Threat Stack Previous Solutions

Skyler Cain
Software Development Manager at Rent Dynamics
The SecOps program was the big seller to me, the fact that we would have their help and their support, especially at the time of an incident. That was the biggest deciding factor. In addition, the fact that their agent was super-easy to set up and get going, and the pricing too. The pricing was reasonable for the agent without the SecOps. One of the other companies was similar. They gave you the SecOps-type deal, but it was like $100 per agent. They took that SecOps and bundled it in. But having the ability to stop the SecOps if we got there and then just pay a cheaper price per agent was very ideal to us because eventually, we probably do want to have an in-house security team. That also helped a lot. View full review »
Director of Security at Eventbrite
We used basic auditd. It's an open-source auditing framework for the Linux environment. The main reason for switching to Threat Stack is that, while Threat Stack effectively does what auditd does, it gives you a user-interface around it. It gives you a way to view the data, to store the data, to search the data, to write an API around the information, and the ability to put controls and best practices around your AWS account. The auditd solution is there but you have to do a lot of heavy lifting on your own. With a very small security team with limited resources, it made a lot of sense for us economically. View full review »
Kevin Johnson
Lead Security SRE at InVision
We replaced CloudWatch for AWS configuration management with Threat Stack. View full review »
Eric Cohen
Sr. Director Information and Security for PureCloud at Genesys Telecommunications Laboratories
We used Trend Micro Deep Security. The issue was a problem in the agent that goes on the servers that was causing our servers to crash. It happened a couple of times and the support wasn't what we wanted, so we decided to change products. We couldn't handle that kind of outage. I can't say there has been a decrease in the mean time to remediation because it's not really an apples-to-apples comparison. Trend Micro had different capabilities. View full review »
Vincent Romney
Director of Information Security at Younique Products
I believe the only thing the company used before Threat Stack was the incumbent AWS logging: CloudWatch, CloudThreat, CloudTrail. The switch was made for the ability to have a single pane of glass to view all of the aggregate log information. View full review »

Sign Up with Email