6sense provides an Account Based Orchestration Platform that helps revenue teams identify and close more opportunities by putting the power of AI, big data, and machine learning behind every member of the B2B revenue team, empowering them to uncover anonymous buying behavior, prioritize fragmented data to focus on accounts in market, and engage resistant buying teams with personalized, multi-channel, multi-touch campaigns.
Faced with a constantly growing infrastructure, 6sense needed an effective means of keeping workloads and servers secure, compliant, and protected while delivering speed, efficiency, and security to their customers. 6sense also wanted to streamline the time and resources required to maintain their SOC 2 Type 1 compliance process.
6sense adopted Threat Stack’s Cloud Security Platform® because it gave them an IDS that could provide comprehensive, continuous, real-time monitoring throughout their environment along with detailed, actionable telemetry and a full audit trail. In addition, 6sense was drawn to the platform because it was easy to configure and could be managed with a small team that had limited time and resources. Since installing Threat Stack, 6sense has obtained a clear understanding of how its systems interact with their host OS and each other, and has been able to define strict rules for what is allowed both on the file system and network. 6sense has also simplified their SOC 2 Type 1 certification process by using Threat Stack as their sole piece of evidence for tools and protocols for monitoring all network-level and system-level activities.
Ease of deployment, setup, and use enabled 6sense to start deriving immediate benefits from the Threat Stack platform. Once installed, it provided full stack security visibility, continuous monitoring, actionable alerts, and a detailed audit trail, while also acting as the sole source of evidence required to support the SOC 2 Type 1 certification process. On the prospect/customer side, the sales and onboarding cycles were shortened by 6sense’s ability to prove compliance and demonstrate security.
2013
San Francisco, CA
Information Technology & Services
165