THREAT STACK
Threat Stack enables DevOps and SecOps teams to innovate and scale securely, meeting complex cloud security needs by identifying and verifying insider threats, external attacks, and compliance gaps in real-time. Purpose-built for today’s infrastructure, the Threat Stack Cloud Security Platform® and Cloud SecOps Program℠combines continuous security monitoring and risk assessment to empower security and operations teams to better manage risk and compliance across their entire infrastructure, including cloud, hybrid-cloud, and containerized environments.
THREAT STACK
Industry:
Cloud Security DevOps SaaS Security
Founded:
2012-11-01
Address:
Boston, Massachusetts, United States
Country:
United States
Website Url:
http://www.threatstack.com
Total Employee:
101+
Status:
Active
Contact:
(617)337-4270
Email Addresses:
[email protected]
Total Funding:
72.27 M USD
Technology used in webpage:
Domain Not Resolving LetsEncrypt HSTS Cloudflare Hosting Person Schema Gravatar Profiles Apple Mobile Web App Capable HSTS IncludeSubdomains PreLoad Ruby On Rails Token Amazon S3 CDN
Similar Organizations
Agile Stacks
Agile Stacks provides DevOps automation platform for cloud infrastructure and machine learning.
Indusface
Is a cloud based application security company that offers web application scanning, web application firewall, CDN & DDoS mitigation.
Bitglass
Bitglass is an information technology company that helps enterprises move to SaaS-based and mobile deployments securely.
CyberQ
CyberQ operates as a cybersecurity company.
Imvision
How enterprises secure their APIs -- Protect your APIs wherever they are, throughout their lifecycle.
Infrascale
Infrascale provides comprehensive, cloud-based data protection by delivering industry-leading backup and disaster recovery solutions.
QuoteMachine
QuoteMachine is a cloud software to help local retailers turn any in-store conversation into an online sale.
Signal Sciences
Signal Sciences is a software as a service platform providing security monitoring and defense for your web applications.
Volterra
Volterra is a distributed cloud services company.
Current Advisors List
Current Employees Featured
Founder
Acquisitions List
Date | Company | Article | Price |
---|---|---|---|
2018-11-08 | Bluefyre | Bluefyre acquired by Threat Stack | N/A |
Investors List
Eight Roads Ventures
Eight Roads Ventures investment in Series C - Threat Stack
.406 Ventures
.406 Ventures investment in Series C - Threat Stack
Scale Venture Partners
Scale Venture Partners investment in Series C - Threat Stack
F-Prime Capital
F-Prime Capital investment in Series C - Threat Stack
Accomplice
Accomplice investment in Series C - Threat Stack
Scale Venture Partners
Scale Venture Partners investment in Series B - Threat Stack
Accomplice
Accomplice investment in Series B - Threat Stack
.406 Ventures
.406 Ventures investment in Series B - Threat Stack
.406 Ventures
.406 Ventures investment in Series A - Threat Stack
Accomplice
Accomplice investment in Series A - Threat Stack
Newest Events participated


Key Employee Changes
Date | New article |
---|---|
2020-09-24 | Threat Stack hires Peter Basile as VP of Marketing and Kathleen DeShields as VP of HR |
Official Site Inspections
http://www.threatstack.com Semrush global rank: 16.15 M Semrush visits lastest month: 1
- Host name: 104.18.10.203
- IP address: 104.18.10.203
- Location: United States
- Latitude: 37.751
- Longitude: -97.822
- Timezone: America/Chicago

More informations about "Threat Stack"
Threat Stack - Crunchbase Company Profile & Funding
Threat Stack enables DevOps and SecOps teams to innovate and scale securely, meeting complex cloud security needs by identifying and verifying insider threats, external attacks, and … See details»
What is Threat Stack? | F5
Threat Stack is now called F5 Distributed Cloud App Infrastructure Protection (AIP). It is a SaaS solution that secures your cloud-native infrastructure by delivering high-efficacy alerts for … See details»
Threat Stack 2025 Company Profile: Valuation, Investors
Information on acquisition, funding, cap tables, investors, and executives for Threat Stack. Use the PitchBook Platform to explore the full profile. See details»
Threat Stack: Revenue, Worth, Valuation & Competitors 2024
Threat Stack has an estimated revenue of $183.6K, and 9 employees. Alternatives of Threat Stack are Lacework, Alert Logic and Armor. See details»
Threat Stack Company Profile - Office Locations, Competitors ...
