SANS Institute Review
Today’s dynamic cloud environments present new challenges to security practitioners. Tailoring old policy-and-logs approaches to the demands of the cloud require time and resources that organizations don’t have. In this review, SANS analyst and instructor Matt Bromiley shares his experience using Lacework to mitigate these challenges.
Cloud adoption is expanding at an explosive rate, creating a growing requirement for security technologies such as Lacework’s Polygraph to monitor workloads, provide alerts about potential breaches, and highlight possible insider threats. Ovum expects to see Lacework attracting considerable customer interest, particularly given its cloud-native and low-touch approach to operations as well as to sales and marketing.
Lacework Protection for AWS S3 Buckets
From initial configuration to daily operations, Lacework protection for AWS S3 buckets provides continuous, automated protection. We make it easy to maintain an effective security posture for your S3 buckets by automating all the configuration checking and highlighting the changes or activities that represent a risk with recommendations on how to fix any security weakness.
Lacework Compliance to CIS Benchmark for AWS
Your security posture can only become predictable once you have established a set of best practices and ensure adherence to these on an continuous basis. Lacework compliance to CIS Benchmark for AWS is a continuous, automated assessment of compliance with recommendations to fix violations.
Lacework for AWS CloudTrail
Lacework for AWS CloudTrail protects AWS deployments by automatically detecting any anomalous activity. Make sense of the millions of events captured in CloudTrail with no rules, no policies, and no time spent on tedious event analysis.
Lacework Polygraph solves the breach detection challenge from a completely different perspective. Rather than relying on policies, rules and signatures, we create a deep temporal baseline of cloud operations. We use that baseline to spot anomalies and breaches. Download the data sheet to learn more.
Cloud security incident investigations are incredibly complex and time consuming. There’s no time to waste: to limit damage and remediate vulnerabilities, security professionals need answers fast. But all too often, investigators confront the aftermath of an attack armed only with incomplete logs. They face a frustrating exercise in manual event correlation that often leads nowhere. Download the data sheet to learn more.
Insider Threat Management
Lacework Polygraph took a new tack to solve the thorny problem of insider threats. Rather than relying on the rules and policies the power traditional intrusion detection techniques, we create a deep temporal baseline of cloud operations. We use this baseline to spot unusual user behavior and assess its risk – without rules, policies, or log analysis. Download the data sheet to learn more.
Today’s cloud DevOps teams deploy new applications and services at a blistering pace. What used to take weeks or months now takes days. Lacework automatically captures the true reality of data centers so even major architectural changes can be made at breakneck speed. Download the data sheet to learn more.
Lacework File Integrity Monitoring
Designed for high-velocity cloud implementations, Lacework File Integration Monitoring is more than a compliance checklist item. Our FIM solution is designed to be an integral part of your cloud security strategy.
Foiling PEN Testers with Zero-Touch Cloud Security: Learn how Snowflake was able to gain full visibility into their environment to follow everything that was occurring, end to end.
Logs, Logs and More Logs: Learn how Wavefront simplified security operations by deploying the Lacework zero-touch platform with no rules or policies, eliminating their logs.
Listen to SANS Webinar
Listen to the replay of this SANS Webinar review of Lacework’s Cloud Workload Security Platform, and how to mitigate the challenges of today’s dynamic cloud environments.
Threat Hunting Demo
Learn more about polygraphs: what they are, why they’re useful, and how they work. This video introduces the different polygraph layouts and provides a few tips and tricks to help you be even more productive when conducting security operations and investigations.
Dossiers organize information in a streamlined display that invites exploration and empowers investigation. In this video, you’ll learn how to use different types of dossiers, how to zero in on areas of interest by searching and filtering, and tips for navigating between different dossiers.
The Lacework management console offers a powerful set of capabilities focused on cloud workload security. This video tutorial walks through console management and use, introducing popular features such the dashboard, search and filter capabilities, alerts, and dossiers.