Threat Stack released a new API that will give customers the ability to create, deploy, augment, and tune security rules directly within their existing DevOps and security tools.
Threat Stack customers will now be able to manage and configure the Threat Stack Cloud Security Platform without a separate interface, reducing context switching within workflow tools, while leading to more actionable alerts and reducing alert fatigue.
The new API will allow for the suppression and dismissal of alerts from existing tools, streamlining incident response workflows and reducing the mean time to response (MTTR). The ability to disable and enable rules will also enable Threat Stack customers to conduct system maintenance without interrupting DevOps and security teams or increasing the number of false positive alerts.
Combined with its direct data export to Amazon S3, Threat Stack is enabling DevOps and security teams to reduce the number of tools needed to secure their cloud infrastructure on a day-to-day basis. With the ability to achieve full-stack cloud security observability without the need to manage another tool, Threat Stack customers will be able to deploy integrated DevSecOps processes.
“One of the most common complaints from DevOps and security teams is the sheer number of separate tools they manage,” said Aditya Joshi, Executive Vice President of Product and Engineering, Threat Stack. “By enabling our customers to automate workflows and integrate the Threat Stack Cloud Security Platform within their existing toolset, we’re helping them streamline their workflow enabling them to reduce risk while increasing efficiency.”
The Threat Stack Cloud Security Platform is a cloud optimized intrusion detection platform that provides customers with full stack cloud security observability from the control plane to the application layer. It powers the Threat Stack Cloud SecOps Program, a series of services designed to provide the expertise needed to integrate security and operations without having to recruit talent.