Resources

Webinars

Lacework Demo: Gain Visibility & Protect Your AWS, Azure, and GCP Clouds

See how Lacework automates security and compliance across AWS, Azure, GCP, and private clouds, providing a comprehensive view of risks across cloud workloads and containers. Read More...

Security Insights in a High Growth Cloud Environment - Webcast Replay

Lacework & Snowflake are innovators in their respective markets, but working together, they deliver powerful and actionable security insights. See Webinar...

Watch SANS Webinar

Given the current state of cyber security data breaches, advancements in attacker capabilities and all-too-frequent dumps of new malware and capabilities, it has never been more crucial for organizations to secure themselves. See Webinar...

Podcasts

Shift Left for DevOps Security

Shift Left for DevOps Security with Lacework's Dan Hubbard

How Lacework's “shift left” will provide security and cloud compliance visibility across the enterprise’s infrastructure footprint, from development to runtime. Read More...

Lacework Shifts Left for DevOps Security

Making sure our applications are secure during runtime is of course important but how do we shift left so security is built into containerized, serverless applications? Read More...

This is Lacework

Lacework Tap Talk: Lacework Shifts Left

Lacework is taking the idea of "shift left" to a new level with a comprehensive approach to identifying everything that is going on within your cloud environment, and applying security throughout.

Lacework Tap Talk: Platforms vs. Products

Security platforms for modern environments: why a single solution better addresses the main pain points in cloud security from configuration mistakes to host-based intrusion prevention.

Lacework Tap Talk: Threat Detection, Buzzword Bingo, and the State of Cloud Security

In the latest installment of the Lacework Tap Talks, we cover threat detection, buzzword bingo, and the state of cloud security.

Lacework Live from Black Hat 2019

Live from Black Hat 2019, this video covers the increasing importance of container security, as organizations look to protect their environments as well as their data.

Product Videos

Lacework for Azure & Multicloud Environments

Here's how Lacework spans the three critical segments for cloud security: configuration & compliance, container security, and anomaly detection.

Lacework for Kubernetes and Google Cloud Platform

Here’s how Lacework straddles configuration and audit, while providing anomaly detection against storage, and infrastructure and platform as a service.

Inside Lacework: Set Up Lacework with AWS

We cover how to quickly integrate Lacework with AWS in this 5 minute informational video.

Inside Lacework: Introduction to Workload Security

We cover Lacework workload security, the benefits of Lacework Polygraph, along with sample events.

Customer Testimonials

Snowflake Computing

Listen as Mario Duarte talks about how Lacework Polygraph thwarted the PEN testers at Snowflake Computing.

Guidebook

Learn how Guidebook gained visibility, cross-functional versatility and effective protection with Lacework.

Arista Networks

Hear Ian O’Brien’s true-crime story of Lacework, WordPress, and an intruder who never made it out the back door.

Automating Security & Compliance for Flatiron Health

Learn how a CISO of Lacework customer operates security and compliance at scale in the cloud.

Solution Briefs

Anomaly Detection

Here's how we use machine learning to identify and analyze behavioral deviations from normalized behaviors in cloud and container infrastructures that result from vulnerabilities. Read More...

AWS Security

Lacework provides comprehensive, continuous end-to-end security and configuration support for workloads and accounts running in AWS and in multi cloud environments. Read More...

Azure Security

For all Azure events and configurations, Lacework monitors activities and behaviors of cloud entities beyond network traffic to detect anomalies indicative of a misconfiguration, a human error, malicious activity or a threat. Read More...

Cloud Account Security

In multicloud environments, it’s critical to monitor the activities of each account. Lacework helps organizations understand who is using what, to learn what API calls are made to various cloud resources, and identify irregularities that might indicate account risk. Read More...

Configuration Compliance

Operating on multiple cloud platforms can increase the threat vector of the overall infrastructure and add complexity to an already challenging task. Lacework delivers deep visibility for configurations across all of an enterprise’s cloud accounts and workloads so organizations can ensure compliance with industry, governmental, and institutional standards. Read More...

Container Security

Lacework is fully container-aware and monitors all container activities regardless of the container distribution you rely on (Docker and/or Kubernetes). Any malicious activity in a containerized environment will generate an anomaly at one layer or another – Lacework’s threat detection and behavioral analysis identifies anomalous activities across your cloud and containers so issues can be remediated before any damage is done. Read More...

