Include:
Tech
Cybersecurity
Business Strategy
Channel Insights
Stay Connected
Acer America
Acer America Corp. is a computer manufacturer of business and consumer PCs, notebooks, ultrabooks, projectors, servers, and storage products.

Location

333 West San Carlos Street
San Jose, California 95110
United States

WWW: acer.com

ChannelPro Network Awards

hello 2
hello 3

Press Releases

May 25, 2018 |

Threat Stack Announces Enhanced Support for Businesses Transitioning to Container-Based Infrastructure and Kubernetes

Threat Stack Cloud SecOps Program Now Offers Businesses Enhanced Visibility and Expertise to Effectively Manage Container-Based Cloud Environments

Threat Stack, the leader in Cloud Infrastructure Security, announced enhancements to the†Threat Stack Cloud Security Platform†and†Cloud SecOps Program. Threat Stack now provides security and IT leaders transitioning to container-based infrastructure the expertise and enhanced security visibility necessary to effectively manage the addition of container-based cloud environments.

Gartner†estimates that 50 percent of companies will use container technology by 2020, up from less than 20 percent in 2017. Operations teams are accelerating the transition to container-based infrastructure to reduce operational complexity; however, even when adding containers and kubernetes, they frequently underestimate the visibility required in these complex, heterogeneous environments. Threat Stack’s integrated offering minimizes risk across the attack surface, providing unparalleled visibility and actionable analytics across host and container environments.

“As organizations add containers and container orchestration to virtual environments, their attack surface is growing rapidly, requiring a new approach to security,” said Aditya Joshi, Threat Stack EVP of Products and Technology. “Our customers can now leverage Threat Stack across diverse infrastructure portfolios with unprecedented visibility into workloads no matter how their DevOps teams deploy or evolve them. They can embed security operating principles seamlessly to make certain security is planned work, and not an interruption.”

Threat Stack’s enhanced security now monitors behaviors in both the underlying host infrastructure and containers. With built-in support for CIS benchmarks and best practices, Threat Stack provides comprehensive visibility into several potential threats in containerized infrastructure:

  • Container misconfiguration and unwanted changes;
  • Unauthorized changes or access to secret files;
  • Anomalous inbound and outbound network connections to and from containers;
  • User and process activity, including shell commands executed from within containers.

These new features are now available to current Threat Stack customers.

To learn more about how Threat Stack secures cloud infrastructures in transition, please go to†Securing Containerized Environments, or view the company’s latest video:†Securing Evolving Infrastructures.

Related News & Articles

Growing the MSP

Editor’s Choice


Explore ChannelPro

Events

Reach Our Audience