and Engineering, Threat Stack. “The latest enhancements to the Threat Stack Cloud Security Platform drastically reduce this risk by providing unparalleled visibility into container infrastructure.”

To learn more about Threat Stack’s container security offering and the importance of maintaining visibility and control as you migrate to containers, visit Threat Stack’s enhanced Kubernetes monitoring will be generally available in May 2019.

Threat Stack is now F5 Distributed Cloud App Infrastructure Protection (AIP). Start using Distributed Cloud AIP with your team today.

About F5

F5 is a multi-cloud application services and security company committed to bringing a better digital world to life.​​​​​​​ F5 partners with the world’s largest, most advanced organizations to secure and optimize every app and API anywhere—on premises, in the cloud, or at the edge. F5 enables organizations to provide exceptional, secure digital experiences for their customers and continuously stay ahead of threats. For more information, go to (NASDAQ: FFIV)

You can also follow @F5 on Twitter or visit us on LinkedIn and Facebook for more information about F5, its partners, and technologies. F5 is a trademark, service mark, or tradename of F5, Inc., in the U.S. and other countries. All other product and company names herein may be trademarks of their respective owners.

# # #

This press release may contain forward looking statements relating to future events or future financial performance that involve risks and uncertainties. Such statements can be identified by terminology such as "may," "will," "should," "expects," "plans," "anticipates," "believes," "estimates," "predicts," "potential," or "continue," or the negative of such terms or comparable terms. These statements are only predictions and actual results could differ materially from those anticipated in these statements based upon a number of factors including those identified in the company's filings with the SEC.