Additional Info

Websitehttp://www.lacework.net
Company size (employees)10 to 49
Headquarters RegionNorth America

Overview

Today, the average breach takes 90+ days to find and fix, security professionals waste hours a day writing rules and policies, and new security solutions take weeks to install and longer to deliver any meaningful protection. Lacework eliminates this reliance on labor-intensive policy and rule development and time consuming log correlation activities that characterize today’s alternatives with their flagship solution, Polygraph.

Many of the vendors in the cloud workload protection platform space have built solutions that don’t address the new world of public/private and hybrid cloud workload, and complex cloud datacenter architectures typically feature thousands of similar machines, processes, users, containers, applications and their activity. Lacework Polygraph reduces redundant events and notifications by automatically distilling these entities into a handful of analysis groups based on behavior. This provides a complete picture of the entire cyber kill chain for end-to-end visibility so security professionals can connect and visualize elements of an attack or insider threat to respond more quickly and effectively.

Lacework Polygraph makes it easy to investigate and understand your cloud with an innovative visualization interface speeds the tasks of finding, evaluating, and fixing security incidents, so at every point in the customer experience customers get better results faster than the competition.
Customers can buy and install Lacework Polygraph in a few clicks without creating a multi-month rollout plan. Once installed, Lacework produces actionable information in a matter of hours and automatically adapts to the changes and updates that characterize modern cloud solutions – without the drag of policy and rule maintenance. Breaches are detected immediately, without the need to chase endless false positives.

Because the platform supports a wide variety of security and operations tasks, from breach detection and insider threat management to forensics analysis and DevSecOps analytics, multiple products are not required to perform each of these tasks.

How we are different

• Eliminates time-consuming rule and policy maintenance by offering true zero-touch security
• Spots security breaches immediately vs. the industry average of 90+ days to find intruders
• Makes it easy to investigate and understand your cloud workload, with powerful visual tools that invite exploration and deliver understanding