Browse Software
List Your Product
Loading...

About Threat Stack

Threat Stack provides full-stack cloud security observability and compliance for infrastructure and applications. The Threat Stack Security Team has observed strong evidence of malicious actors leveraging the unique characteristics of public cloud environments to launch or hide their breaches. In this new variant of the Shellbot campaign, Threat Stack has identified the addition of a new SSH brute force tool, a secondary command, and control method, and the added ability to stop other cryptominers on infected servers.

Pricing

Platforms Supported

  • Browser Based (Cloud)

Organization Types Supported

  • All (Small, Medium, Large)

API Support

  • Available

Modes of Support

  • Online

Threat Stack Features

HIPAA Compliant

Offers security over the collection of sensitive data with SSL

API Access Management

Ensures that calls with authenticated access can enter APIs

Behavior Management

A behavior tracking tool that facilitates fostering positive student attitude/ behavior

Data Import-Export

Helps in importing and exporting data

Access Control

Defines application access to various users. Includes role-based system that controls options to be displayed to different users based on their role

Incident Management

Helps in identifying, analyzing and rectifying a bad incident or issues to ensure it does not reoccur in future

Monitoring

Helps to monitor the database content and data accessibility in an automated and orderly manner

Compliance Tracking

Helps in tracking and monitoring and auditing all the regulatory compliance requirements

Threat Stack Pricing

Free Trial

Not available

Pricing Options

Premium Plans ( Quotation Based )

Pricing Plans

Disclaimer: The pricing details were last updated on 17/09/2020 from the vendor website and may be different from actual. Please confirm with the vendor website before purchasing.

Learn more about Threat Stack Pricing.

Threat Stack Alternatives

View All Threat Stack Alternatives

Threat Stack Reviews

User Rating

4.7/5 (Based on 25 Ratings)

Ratings Distribution

  • Excellent

    68%
  • Very Good

    32%
  • Average

    0%
  • Poor

    0%
  • Terrible

    0%

Do You Use Threat Stack?

Write a Review

Threat Stack User Reviews

Threat Stack FAQs

What is Threat Stack used for?

Threat Stack offers the following functionalities:

  • HIPAA Compliant
  • API Access Management
  • Behavior Management
  • Data Import-Export
  • Access Control
  • Incident Management
  • Monitoring
  • Compliance Tracking

Learn more about Threat Stack features.

Does Threat Stack provide API?

Yes, Threat Stack provides API.

Threat Stack Contact

Vendor Details

Boston, Massachusetts Founded : 2012

Contact Details

Not available

https://www.threatstack.com/

Social Media Handles

Customers

Allocadia
Genesys
iorahealth
Mulesoft

Disclaimer

This research is curated from diverse authoritative sources; feel free to share your feedback at feedback@saasworthy.com

We understand SaaS better

SaaSworthy helps stakeholders choose the right SaaS platform based on detailed product information, unbiased reviews, SW score and recommendations from the active community.

icon

Buyers

Looking for the right SaaS

We can help you choose the best SaaS for your specific requirements. Our in-house experts will assist you with their hand-picked recommendations.

icon

Makers

Want more customers?

Our experts will research about your product and list it on SaaSworthy for FREE.

Get Listed