File Integrity Monitoring

Designed for high-velocity cloud implementations, Lacework’s FIM solution automates setup and eliminates labor-intensive rule development, ACL specification, and configuration. With our innovative baselining technology, Lacework keeps up with cloud changes while dramatically reducing false positives so security teams can focus on the FIM events that really matter. Read More...

GCP Security

Lacework offers an automated, end-to-end security and configuration solution that monitors threats for workloads and accounts in GCP and across multicloud and containerized environments. Lacework checks for a series of controls specific to GCP resources like Storage Buckets, ACLs and other resources, and for processes like Cross-Origin Resource Sharing (CORS), access logs, and other elements that can be targeted in the course of attacks. Read More...

Host Intrusion Detection

Lacework Host-based IDS automatically identifies intrusions and raises the alarm so you can stay a step ahead of attackers. We give you the visibility and context you need to resolve intrusion events before they turn into damaging breaches. Delivered as a service, Lacework can be deployed at scale in minutes. Read More...

Kubernetes Security

Lacework provides deep visibility into your Kubernetes deployment. This includes high-level dashboards of your clusters, pods, nodes, and namespaces combined with application level communication between all of these at the application, process, and network layer. Read More...

Runtime Threat Defense

To provide comprehensive security for active threats and vulnerabilities caused by misconfigurations and other infrastructure changes, Lacework uses runtime defense to identify, analyze, and alert on anomalous behavior for applications, virtual resources, hosts, and all user activity. Read More...

Workload Security

Lacework’s lightweight agents collect and send data to Lacework’s backend in the cloud where this data is aggregated, and a baseline of the activity in the cloud environment is created. The automated method of detecting undesired activity in cloud and container workloads provides great benefits over traditional rule writing. Read More...

White Papers

Gartner Market Guide for Cloud Workload Protection Platforms

Protection requirements for securing virtual machine, container and serverless workloads in public and private clouds continue to evolve rapidly. Here's how to stay up to speed. Read More...

Cloud & Container Security from Build-Time to Run-Time

Learn how to create a complete security approach for cloud and multi-cloud environments, DevOps, and container orchestration, for all aspects of compliance, accounts, and workloads. Read More...

5 steps improve breach detection-incident response public cloud

5 Steps to Improve Breach Detection and Incident Response in Public Cloud

Managing the aftermath of a security breach or cyber attack is no easy task. Here's how to continuously monitor security within your cloud workloads and improve incident response processes. Read More...

Security Tooling for Multi-Cloud Deployments

Security Tooling for Multi-Cloud Deployments

This whitepaper explains how to consolidate security across multicloud environments, and your responsibility for different cloud approaches. Read More...

2019 Mid Year Cloud Security Trends 2019

2019 Mid-Year Cloud Security Trends & Tips Report

This report looks at the entirety of an organization’s security landscape, from DevOps to cloud, container, and on-premises workloads. We encourage you to use this guide to help build the right security approach for your organization. Read More...

The Role of Kubernetes in Cloud Security

The Role of Kubernetes in Cloud Security

With the rapid adoption of Kubernetes for application and infrastructure orchestration, there’s a corresponding increase in the risk associated with data exposure and vulnerabilities throughout the application lifecycle. Read More...

DevOps Security for Cloud and Container Environments

Security & compliance must be woven into any new framework and this is no different with DevOps. Here's why new DevOps processes must also follow an organization's information security and secure development lifecycle policy and process. Read More...

Securing Containers in a Cloud Environment

Containers and containerized applications running on cloud resources have brought countless benefits, but have introduced security challenges as well. To address the latter, we created a blueprint for container and orchestration best practices.  Read More...

Cloud Security Report: Evaluate Security Vendors for AWS, Azure & GCP

To help organizations evaluate their cloud security options, we’ve analyzed how vendors compare across 10 capabilities in our 2019 Cloud Security Report. Read More...

How to Identify & Manage Cloud Security Misconfigurations in AWS, Azure, and GCP

Here's why it’s critical to understand how your cloud infrastructure is set up, and what tools you'll need to rely on to protect it. Read More...

Preventing Ransomware in the Cloud

A best practices guide to keep your cloud environment secure: In this paper, we’ll zero in on the various components of a cloud environment and offer best practices for creating a secure infrastructure. Read More...

5 Steps for DevOps + Security Integration Infographic

From instituting training to creating a culture of security, here's how to build a team that can keep systems secure at the speed of DevOps Read More...

Top Ten Threats to Cloud Security Infographic

There’s an enormous amount of event activity in the cloud. A busy cloud environment can generate eight to ten billion events per month, which makes threat detection a much more challenging proposition. Read More...

