This is Lacework
Lacework AWS Account Security
From initial configuration to compliance assessment and daily operations, Lacework integrates with and augments AWS services to deliver advanced protection to the assets you deploy on AWS.
Lacework AWS Configuration and Compliance
In highly dynamic clouds where workloads and resources get reassigned continuously, the compliance process requires more frequent controls and a different, more automated approach.
Lacework Cloud Workload Security
From workload discovery to threat detection and point-and-click investigation, we automate many security processes so that your cloud stays secure no matter how fast DevOps spins new code and new machines.
The velocity of the cloud is outpacing the ability to keep it safe. That’s why Lacework built a solution to tackle modern cloud security issues.
Inside Lacework: Set Up Lacework with AWS
We cover how to quickly integrate Lacework with AWS in this 5 minute informational video.
Inside Lacework: Introduction to Workload Security
We cover Lacework workload security, the benefits of Lacework Polygraph, along with sample events.
Lacework for AWS CloudTrail Demo
How Lacework integrates with AWS CloudTrail to protect your AWS deployments by detecting any anomalous activity.
Preventing Illicit Bitcoin Mining with Lacework
How Lacework detects new instances unexpectedly coming online that could be a cybercriminal abusing your cloud resources.
Listen as Mario Duarte talks about how Lacework Polygraph thwarted the PEN testers at Snowflake Computing.
Learn how Guidebook gained visibility, cross-functional versatility and effective protection with Lacework.
Large Networking Firm
Hear Ian O’Brien’s true-crime story of Lacework, WordPress, and an intruder who never made it out the back door.
From initial configuration to daily operations, Lacework protection for AWS S3 buckets provides continuous, automated protection. We make it easy to maintain an effective security posture for your S3 buckets by automating all the configuration checking and highlighting the changes or activities that represent a risk with recommendations on how to fix any security weakness. Read More...
Your security posture can only become predictable once you have established a set of best practices and ensure adherence to these on a continuous basis. Lacework compliance to CIS Benchmark for AWS is a continuous, automated assessment of compliance with recommendations to fix violations. Read More...
Cloud security incident investigations are incredibly complex and time consuming. There’s no time to waste: to limit damage and remediate vulnerabilities, security professionals need answers fast. But all too often, investigators confront the aftermath of an attack armed only with incomplete logs. They face a frustrating exercise in manual event correlation that often leads nowhere. Read More...
Lacework Polygraph took a new tack to solve the thorny problem of insider threats. Rather than relying on the rules and policies the power traditional intrusion detection techniques, we create a deep temporal baseline of cloud operations. We use this baseline to spot unusual user behavior and assess its risk – without rules, policies, or log analysis. Read More...
Today’s cloud DevOps teams deploy new applications and services at a blistering pace. What used to take weeks or months now takes days. Lacework automatically captures the true reality of data centers so even major architectural changes can be made at breakneck speed. Read More...
Cyber criminals are experts at finding and taking advantage of cloud weakness. Misconfigured cloud resources can lead to disaster, even for the most diligently protected cloud deployments. Read More...
With a security operations center, organizations can shorten threat response times and stop breaches before they become damaging. But to get the most out of a SOC, businesses need to monitor every IT asset - including those in the cloud. Read More...
To help understand the new world of security in the cloud, we've put together 11 specific use cases where network-centric security is inadequate to handle the challenges of security in modern cloud environments. Read More...
By applying the right tools and skill sets, organizations can gain control over their cloud environment through the lens of these three critical security elements. Read More...
This report describes the risks and threats that can be created by deploying workloads in public cloud without the proper security guardrails, security services, and the systematic use of security best practices. Read More...
From inability to scale, to creation of false positives, and limits on file integrity monitoring, here are ten reasons why VPC flow logs just won't keep your cloud secure. Read More...