See insights on Threat Stack including office locations, competitors, revenue, financials, executives, subsidiaries and more at Craft. See details»
Threat Stack Announces the Completion of its Third Consecutive …
Jan 9, 2020 Threat Stack provides the flexibility to consume telemetry within existing security workflows — or manages it with you through the Threat Stack Cloud SecOps Program SM so … See details»
Is Threat Stack Safe? Learn if Threat Stack Is Legit - Nudge Security
Organization Details What is Threat Stack? Threat Stack provides cloud security and compliance for infrastructure and applications so you can leverage the benefits of the cloud. See details»
Threat Stack Announces Enhanced Security Analytics to Proactively ...
Mar 25, 2021 Threat Stack now allows organizations to proactively assess and strengthen an organization’s security posture by quickly accessing, filtering, and visualizing security data. See details»
Threat Stack Company Profile | Management and Employees List
Find contact information for Threat Stack. Learn about their Security Software, Software market share, competitors, and Threat Stack's email format. See details»
F5 Enhances Cloud Security Portfolio with Acquisition of Threat Stack
Sep 20, 2021 Threat Stack provides the flexibility to consume telemetry within existing security workflows — or manages it with you through the Threat Stack Cloud SecOps Programâ„ so … See details»
Threat Stack Named Hot Cloud Security Company of The Year in …
Feb 27, 2020 Threat Stack, the leader in cloud security and compliance for infrastructure and applications today announced that Info Security Products Guide, the industry... See details»
F5 Completes Acquisition of Threat Stack to Enhance Cloud …
Oct 4, 2021 The addition of Threat Stack’s cloud security capabilities to F5’s application and API protection solutions will enhance visibility across application infrastructure and workloads to … See details»
Threat Stack Announces the Completion of its Annual Type 2 SOC …
BOSTON, Mass. — February 19, 2019 — Threat Stack, the leader in cloud infrastructure security, today announced that it has successfully completed the Type 2 Service Organization Control … See details»
F5 Enhances Cloud Security Portfolio with Acquisition of Threat Stack
Sep 20, 2021 F5 (NASDAQ: FFIV), today announced a definitive agreement to acquire privately held Threat Stack, a leader in cloud security and workload protection. See details»
Threat Stack Cloud Security Platform®
Threat Stack Cloud Security Platform® ¶ Threat Stack Cloud Security Platform® is a SaaS based application that supports host intrusion detection for both on premise as well as cloud … See details»
Threat Stack Cloud Security Platform (CSP) Reviews - Gartner
Read the latest, in-depth Threat Stack Cloud Security Platform (CSP) reviews from real users verified by Gartner Peer Insights, and choose your business software with confidence. See details»
Threat Stack Achieves AWS Container Competency Status
Dec 3, 2019 Threat Stack provides the flexibility to consume telemetry within existing security workflows — or manages it with you through the Threat Stack Cloud SecOps Programâ„ so … See details»
F5 Completes Acquisition of Threat Stack to Enhance Cloud …
Oct 4, 2021 SEATTLE-- (BUSINESS WIRE)--F5 (NASDAQ: FFIV), today announced it has completed the acquisition of Threat Stack, a leader in cloud security and workload protection. … See details»
Threat Stack Announces Context Enrichment for AWS EC2 Instances
Feb 2, 2021 Threat Stack today announced new capabilities that help security teams quickly detect and remediate threats in cloud infrastructure. See details»
How Microsoft names threat actors - Unified security operations
Jun 2, 2025 Learn how Microsoft names threat actors and how to use the naming convention to identify associated intelligence. See details»