CIO Influence
CIO Influence News Cloud Security

Threat Stack Releases New Alert Context Functionality

Threat Stack Releases New Alert Context Functionality
Enhancements to the Threat Stack Cloud Security Platform® user interface provide security leaders with quick and accurate guidance to expedite investigations

Threat Stack, a leader in cloud security for infrastructure and applications, announced new alert context functionality to reduce mean-time-to-know (MTTK) within the Threat Stack Cloud Security Platform. Threat Stack’s enhanced alert context provides meaningful data that will help guide security leaders’ investigations into high severity alerts in real-time.

 Recommended ITech News: Speedscale Announces Traffic Viewer For API Visibility In Kubernetes Clusters

Threat Stack announces new alert context functionality to reduce #MTTK within the Threat Stack Cloud Security Platform. The enhanced alert context provides visual #data that will help guide #security teams investigating high severity alerts in real-time.

When investigating an alert that may be a potential security risk, every minute counts. Yet, according to IBM, the average time to identify a breach in 2020 was 207 days, providing cybercriminals ample time to steal critical information, compromise employees, or launch new attacks. Threat Stack’s enhanced user interface (UI) with alert context functions includes highlights, visualizations, and tables that provide security leaders with the necessary information to identify and remediate potential threats quickly. This machine-generated context includes visualizations and trend graphs that flag threat trends based on frequency and volume. The updated platform UI can also group alerts by common indicators, such as compliance and process, enabling users to correlate across behaviors more quickly. This helps users to better understand which alerts are a higher priority for investigation.

Recommended ITech News: Schneider Electric Empowers Citizen Developers With SnapLogic

“At Threat Stack, we want to arm our customers with the ability to prioritize and investigate alerts with ease,” said Chris Ford, VP of Product at Threat Stack. “The new alert context functionality reduces MTTK so users can triage alerts quickly and directly through the Threat Stack Cloud Security Platform. This update is yet another example of platform automation that reduces toil for security analysts and helps alleviate some of the burden resource-strapped security teams face.”

The highlights function supports point-in-time context by summarizing historical activity related to the alert. The additional context provides businesses with data about corporate infrastructure, users, and process activities while offering crucial guidance during security investigations over the past month. Threat Stack is also introducing a refreshed alerts page that provides users with visualizations such as histograms that can show activity for users over the past 30 days. In addition, the histogram is interactive, allowing users to zoom in and investigate activity on dates of interest.

Recommended ITech News: Acquia Renews Drupal Steward Program Support, Brings Critical Security Fixes to Enterprises First

Related posts

New Partnership Brings Microsoft Teams to Cisco Meeting Room Devices

CIO Influence News Desk

GameDay Leverages Sisense to ‘Infuse’ Visualisation Data and Reduce Time and Cost for Customers

CIO Influence News Desk

Odine and HORISEN Launch SMS & Voice Strategic Partnership for Global Operators

Leave a Comment