Case Studies

6sense Case Study

Issue link: https://resources.threatstack.com/i/871265

Contents of this Issue

Navigation

Page 1 of 1

06 AM 03 AM 09 AM 12 PM 03 PM 06 PM 09 PM 12 AM 03 AM Contact Us info@threatstack.com 266 Summer Street, 3rd Floor, Boston, MA 02210 @ threatstack (857) 999-3820 "Threat Stack not only provides a full security monitoring suite in a single aordable tool, it also goes beyond industry standard tools to give you incredibly detailed insight into the activity on your systems." Jameel Al-Aziz, DevOps/Soware Engineer 6sense Meeting SOC 2 Compliance "The most compelling piece about Threat Stack is we were able to greatly simplify the SOC 2 Type 1 certification process by providing Threat Stack as evidence of our security policies in practice," said Al-Aziz. First, they were able to use Threat Stack as evidence of their incident response policy. More importantly, 6sense uses Threat Stack as their sole piece of evidence for tools and protocols for monitoring all network level and system level activities. "The evidence was incredibly easy to obtain through the UI and we were also able to forego the network vulnerability scan require- ment by stating that Threat Stack was continuously running and scanning for network activity," explained Al-Aziz. Committed to Protecting Customers "Our contracts stipulate a strong degree of security, and Threat Stack allows us to honor that commitment," said Al-Aziz. 6sense now uses Threat Stack to speed up security audits when on-board- ing new customers, giving them the peace of mind that their data will remain secure. Al-Aziz sums it up best when he says, "If you truly want to protect your assets, it's best to pay for a solution built by experts." "Threat Stack not only provides a full security monitoring suite in a single aordable tool, it also goes beyond industry standard tools to give you incredibly detailed insight into the activity on your systems." With the added bonus of being able to replay the TTY session, "you really can't ask for much more!" said Al-Aziz. "I couldn't find any vendors that remotely came close to what Threat Stack oered." "Setting up and configuring Threat Stack is as simple as a one-line command," explained Al-Aziz. Once you have your policies in place, configuring a box to use that policy is simply a matter of including a single parameter to that one-line command. "Gone are the days of configuring complicat- ed snort rules!" Achieving Peace of Mind Since Threat Stack detects previously unknown network activity, Al-Aziz is now able to quickly monitor, audit and harden rogue processes and default system processes that would otherwise go undetected. "Threat Stack has truly helped us understand how our systems interact with their host OS and with each other and we can define strict rules of what is allowed both on the file system and the network." Al-Aziz and team now have peace of mind that if someone breached their systems, not only would they know about it, they'd have a full audit trail. "It allows us to know that despite passing vulnerability scans, should someone use a previously unknown vulnerability to access customer data, we will know about it."

Articles in this issue

Links on this page

view archives of Case Studies - 6sense Case Study