CONTACTS
Suzanne DuLong
VP, Investor Relations
(206) 272-7049
s.dulong@f5.com
Holly Lancaster
WE Communications
(415) 547-7054
hluka@we-worldwide.com
New RESTful API Endpoints Enable SecOps Teams to Integrate Threat Stack Cloud Security Platform into Existing DevOps and Security Workflows
BOSTON, Mass. — Threat Stack, the leader in cloud infrastructure security, today announced a new comprehensive API that will give customers the ability to create, deploy, augment, and tune security rules directly within their existing DevOps and Security tools. Threat Stack customers will now be able to seamlessly manage and configure the Threat Stack Cloud Security Platform® without a separate interface, reducing context switching within workflow tools, while leading to more actionable alerts and reducing alert fatigue.
The new comprehensive API will allow for the suppression and dismissal of alerts from existing tools, drastically streamlining incident response workflows and reducing the mean time to response (MTTR). The ability to disable and enable rules programmatically will also enable Threat Stack customers to conduct system maintenance without interrupting DevOps and Security teams or increasing the number of false positive alerts.
Combined with its recently announced direct data export to Amazon S3, Threat Stack is enabling DevOps and Security teams to reduce the number of tools needed to effectively secure their cloud infrastructure on a day-to-day basis. With the ability to achieve complete full-stack cloud security observability without the need to manage another tool, Threat Stack customers will be able to deploy truly integrated DevSecOps processes.
“One of the most common complaints from DevOps and security teams is the sheer number of separate tools they manage,” said Aditya Joshi, Executive Vice President of Product and Engineering, Threat Stack. “By enabling our customers to automate workflows and integrate the Threat Stack Cloud Security Platform within their existing toolset, we’re helping them streamline their workflow enabling them to reduce risk while increasing efficiency.”
The Threat Stack Cloud Security Platform is a cloud optimized intrusion detection platform that provides customers with full stack cloud security observability from the control plane to the application layer. It powers the Threat Stack Cloud SecOps Program℠, a series of services designed to provide the expertise needed to integrate security and operations without having to recruit hard-to-find talent.
Threat Stack’s comprehensive API is available now. To learn more about the new comprehensive API and Threat Stack’s integrations visit: www.threatstack.com/integrations
Threat Stack is now F5 Distributed Cloud App Infrastructure Protection (AIP). Start using Distributed Cloud AIP with your team today.
F5 is a multi-cloud application services and security company committed to bringing a better digital world to life. F5 partners with the world’s largest, most advanced organizations to secure and optimize every app and API anywhere—on premises, in the cloud, or at the edge. F5 enables organizations to provide exceptional, secure digital experiences for their customers and continuously stay ahead of threats. For more information, go to f5.com. (NASDAQ: FFIV)
You can also follow @F5 on Twitter or visit us on LinkedIn and Facebook for more information about F5, its partners, and technologies. F5 is a trademark, service mark, or tradename of F5, Inc., in the U.S. and other countries. All other product and company names herein may be trademarks of their respective owners.
# # #
This press release may contain forward looking statements relating to future events or future financial performance that involve risks and uncertainties. Such statements can be identified by terminology such as "may," "will," "should," "expects," "plans," "anticipates," "believes," "estimates," "predicts," "potential," or "continue," or the negative of such terms or comparable terms. These statements are only predictions and actual results could differ materially from those anticipated in these statements based upon a number of factors including those identified in the company's filings with the SEC.