Blog

Polygraphs: behavior baselining to reveal the elephant

You are probably familiar with the parable of the blind men describing an elephant. Because they experience only what they can touch, each of them has a very different concept of what the animal is. One touches the trunk and concludes it’s a snake. Another explores a leg and concludes it’s a tree. They are, […]

Read More…

Lacework’s Partnerships and Integrations Establish Foundation of New Cloud Security Stack

Mountain View, Calif. – July 25, 2017 – Lacework™, the industry’s first zero-touch cloud security solution, today announced a range of partnerships across the security and cloud ecosystems as critical building blocks of a security stack natively adapted to cloud deployments in Amazon Web Services (AWS), Microsoft Azure and private clouds. Organizations transitioning to modern […]

Read More…

Introduction to Polygraphs

In my last blog, I talked about how we developed requirements for a Cloud Workload Protection Platform (CWPP) for modern data centers. In this blog, I’m going to dive into the heart of the matter: how Lacework builds the baseline we use for everything from breach detection to incident investigations. But first, let me recap […]

Read More…

Smitten with containers? What about security?

Developers are smitten with containers. It’s no mystery why — they’re perfect partners for agile development and fast-paced DevOps environments. Containers start up in seconds and use a fraction of the resources of traditional VMs, making them ideal for microservices architectures and scalable apps. Convenience is a big part of the allure too: third party images make […]

Read More…