PRESS RELEASE

Threat Stack Increases Flexibility of Application Security Monitoring

Published December 22, 2020

CONTACTS

Suzanne DuLong
VP, Investor Relations
(206) 272-7049
s.dulong@f5.com

Holly Lancaster
WE Communications
(415) 547-7054
hluka@we-worldwide.com

To Support Rapid Scaling, Threat Stack Application Security Monitoring Now Available in Ruby Gems and NPM

BOSTON, Mass. — Threat Stack, the leader in cloud security and compliance for infrastructure and applications, today announced Threat Stack Application Security Monitoring has been added to Ruby Gems and NPM, further increasing deployment flexibility for Threat Stack customers. With Threat Stack Application Security Monitoring available in Ruby Gems and NPM, Threat Stack customers can seamlessly scale and maintain their application security environment. 

This new flexibility comes as Threat Stack Application Security Monitoring continues to scale rapidly with nearly 1 million application security microagents deployed. Since the beginning of 2020, the deployment of Application Security Monitoring microagents has increased by 240% as customers continue to grow and develop their DevSecOps programs. 

When combining Threat Stack Application Security Monitoring with the rest of the Threat Stack Cloud Security Platform®, customers can achieve in-depth security telemetry from the cloud management console, host, containers, orchestration, managed container services, and applications in a single, unified platform. Threat Stack combines this unparalleled telemetry with rules-based threat detection and machine-learned powered anomaly detection from ThreatML™ to detect, assess, and respond to both known and unknown threats in real-time. 

“Threat Stack understands our customers are being asked to secure rapidly scaling cloud ecosystems while battling resource constraints and competing priorities,” said Brian Ahern, CEO, Threat Stack. “That is why we continue to put an emphasis on innovation and delivering new capabilities to our customers at an extremely rapid pace to help them keep up with accelerating cloud adoption and new evolving threats.”

To learn more about how Threat Stack is helping its customers proactively reduce risk and detect threats using its unique combination of deep workload visibility, unparalleled context, pre-built rules, machine learning, anomaly detection, and human expertise visit www.threatstack.com. 

Threat Stack is now F5 Distributed Cloud App Infrastructure Protection (AIP). Start using Distributed Cloud AIP with your team today.

About F5

F5 is a multi-cloud application services and security company committed to bringing a better digital world to life.​​​​​​​ F5 partners with the world’s largest, most advanced organizations to secure and optimize every app and API anywhere—on premises, in the cloud, or at the edge. F5 enables organizations to provide exceptional, secure digital experiences for their customers and continuously stay ahead of threats. For more information, go to f5.com. (NASDAQ: FFIV)

You can also follow @F5 on Twitter or visit us on LinkedIn and Facebook for more information about F5, its partners, and technologies. F5 is a trademark, service mark, or tradename of F5, Inc., in the U.S. and other countries. All other product and company names herein may be trademarks of their respective owners.

# # #

This press release may contain forward looking statements relating to future events or future financial performance that involve risks and uncertainties. Such statements can be identified by terminology such as "may," "will," "should," "expects," "plans," "anticipates," "believes," "estimates," "predicts," "potential," or "continue," or the negative of such terms or comparable terms. These statements are only predictions and actual results could differ materially from those anticipated in these statements based upon a number of factors including those identified in the company's filings with the SEC.