You are here

Threat Stack REST API v2.0 - How To

The Threat Stack Rest API provides a way to connect to a Threat Stack Organization and extract key information around security concerns in your environment. The API sends requests and responses in JSON format with access requiring authentication using an API Key. The endpoints are accessible via HTTP GET, POST, PUT, and DELETE methods that includes services for; Agent, Alerts, Audit, Rules and more. Threat Stack provides continuous security monitoring for public, private, and hybrid cloud infrastructures protecting servers, and the data they access, from intrusion and data loss.