Threat Stack, the leader in cloud security and compliance for infrastructure and applications, today announced its ability to support AWS Graviton2-based instances through the Threat Stack Cloud Security Platform. This capability comes at a critical moment as organizations increasingly move their workloads to AWS Graviton2-based Amazon Elastic Compute Cloud (Amazon EC2) instances for performance and cost-savings benefits.
Amazon Web Services (AWS) has released Amazon EC2 instances powered by AWS Graviton2 processors that leverage Arm Neoverse cores, delivering a significant jump in performance at a fraction of the cost. However, the rapid adoption of AWS Graviton2 workloads presents a challenge for security leaders as many of today’s legacy tools do not support it. Security teams need solutions that are compatible with AWS Graviton2 and can accelerate security and compliance for workloads running in this emerging environment.
“AWS Graviton2 represents major cost savings and performance benefits for our customers,” said Brian Ahern, CEO, Threat Stack. “Our full stack security observability strategy is designed to help customers adopt new cloud technologies while still maintaining visibility to threats. We’re excited to add AWS Graviton2 to the list of instance types that we can help to secure.”
Threat Stack now supports Amazon EC2 instances powered by AWS Graviton2, with capabilities to collect relevant security and compliance telemetry, including user, process, file, and network behaviors. With Threat Stack’s unique combination of telemetry collection, behavioral rules, ML-powered anomaly detection, and in-house SOC for 24/7 365 security coverage, customers can ensure they have visibility to possible risk across cloud workloads, even as they migrate to AWS Graviton2.
Support for Arm-based applications running on AWS Graviton 2-based instances is available to Threat Stack customers beginning April 14, 2021. To learn more, visit: https://www.threatstack.com/blog/arm-support
About Threat Stack
Threat Stack is the leader in cloud security and compliance for infrastructure and applications, helping companies securely leverage the cloud’s business benefits with proactive risk identification and real-time threat and anomaly detection. The Threat Stack Cloud Security Platform® delivers full-stack security and compliance visibility across the cloud management console, host, container, orchestration, managed containers, and serverless layers. Threat Stack provides the flexibility to consume our telemetry within existing security workflows and tools — or manages it with you through the Threat Stack Cloud SecOps Program℠ so you can respond to security incidents and proactively improve your organization’s security posture.