eBooks & Reports

Threat Stack TEI Case Study_final

Issue link: https://resources.threatstack.com/i/1053995

Contents of this Issue

Navigation

Page 6 of 19

5 | The Total Economic Impact™ Of Threat Stack Why Threat Stack? Interviewed organizations listed the following reasons for choosing Threat Stack to address their challenges: › Improved security visibility. A CISO for a data management platform said: "Threat Stack gives me a level of visibility I didn't have before. I can print out a Threat Stack report that gives a security view people can actually understand; I don't get that with other tools." › Anomaly-based intrusion detection. A CISO for a data management platform stated: "What's attractive for Threat Stack is that it's not definition-based. With anomaly-based intrusion detection, we can build our security to match our specific environment; we're not at the mercy of another organization's definitions and ideas of what a threat might be to our organization." › Strong rules engine. A lead security SRE for a digital product design platform told Forrester: "A real standout feature with Threat Stack was the rules engine. They came out of the box with a really strong set of rules around alerting, where a lot of other vendors today expect you to cook that yourself." › Easy deployment and minimal oversight needed. A senior director of IS and compliance for call center technology said: "We were a small security team. It was very important that we had something we could deploy and manage with just a couple people, while at the same time not worry that we might be missing something." Key Results With Threat Stack The interviews revealed that the investment in Threat Stack addressed the challenges interviewees were facing and provided additional benefits as well: IMPROVED SECURITY VISIBILITY AND PERFORMANCE › Faster mean-time-to-detect (MTTD). A senior director of IS and compliance for call center technology stated: "We're able to detect issues really fast now — our developers say its 'scary fast' how fast a security engineer calls them when they run a command in production that's a little bit suspicious. Threat Stack is real-time." › Better detection. A lead security SRE for a digital product design platform told Forrester: "Even if we had a full-time outsourced security operations center (SOC), they still wouldn't catch half the stuff we've been able to catch with Threat Stack. Those providers' rule sets are really geared toward more traditional infrastructures." › Quick investigation time due to improved visibility. A senior director of IS and compliance for call center technology said: "Whenever we see an incident through Threat Stack, it contains all the data that we need. For example, if someone ran a command in a server instance, I can see which instance, which region, and can drill down to what the command was and who ran it. I can see all the commands run before and after for as long a period I want." "Our MTTD dropped from days to literally seconds and minutes. It's ridiculous and one of my favorite things about Threat Stack." Lead security SRE, digital product design platform "Deployment was very easy. We were able to get our bake- off version up and running very quickly. It wasn't even a comparison; Threat Stack really stood out, just the ease of deployment and configuration." Senior director of IS and compliance, call center technology

Articles in this issue

view archives of eBooks & Reports - Threat Stack TEI Case Study_final