Now enriching host OS and container events with EC2 metadata to reduce MTTD and MTTK
Threat Stack, the leader in cloud security and compliance for infrastructure and applications, announced new capabilities that help security teams quickly detect and remediate threats in cloud infrastructure.
Recommended AI News: Banjo Health Inc. Announces Partnership with ELMCRx Solutions
Threat Stack now enriches Linux host and container events in real time with EC2 metadata like VPC, security group, and DNS names. This added data allows customers to build targeted, infrastructure-aware rules, and machine learning models that dramatically reduce false positives and reduce alert investigation time to minutes.
By correlating workload events with cloud trail events in the Threat Stack Cloud Security Platform, Threat Stack customers will also be able to more rapidly identify threats that span multiple layers of cloud infrastructure.
Recommended AI News: Server at Work Rebrands as SAW.IT
Finally, enriching workload events with EC2 metadata further informs ThreatML, Threat Stack’s machine learning engine that collects, normalizes, and analyzes over 60 billion events per day from customer cloud infrastructure. Threat Stack combines the anomaly detection from ThreatML with a pre-built and configurable ruleset to detect both known and unknown threats in real time.
“With insight into every layer of cloud infrastructure, Threat Stack already had the most in-depth and broad security telemetry in the industry today,” said Brian Ahern, CEO, Threat Stack. “The addition of EC2 metadata to our security telemetry is a huge win for our customers as it enables security teams to further reduce their mean time and get back to focusing on proactive security faster.”
Recommended AI News: InGen Dynamics to Continue to Diversify Application of A.I and Robotics Technologies