Containers At-Risk: A Review of 21,000 Cloud Environments

This report describes the risks and threats that can be created by deploying workloads in public cloud without the proper security guardrails, security services, and the systematic use of security best practices. Read More...

10 Reasons VPC Flow Logs Won't Keep Your Cloud Secure

From inability to scale, to creation of false positives, and limits on file integrity monitoring, here are ten reasons why VPC flow logs just won't keep your cloud secure. Read More...

Lacework: Avant Garde Security

Lacework redefines security by enabling configuration assessment, behavior monitoring, threat and anomaly detection, and incident investigation. Here's how we bring speed and automation to every cloud security process. Read More...

Hurwitz Report

Based on quantitative research, as well as qualitative interviews with industry practitioners, this report covers why businesses are increasingly evolving their security strategy to advance their cloud strategy. Read More...

451 Research Report

As the scalability and elasticity of new IT stretches existing security practices to their limits, Lacework looks to help maintain proper security. Read More...

SANS Institute Review

Today’s dynamic cloud environments present new challenges to security practitioners. Tailoring old policy-and-logs approaches to the demands of the cloud require time and resources that organizations don’t have. Read More...

Ovum Report

Cloud adoption is expanding at an explosive rate, creating a growing requirement for security technologies such as Lacework’s Polygraph to monitor workloads, provide alerts about potential breaches, and highlight possible insider threats. Read More...

Ebooks

A Security Guide to Container Orchestration

It's hard to argue against the benefits of containers and containerized applications running on cloud resources. However, containers create new cloud security challenges. Read More...

Compliance in the Cloud

In order to successfully meet your security requirements and compliance obligations you must define and implement appropriate technical and administrative controls. Read More...

Security-First Compliance

With cloud services increasingly emerging as a key component of IT operations, more organizations now face the compliance issues that come with that style of adoption. Read More...

Cloud Security Checklist

To help those responsible for their company’s security get their bearings in the cloud, we’ve put together a checklist that explains key issues and risks, and provides guidance about how you need to address them. Read More...

What are Your Public Cloud Security Risks?

The ease and speed with which organizations can deploy workloads often outweighs the security implications of doing so. Here's why you may be more at risk thank you think, and what you can do about it. Read More...

Resetting Your Security Thinking for the Public Cloud

We take a closer look at securing cloud infrastructures by asking seven experts the following question: To operate public cloud-based IT infrastructures securely, what security thinking needs to change, and why? Read More...

Automated, Comprehensive Compliance & Security: Purpose-Built for the Cloud

Learn how Lacework was built specifically to deliver contextual data about cloud events, because changes can lead to new vulnerabilities and potential threats. Read More...

Avoiding Limitations of Traditional Approaches to Security

To better understand the differences between the traditional security stack and a layered security strategy, we asked our experts the following question: What limitations can you expect when stitching together multiple security solutions? Read More...

11 Limitations of Network-Centric Security in the Cloud

To help understand the new world of security in the cloud, we've put together 11 specific use cases where network-centric security is inadequate to handle the challenges of security in modern cloud environments. Read More...

Building Security Into Your Cloud IT Practices

How do IT professionals address the need to build it safer? To find out, we asked our security experts the following question: How can you make security an embedded discipline within your team? Read More...

Avoiding Container Vulnerabilities

To get a better understanding of potential risks associated with containers and how best to address those risks, we asked the security experts the following question: What vulnerabilities do containers create, and how do you protect against them? Read More...

The Three Critical Elements of Effective Security for AWS

By applying the right tools and skill sets, organizations can gain control over their cloud environment through the lens of these three critical security elements. Read More...

VPC Flow Logs Are Not Enough

VPC flow logs are not enough, and modern environments require a new approach to cloud security. Here are eleven ways network-based security tools based on VPC logs fall short when transitioning to the cloud. Read More...

Case Studies

Guidebook

With Lacework, Guidebook has a clear and complete picture of security operations across their entire AWS implementation, from the AWS API to server and user level activity. Read More...

Snowflake Computing

Foiling PEN Testers with Automated Cloud Security: Learn how Snowflake was able to gain full visibility into their environment to follow everything that was occurring, end to end. Read More...

Wavefront

Logs, Logs and More Logs: Learn how Wavefront simplified security operations by deploying Lacework’s automated cloud security platform, eliminating manual tasks and saving time. Read More...