www.lacework.com Open in urlscan Pro
141.193.213.21  Public Scan

Submitted URL: http://lacework.com/
Effective URL: https://www.lacework.com/
Submission: On August 23 via manual from IN

Form analysis 3 forms found in the DOM

GET https://www.lacework.com/

<form method="get" id="searchform" action="https://www.lacework.com/" role="search">
  <label aria-label="Search" for="s"></label>
  <div class="input-group">
    <input class="field form-control" id="s" name="s" type="text" placeholder="Search …" value="">
    <span class="input-group-btn">
      <button class="submit btn btn-primary waves-effect waves-light" id="searchsubmit" name="submit" type="submit" value="Search"><span>Search</span></button>
    </span>
  </div>
</form>

GET https://www.lacework.com/

<form method="get" id="searchform" action="https://www.lacework.com/" role="search" class=" waves-effect waves-light">
  <label aria-label="Search" for="s"></label>
  <div class="input-group">
    <input class="field form-control" id="s" name="s" type="text" placeholder="Search …" value="">
    <span class="input-group-btn">
      <button class="submit btn btn-primary waves-effect waves-light" id="searchsubmit" name="submit" type="submit" value="Search"><span>Search</span></button>
    </span>
  </div>
</form>

GET https://www.lacework.com/

<form method="get" id="searchform" action="https://www.lacework.com/" role="search">
  <label aria-label="Search" for="s"></label>
  <div class="input-group">
    <input class="field form-control" id="s" name="s" type="text" placeholder="Search …" value="">
    <span class="input-group-btn">
      <button class="submit btn btn-primary waves-effect waves-light" id="searchsubmit" name="submit" type="submit" value="Search"><span>Search</span></button>
    </span>
  </div>
</form>

Text Content

[Webinar] Join us on April 1 for 7 Key Considerations Before Sending Your AWS
CloudTrail Logs into Your SIEM – Learn More >>>

Skip to content
 * 
 * * * PLATFORM
        * CAPABILITIES
        * Multicloud Security
        * Cloud Compliance
        * Container Security
        * Cloud Workload Protection
        * Kubernetes Security
        * ENVIRONMENTS
        * AWS Cloud Security
        * Azure Cloud Security
        * Google Cloud Security
        * Kubernetes Security
     
     * SOLUTIONS
        * FEATURES
        * Behavioral Anomaly Detection
        * File Integrity Monitoring
        * Host Intrusion Detection
        * USE CASES
        * Cloud Security Posture–Cloudtrail
        * Threat Detection and Response
        * Runtime Threat Defense
        * Buildtime Configuration and Threat Defense
        * Compliance and Configuration
        * CIS Benchmarks
        * USER ROLES
        * Audit and Compliance
        * Engineering/DevOps
        * DevSecOps
        * Security
        * FinTech
        * HealthTech
     
     * PARTNERS
     * CUSTOMERS
     * RESOURCES
     * COMPANY
        * About Us
        * Press Releases
        * In the News
        * Upcoming Events
        * Awards
        * Careers
        * Lacework Labs
        * Security
     
     * Login
     * Support
     * Blog
     * CONTACT US
     
   * Search
     
     
     
     

MENU

MENUMENU
 * Login
 * Support
 * Blog
 * CONTACT US

Search

MENUMENU
 * PLATFORM
   
   * * * CAPABILITIES
         
         Multicloud Security
         
         Cloud Compliance
         
         Container Security
         
         Cloud Workload Protection
         
         Kubernetes Security
         
         Cloud Security Solutions Summary
     
     * * ENVIRONMENTS
         
         AWS Cloud Security
         
         Azure Cloud Security
         
         Google Cloud Security
         
         Kubernetes Security
 * SOLUTIONS
   
   * * * FEATURES
         
         Behavioral Anomaly Detection
         
         File Integrity Monitoring
         
         Host Intrusion Detection
         
         Host Vulnerability Monitoring
     
     * * USE CASES
         
         Mergers and Acquisitions
         
         SIEM Optimization
         
         Tool Consolidation
         
         Cloud Security Posture
         
         Threat Detection and Response
         
         Runtime Threat Defense
         
         Buildtime Configuration and Threat Defense
         
         Compliance and Configuration
         
         CIS Benchmarks
     
     * * USER ROLES
         
         Audit and Compliance
         
         Engineering/DevOps
         
         DevSecOps
         
         Security Solutions
 * PARTNERS
 * CUSTOMERS
 * RESOURCES
 * COMPANY
   * About Us
   * Press Releases
   * In the News
   * Upcoming Events
   * Awards
   * Careers
   * Legal
   * Lacework Labs
   * Security
   * Contact Us

×



SECURITY FOR THE CLOUD GENERATION


BUILD FAST, RUN FEARLESSLY

WATCH DEMOSEE VIDEO




CLOUD SECURITY AUTOMATION FOR DUMMIES®

Gain a solid foundation of the value, challenges, and best practices of cloud
security automation.

DOWNLOAD eBOOK


GARTNER™ MARKET GUIDE FOR CWPP

This Gartner Market Guide covers the need for security across and runtime across
cloud workload protection platforms.

READ GUIDE


2021 CLOUD THREAT REPORT

Get an analysis of the risks and threats to cloud services, containers, and
container orchestration systems.

VIEW REPORT

CLOUD SECURITY AT SCALE


 





SUPPORTED PLATFORMS



Account security solutions for cloud containers & multicloud
environments via a single unified console




READY TO CHAT?

We'd love to hear from you.

Chat With Us

Lacework is the data-driven security platform for the cloud. The Lacework Cloud
Security Platform is the only security solution that can collect, analyze and
accurately correlate data across an organization’s AWS, Azure, GCP, and
Kubernetes environments, and narrow it down to the handful of security events
that matter. Thousands of customers globally depend on Lacework for behavior
anomaly analysis, real-time threat detection, and cloud compliance.

Search


QUICK LINKS

--------------------------------------------------------------------------------

 * Blog
 * Careers
 * Location and Contact
 * Legal


PRODUCT/PLATFORM

--------------------------------------------------------------------------------

 * Overview
 * AWS Security
 * Azure Security
 * GCP Security
 * Container Security
 * Workload Security


USE CASES

--------------------------------------------------------------------------------

 * Overview
 * Host Intrusion Detection
 * Runtime Threat Defense
 * File Integrity Monitoring
 * Kubernetes Security
 * Anomaly Detection
 * Configuration Compliance
 * Account Security


CONTACT INFO

--------------------------------------------------------------------------------

888-292-5027

Contact Us

6201 America Center Dr
Suite 200
San Jose, CA 95002

© 2021, Lacework, Inc. - Privacy Policy | Terms of Use


✓
Thanks for sharing!
AddToAny
More…



This website uses cookies to enable and improve the use of our website. Review
our Privacy Policy to learn more. By clicking on the “I accept” button, you
consent to the use of cookies on your device.

I ACCEPT