Blog

Cloud gen security monitoring

What is the Difference Between Performance and Security Monitoring?

There are many important discussions taking place regarding how performance monitoring works, and although security monitoring shares a lot of common themes, it also differs in some crucial aspects. I thought it would be worthwhile for us to look at some of those differences. Performance Monitoring Let’s start with understanding what performance monitoring entails at […]

Read More…

How Do Lacework PolygraphsTM Remove Security Toil?

To gain an understanding of PolygraphsTM, let’s first consider the differences between data and insights. Let’s imagine we have a user who likes to go for drinks in the afternoon at her favorite coffee shop, Starbucks, from her office. She must drive there in her car using a maps app for directions. The app directs […]

Read More…

Lacework for Azure and Multicloud Environments: One Solution for the Problem of Cloud Security

Lacework for Azure and Multicloud Environments: One Solution for the Problem of Cloud Security

Lacework today announced security support for Microsoft Azure, which means two things: Our customers get threat detection of behavioral anomalies for cloud and container environments as a single pane of glass over both AWS and Azure. With so many of our customers opting to distribute workloads into different environments, this now gives them security coverage […]

Read More…

Polygraphs: Behavior Baselining to Reveal the Elephant

You are probably familiar with the parable of the blind men describing an elephant. Because they experience only what they can touch, each of them has a very different concept of what the animal is. One touches the trunk and concludes it’s a snake. Another explores a leg and concludes it’s a tree. They are, […]

Read More…

Introduction to Polygraphs

In my last blog, I talked about how we developed requirements for a Cloud Workload Protection Platform (CWPP) for modern data centers. In this blog, I’m going to dive into the heart of the matter: how Lacework builds the baseline we use for everything from breach detection to incident investigations. But first, let me recap […]

Read More…

Lacework Coming Out Of Stealth!

An incredible milestone in a journey that started two years ago with a simple question: Why does it take enterprises 6+ months to find intruders in their data centers? It’s one of the most important IT questions of our day. The answer, of course, isn’t a simple one. So we followed Toyoda-san’s 5-why method to […]

Read More…