The Threat Stack Rest API provides a way to connect to a Threat Stack Organization and extract key information around security concerns in your environment. The API sends requests and responses in JSON format with access requiring authentication using an API Key. The endpoints are accessible via HTTP GET, POST, PUT, and DELETE methods that includes services for; Agent, Alerts, Audit, Rules and more. Threat Stack provides continuous security monitoring for public, private, and hybrid cloud infrastructures protecting servers, and the data they access, from intrusion and data loss.
The following is a list of how-to and tutorial content that matched your search term. ProgrammableWeb's how-to content comes from two sources; full-blown tutorials that we publish ourselves and other highly relevant tutorials that we find elsewhere on the Web. This list represents on combination of both tutorial types and if you go to ProgrammableWeb's API University, you'll not only be able to find more, they are organized based on your role (API providers or developers who consumes APIs). If you know of a tutorial that would be of interest to the ProgrammableWeb community, we'd like to know about it. Be sure to check our guidelines for making contributions to ProgrammableWeb.