The velocity of the cloud is outpacing the ability to keep it safe. That’s why Lacework built a better solution to tackle modern cloud security issues.
Lacework for AWS CloudTrail Demo
How Lacework integrates with AWS CloudTrail, protecting your AWS deployments by automatically detecting any anomalous activity.
Threat Hunting Demo
Starting with a suspicious login alert, we demonstrate how one can quickly view the timeline of activities to detect a breach.
Listen as Mario Duarte talks about how Lacework Polygraph thwarted the PEN testers at Snowflake Computing.
Learn how Guidebook gained visibility, cross-functional versatility and effective protection with Lacework.
Large Networking Firm
Hear Ian O’Brien’s true-crime story of Lacework, WordPress, and an intruder who never made it out the back door.
Preventing Illicit Bitcoin Mining with Lacework
Hackers have been known to steal cloud resources for Bitcoin mining. Lacework automatically detects new instances unexpectedly coming online that could be a cybercriminal abusing your cloud resources.
Learn more about polygraphs: what they are, why they’re useful, and how they work. This video introduces the different polygraph layouts and provides a few tips and tricks to help you be even more productive when conducting security operations and investigations.
Dossiers organize information in a streamlined display that invites exploration and empowers investigation. In this video, you’ll learn how to use different types of dossiers, how to zero in on areas of interest by searching and filtering, and tips for navigating between different dossiers.
The Lacework management console offers a powerful set of capabilities focused on cloud workload security. This video tutorial walks through console management and use, introducing popular features such the dashboard, search and filter capabilities, alerts, and dossiers.
From initial configuration to daily operations, Lacework protection for AWS S3 buckets provides continuous, automated protection. We make it easy to maintain an effective security posture for your S3 buckets by automating all the configuration checking and highlighting the changes or activities that represent a risk with recommendations on how to fix any security weakness. Read More...
Your security posture can only become predictable once you have established a set of best practices and ensure adherence to these on a continuous basis. Lacework compliance to CIS Benchmark for AWS is a continuous, automated assessment of compliance with recommendations to fix violations. Read More...
Cloud security incident investigations are incredibly complex and time consuming. There’s no time to waste: to limit damage and remediate vulnerabilities, security professionals need answers fast. But all too often, investigators confront the aftermath of an attack armed only with incomplete logs. They face a frustrating exercise in manual event correlation that often leads nowhere. Read More...
Lacework Polygraph took a new tack to solve the thorny problem of insider threats. Rather than relying on the rules and policies the power traditional intrusion detection techniques, we create a deep temporal baseline of cloud operations. We use this baseline to spot unusual user behavior and assess its risk – without rules, policies, or log analysis. Read More...
Today’s cloud DevOps teams deploy new applications and services at a blistering pace. What used to take weeks or months now takes days. Lacework automatically captures the true reality of data centers so even major architectural changes can be made at breakneck speed. Read More...
Cyber criminals are experts at finding and taking advantage of cloud weakness. Misconfigured cloud resources can lead to disaster, even for the most diligently protected cloud deployments. Read More...
With a security operations center, organizations can shorten threat response times and stop breaches before they become damaging. But to get the most out of a SOC, businesses need to monitor every IT asset - including those in the cloud. Read More...
This report describes the risks and threats that can be created by deploying workloads in public cloud without the proper security guardrails, security services, and the systematic use of security best practices. Read More...