[April 23, 2019] |
|
Threat Stack Improves Security Observability in Kubernetes with New Behavioral Analysis Capabilities
Threat
Stack, the leader in cloud infrastructure security and compliance,
today announced enhancements to the Threat
Stack Cloud Security Platform® that provide customers
with complete security observability of Kubernetes-managed containers.
The improved visibility of Kubernetes environments enables Threat
Stack's customers to leverage container infrastructure without
increasing risk or relying on multiple point solutions to achieve full
stack cloud security observability.
As companies adopt Kubernetes to help orchestrate their container
infrastructure, security processes and policies have been slow to adapt.
This has led to increased risk as companies deploy containers without
the appropriate security processes and tools in place. Threat Stack is
enabling its customers to securely adopt containers and Kubernetes by
eliminating the additional risk associated with the lack of visibility
into their container infrastructure.
New features included in the Threat Stack Cloud Security Platform
designed to improve visibility into Kubernetes environments include:
>
-
Integration with Kubernetes API Endpoints - The Threat Stack
Cloud Security Platform can pull data from Kubernetes in multiple
ways, providing more flexibility depending on the customer use case.
-
Real-Time Behavioral Analysis of Kubernetes Environments -
Through a new direct integration with Kubernetes, the platform will
enable Threat Stack customers to identify signs of risky behavior or
intrusion in their Kubernetes environments.
-
Proactive Identification of Misconfigurations - New
monitoring of Kubernetes logs will identify misconfigurations within
Kubernetes that have the potential to introduce risk into the
environment.
-
Improved Kubernetes Ruleset - New rules will detect behaviors
such as pod creation or deletion, pod starts and stops, node behavior
events, login events, and configuration changes.
"Nearly every company realizes the cost efficiencies and reliability
containers offer, but in the rush to achieve these benefits, many have
overlooked the risks associated with the lack of visibility often found
in container infrastructure," said Aditya Joshi, Executive Vice
President, Product and Engineering, Threat Stack. "The latest
enhancements to the Threat Stack Cloud Security Platform drastically
reduce this risk by providing unparalleled visibility into container
infrastructure."
To learn more about Threat Stack's container security offering and the
importance of maintaining visibility and control as you migrate to
containers, visit www.threatstack.com/securing-containerized-environments.
Threat Stack's enhanced Kubernetes monitoring will be generally
available in May 2019.
About Threat Stack Threat Stack enables DevOps and SecOps
teams to innovate and scale securely by providing full stack cloud
security observability from the cloud management console to the
application layer. Purpose-built for today's infrastructure, the Threat
Stack Cloud Security Platform® and Cloud SecOps Program?
combine cloud optimized intrusion defense, continuous security
monitoring, and proactive risk assessment to help Security and
Operations teams detect security incidents, achieve compliance, and
deploy containers securely.
For more information or to schedule a demo, visit threatstack.com.
View source version on businesswire.com: https://www.businesswire.com/news/home/20190423005146/en/
[ Back To TMCnet.com's Homepage ]
|