Fraud & Identity Fraud & Identity

Fraud & Identity Industry News

TMCNet:  Threat Stack Included in Gartner's Market Guide for Cloud Workload Protection Platforms as a Representative Vendor

[May 19, 2017]

Threat Stack Included in Gartner's Market Guide for Cloud Workload Protection Platforms as a Representative Vendor

Threat Stack, the leader in cloud-native security and compliance management, today announced that it was named a representative vendor in Gartner's (News - Alert) Market Guide for Cloud Workload Protection Platforms.*

"The rapid adoption of private and public cloud computing models, containers and DevSecOps are fundamentally reshaping the security requirements for protecting private and public server workloads. The time has come for enterprises to start protecting cloud-based workloads, using a protection strategy that is different from end-user-facing desktops and laptops," writes analyst Neil MacDonald. Threat Stack believes its cloud-native security and compliance management platform is bringing an innovative approach to meeting security and operation teams' needs based on that criteria.

"There is a clear demand for visibility and automation in the cloud workload protection platform market, and we believe Threat Stack's inclusion in the report validates our ability to provide cutting edge cloud security capabilities for organizations running in any type of environment," said Brian Ahern, CEO, Threat Stack. "With the growth of cloud infrastructure, threats are now bypassing traditional perimeters and targeting cloud-based workloads directly, meaning security leaders need to embrace a different detection strategy than they've previously used. In order to protect against potential malicious attacks, organizations must secure their infrastructure by having complete visibility into their cloud environments to detect and respond to any anomalous activity."

Threat Stack was purpose-built for both Security and Ops teams, eaily integrated into existing cloud workflows and designed to immediately detect insecure behaviors across systems, users, and environments. Threat Stack's cloud-native security platform offers configuration auditing, real-time host intrusion detection, compliance reporting, incident investigation and out-of-the-box workflow integrations across a variety of environments, including private, public, multi-cloud and hybrid cloud. The Cloud Security Platform is also able to automatically correlate security events across the infrastructure to uncover the root cause of potentially malicious events. This type of automation ensures that customer data is kept secure, alerting security teams immediately if anything out of the ordinary happens. As a cloud-native platform, Threat Stack can easily scale to meet the largest, or the smallest, customer's cloud security needs.

For more information on how Threat Stacks can help secure cloud environments, please visit:

*Gartner, "Market Guide for Cloud Workload Protection Platforms," 22 March 2017

Gartner Disclaimer:
Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

About Threat Stack:
Threat Stack enables growth-driven companies to scale securely and meet compliance by identifying and verifying insider threats, external attacks, and data loss in real-time. It is the only fully integrated, cloud-native security platform that supports multi-cloud, on premise, and hybrid environments. Threat Stack gives customers instant visibility and automatically responds to changes in their environment throughout the stages of their cloud security maturity, from auditing their environment, to continuous monitoring and alerting, to investigation and remediation. Threat Stack provides the coverage needed to run secure and compliant, in all environments, without sacrificing speed and efficiency. For more information, or to start a free cloud security trial, visit

[ Back To Fraud & Identity's Homepage ]

Industry Insights

(MobileID) Proactive Fraud Prevention

Interconnect-related fraud such as International Revenue Share Fraud (IRSF) and PBX hacking fraud continue to be a billion dollar problem to the telecom industry.

(Defender Shield) Defense solutions for the modern SMS ecosystem

SMS is a ubiquitous communication method for person-to-person (P2P) text messaging, which has been in use globally for nearly 20 years.

(Defender Shield) Preventing Grey Routes and the Multi-billion dollar Threat

The convenience of mobile messaging has brought communication efficiency to billions of consumers worldwide. As is often the case with widely accepted technologies; however, convenience can provide a vulnerable gateway to fraudulent activity.

Product Documents

Asset Protect

While unlimited or high-volume voice and SMS plans offer great value to subscribers, sometimes fraudsters exploit these plans to avoid paying termination and interconnect fees.

Defender Shield

In a world with ever-increasing Application-to-Person (A2P) messaging needs and competition, improving customer satisfaction and eliminating revenue leakage is key for protecting SMS profits.


Accurate and cost-efficient routing of voice calls and SMS is critical. Unfortunately, gathering reliable routing data on ported numbers and keeping up with constant changes in number plans is expensive and time-consuming.

Fraud Solutions

Communications fraud is a $20B annual global problem and growing. Companies are looking for peace of mind so that their business and their customers are protected from the onslaught of technology crime that is damaging their reputations and their balance sheets.