Threat Stack partners with Liquid Web to extend the Threat Stack Oversight IDS to customers
Threat Stack announced a strategic partnership with Liquid Web. As part of this partnership, Liquid Web customers can employ the Threat Stack Oversight Intrusion Detection System as an additional layer of security to Liquid Web servers with an advanced Intrusion Detection System (IDS).
Together, Threat Stack Oversight and Liquid Web will provide customers with real-time monitoring for user, process, network, and file behaviors in critical systems across Linux and Windows servers.
Threat Stack Oversight collects, monitors, and analyzes security telemetry across server environments to identify anomalies, assess and prioritize threats, and flag intrusions as they occur.
Through this partnership, Threat Stack security experts will provide support to the Liquid Web technical team by escalating the identification of potential threats and suspicious behavior with relevant context and remediation recommendations.
Threat Stack’s advanced protection can also bolster Liquid Web customers to meet strict security standards, including those required by PCI DSS, SOC 2, and HIPAA/HITECH compliance regulations.
“Threat Stack offers an IDS solution powered by a team of in-house security experts who continuously monitor a customer’s environment,” said Melanie Purkis, Director of Products for Managed Hosting.
”Liquid Web customers can take advantage of Threat Stack’s 24/7 monitoring and remove the burden of intrusion detection from internal teams, allowing fast-growing businesses to focus on their products and services instead of day-to-day security. We are thrilled to have Threat Stack join our portfolio of partners.”
“Threat Stack is excited for this new partnership with Liquid Web. This collaboration will arm more organizations with the ability to achieve a sound security posture,” said Brian M. Ahern, CEO, Threat Stack.
“Liquid Web customers who will use Threat Stack’s Oversight support will fill a necessary gap in detecting and remediating cyber threats in today’s everchanging security landscape.”