Threat Stack Cloud Security Platform launches with Webhook API integration capabilities



Cloud security management and compliance player Threat Stack announced its webhook API integration capabilities to reduce security and operations workflow challenges. This capability allows Threat Stack customers to enable a webhook API to build custom workflows based on security alerts. These custom workflows extend the Threat Stack Cloud Security Platform (CSP) and help customers to further integrate security into their existing monitoring operations.

Threat Stack customers using webhooks can integrate the Threat Stack Cloud Security Platform with custom internal applications; merge with other monitoring platforms to more identify issues, and focus on building new escalation and/or remediation workflows based on Threat Stack alerts.

Threat Stack users can custom configure their own webhook integrations to subscribe to specific, prioritized events. When an event is triggered, the webhooks integration sends a summary of alert information in JavaScript Object Notation (JSON) format, and every alert results in a separate call to the webhooks API. Users are then able to interpret their alerts and take actions based on their unique needs.

01_cloud_security_platform_11

The Threat Stack Cloud Security Platform offers latest security features, seamlessly integrated and managed through a single, cloud-native, SaaS application. It removes the expense, complexity and time required to identify and verify threats and keep data protected. A comprehensive security suite, CSP provides complete coverage and correlated contextual insights into damaging threats.

Threat Stack deploys in seconds, integrating with configuration management platforms such as Chef, Puppet, Ansible and Salt. With the click of a button using Threat Stack’s management dashboard and simple, intuitive workflows, users are exposed to Threat Stack’s cloud-native architecture automatically scales up or down with the capacity of infrastructure to ensure continuous visibility across the environment.

With the Threat Stack Cloud Security Platform, enterprises can track suspicious user activity, connections to command and control servers, and access to key secret and configuration files. It alsi allows tracking of changes to infrastructure in real-time, and generation of infrastructure alerts based on user, event name, counts of events and source IP.

The Threat Stack Cloud Security Platform lets companies Examine the package information on the workload and tell the user whether there are any vulnerable packages inside them, and organize workflows around what is important based on common vulnerabilities and exposure (CVEs). It also lets users know when workloads are communicating to known “bad hosts”, and receive granular alerts about who servers are talking to.

The platform’s real-time visibility, detailed audit trails and built-in compliance reporting provide the historical record companies need to meet compliance regulations and ensure data and infrastructure are protected. It helps enterprises meet compliance for HIPAA, PCI DSS, SOC 2, ISO 27001 and SOX 404 regulations; ensure internal controls and processes are met, and protect important files.

 

Leave a Reply

WWPI – Covering the best in IT since 1980