Threat Stack announces containerized agent to enable container deployment at scale
Threat Stack announced streamlined deployment of the Threat Stack Cloud Security Platform designed to provide organizations with the ability to automate the deployment of Threat Stack’s agent as a separate container.
With a new containerized version of its Cloud Security Platform agent, Threat Stack customers will be able to maintain security visibility as they continue to scale their container infrastructure without slowing down DevOps processes.
With the new deployment model, Threat Stack customers can leverage Kubernetes DaemonSets to deploy Threat Stack’s agent alongside new container deployments, streamlining the install and management process.
While the agent is deployed as its own container, it will provide the same in-depth host and container visibility as Threat Stack’s current agent installed directly on the host.
Threat Stack’s agent will be available as a container image on Docker Hub. The ease of deployment via Docker Hub will enable customers to increase visibility into container environments with alerts.
The new deployment model of Threat Stack’s existing Cloud Security Platform will be generally available in September 2018.
“We’re seeing our customers’ infrastructure transition very quickly to containers and container orchestration,” said Aditya Joshi, Executive Vice President, Products & Technology.
“Our containerized agent will help them maintain the deep visibility into both host and container infrastructure that they’ve come to expect from Threat Stack, while at the same time gaining the velocity and operational simplicity of containers. It’s a win-win for our customers.”
The Threat Stack Cloud Security Platform gives security and operations teams a place to monitor their infrastructure, detect security incidents, and identify patterns of risky behavior across the organization.
It also powers the Threat Stack Cloud SecOps Program, a series of services designed to provide the expertise that growing organizations need to integrate security and operations without having to recruit hard-to-find talent.