Latest on critical Apache Log4j vulnerability   Read More >

Lacework Cloud Care

Whether you’re a Lacework customer or not, we’re here to help with our free Cloud Care, a Log4j rescue program. Get access to:

Comprehensive Kubernetes Threat Detection

Watch Demo
Kubernetes Security

Kubernetes Security Solutions

Get comprehensive threat detection for your Kubernetes dashboards, pods, management nodes, and clusters

As the use of containers continues to rise in popularity within test and production environments, managing and orchestrating them becomes a bigger challenge. Although, Kubernetes (K8s) is a market leader in orchestrating cloud-native environments, it is not as good at security as it is at orchestration. 

Lacework’s Kubernetes security solution provides comprehensive threat detection for dashboards, pods, management nodes, and clusters, in addition to end-to-end security for their public cloud infrastructure workloads, accounts, and containers. Our Kubernetes security platform identifies the risks and threats for Kubernetes-deployed infrastructures, including publicly exposed and unsecured API servers and management consoles.

Lacework + Kubernetes Equals Security

The rapid adoption of Kubernetes for application and infrastructure orchestration is leading to an increase in the risk associated with data exposure and vulnerabilities throughout the application lifecycle. Without proper detection of threats, organizations could be opening the doors to unauthorized access to Kubernetes clusters, applications, and customer data.

Application Visibility

Lacework provides deep visibility into your Kubernetes deployment. This includes high-level dashboards of your clusters, pods, nodes, and namespaces combined with application-level communication between all of these at the application, process, and network layer.

Threat Detection for Kubernetes

Backed by the power of Lacework’s Polygraph® technology, this security solution for Kubernetes includes detection of both risks and threats that may be specifically designed to breach a vulnerability within Kubernetes, a possible misconfiguration, or a threat that can affect your infrastructure by installing malicious code onto one of your containers. The Lacework Polygraph is designed to detect both known and unknown threats that affect Kubernetes environments using behavioral analysis and machine learning.

Risks and threats, made visible within the Lacework dashboard, are ranked by risk severity and can be delivered through the most common modern methods such as a Slack channel or a Jira ticket.

Forensics for Kubernetes

Whether you are triaging an alert or digging into deep details around the cause and effect of a change, Lacework’s security platform for Kubernetes has the information you need. Our SaaS service allows you to go back in time and look at all related events across your Kubernetes infrastructure that may have caused a breach or exposed you to an unknown risk.

Detailed information about your containers, your applications, and your infrastructure are all available and include information related to Kubernetes such as pods, nodes, labels, namespaces, and all network information. And all of this data is available both within the UI and from our API.

Lastly, Lacework’s Kubernetes security solution creates hourly Polygraphs that can demonstrate the change of relationships and events over time. This is a critical tool for understanding and triaging your events.


FAQs About Lacework's Kubernetes Security Solution

Lacework’s Kubernetes security solution allows you to go back in time and look at all related events across your Kubernetes infrastructure that may have caused a breach or exposed you to an unknown risk.