Help the communities most affected by the California wildfires in only a few minutes. We'll donate $10 for every review you submit.

Threat Stack, Inc

4.5
(1)

Threat Stack provides continuous security monitoring for public, private, and hybrid cloud infrastructures protecting servers, and the data they access, from intrusion and data loss.

Work for Threat Stack, Inc?

Learning about Threat Stack, Inc?

We can help you find the solution that fits you best.

Threat Stack, Inc Reviews

Ask Threat Stack, Inc a Question
Write a Review
Threat Stack, Inc review by Harrison H.
Harrison H.
Validated Reviewer
Verified Current User
Review Source

"Great way to automate manual security and compliance processes"

What do you like best?

Threat Stack helps us automate our general security and auditing process, but the best part is eliminating manual evidence collection for compliance.

What do you dislike?

Not all of the AWS services we use are covered comprehensively.

What business problems are you solving with the product? What benefits have you realized?

Using Threat Stack to improve overall security posture and specifically meet certain compliance needs.

Sign in to G2 Crowd to see what your connections have to say about Threat Stack, Inc
Filter Reviews
Showing 0 Threat Stack, Inc reviews
LinkedIn Connections

What Cloud Security solution do you use?

Thanks for letting us know!

There are not enough reviews of Threat Stack, Inc for G2 Crowd to provide buying insight. Below are some alternatives with more reviews:

1
Duo Security Logo
Duo Security
4.4
(76)
Cloud-based user authentication vendor: authenticate with your phone, Duo mobile app, landline, or tokens with or without an internet connection
2
Open DNS Umbrella Logo
Open DNS Umbrella
3.9
(27)
A cloud-delivered network security service that protects any device, no matter where it’s located.
3
Netskope Security Cloud Logo
Netskope Security Cloud
4.4
(20)
Netskope is a Cloud Access Security Broker (CASB)
4
WebTitan Logo
WebTitan
4.3
(19)
WebTitan Cloud is a cloud based web filtering solution allowing you monitor, control and protect your users and business when online. Requiring no on premise software or end user client software, set up is extraordinarily simple and quick. WebTitan Cloud allows you create policies to protect your organization from malware, phishing, and viruses, block access to unsuitable material such as pornography, hate speech or mature sites, and control access to non work related material in a way that suits you.
5
Skyhigh Cloud Security Manager Logo
Skyhigh Cloud Security Manager
4.4
(16)
Skyhigh Cloud Security Manager enables IT to embrace and accelerate the adoption of cloud services while ensuring privacy, security, and compliance.
6
Microsoft Cloud App Security Logo
Microsoft Cloud App Security
4.2
(10)
Microsoft Cloud App Security is an enterprise-grade security for cloud apps.
7
Symantec Cloud Workload Protection Logo
Symantec Cloud Workload Protection
4.1
(10)
Automate security for your public cloud workloads and containers, and scan Amazon S3 buckets for malware with cloud-native protection that integrates with DevOps and CI/CD pipelines
8
Trend Micro Deep Security Logo
Trend Micro Deep Security
4.1
(10)
Trend Micro Deep Security is designed to mprove visibility and simplify security management across physical, virtual, and cloud environments.
9
Webroot DNS Protection Logo
Webroot DNS Protection
3.9
(10)
Webroot SecureAnywhere DNS Protection offers a quick, straightforward, and highly effective way to secure the DNS protocol connection against compromise. With advanced reporting and 82 URL categories, admins gain greater visibility than ever, reduce risk, and can tailor usage policies to their organization's unique needs.
10
Omnishield by MyDigitalShield Logo
Omnishield by MyDigitalShield
5.0
(5)
OmniShield is the next-generation cybersecurity solution that extends your company's perimeter to all your sites while providing omnipresent, enterprise-grade security.
Show more
Kate from G2 Crowd

Learning about Threat Stack, Inc?

I can help.
* We monitor all Threat Stack, Inc reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. Validated reviews require the user to submit a screenshot of the product containing their user ID, in order to verify a user is an actual user of the product.