Lacework Polygraph solves the breach detection challenge from a completely different perspective. Rather than relying on policies, rules and signatures, we create a deep temporal baseline of cloud operations. We use that baseline to spot anomalies and breaches. Download the data sheet to learn more.
Insider Threat Management
Lacework Polygraph took a new tack to solve the thorny problem of insider threats. Rather than relying on the rules and policies the power traditional intrusion detection techniques, we create a deep temporal baseline of cloud operations. We use this baseline to spot unusual user behavior and assess its risk – without rules, policies, or log analysis.
Learn more about polygraphs: what they are, why they’re useful, and how they work. This video introduces the different polygraph layouts and provides a few tips and tricks to help you be even more productive when conducting security operations and investigations.
Dossiers organize information in a streamlined display that invites exploration and empowers investigation. In this video, you’ll learn how to use different types of dossiers, how to zero in on areas of interest by searching and filtering, and tips for navigating between different dossiers.
The Lacework management console offers a powerful set of capabilities focused on cloud workload security. This video tutorial walks through console management and use, introducing popular features such the dashboard, search and filter capabilities, alerts, and dossiers.