Lacework Adds Agentless Scanning to Rapidly Uncover Vulnerability Risks in Cloud-Native Workloads
With both agent-based and agentless scanning, the Polygraph Data Platform gives customers more choice, flexibility, and visibility across active hosts, containers, and application language libraries at runtime
SAN JOSE, Calif., June 2, 2022 /CNW/ -- Lacework®, the data-driven cloud security company, today announced new agentless scanning for workloads that provides organizations with comprehensive and frictionless visibility into vulnerability risks across all active hosts, containers, and application language libraries in their environment. The Lacework Polygraph® Data Platform uses a combination of agentless and agent-based technologies to gather data from cloud environments in the most effective way. These new capabilities make it easy for organizations to quickly operationalize security and gain a comprehensive view of their security posture without the use of agents. This also gives customers the flexibility to add additional layers and agent-based runtime insights from the same platform for maximum value and security.
Cloud environments are dynamic in nature. New workloads, containerized applications, and serverless compute are added and removed at rapid speed, making it difficult to get a full view of security risks at any given moment. With new vulnerabilities, both known and unknown, emerging every day, security teams need to be able to quickly identify all risks that exist and understand which to prioritize and take action on.
Agents allow customers to unlock the most comprehensive level of workload security by providing continuous behavioral monitoring and threat detection capabilities. However, there are use cases where agents may not be preferred due to either the underlying technology or organizational limitations, leading to visibility gaps. By combining the Polygraph Data Platform's agent-based technology with these new agentless capabilities for workloads, organizations can eliminate these gaps and implement the best approach to suit their environment.
For example, businesses leveraging AWS that want to quickly operationalize security can connect all their cloud accounts to Lacework for agentless workload scanning with a simple, one-time setup that leverages cloud-native capabilities to provision the necessary infrastructure to all regions. Once they set it up, Lacework streams snapshot data through a serverless analysis engine that scans for vulnerability risks within the entire environment. Agentless workload scanning can then easily be combined with Lacework agents should their needs shift, providing better visibility across their environment to identify, prioritize, and take action on all risks that exist.
Modern cloud security demands a combination of both agent-based and agentless security.
"The ongoing conversation around agent-based and agentless cloud security deployment models does a disservice to customers, creating confusion about the right approach to securing their cloud environments," said Frank Dickson, IDC. "Organizations need comprehensive visibility across every part of their environment, but different roles such as cloud operations, security, and DevOps have differing requirements for that visibility and how it is collected. Leveraging agent and agentless approaches provides the appropriate role-based visibility needed across the entire organization."
"Customers are building their business in dynamic cloud environments and they need security solutions to cover a wide range of cloud environments to ensure there are no visibility gaps," said Adam Leftik, VP of Product, Lacework. "With its agent agnostic approach, the Polygraph Data Platform makes it easier for customers to collect all relevant data about their unique environment in the most efficient way. This helps customers identify security issues that truly matter to their business without worrying about the underlying infrastructure."
Lacework helps customers understand what is happening in their cloud accounts and workloads with or without an agent. Using machine learning, behavioral analytics, and anomaly detection, Lacework automates the identification of unusual activity to secure customer environments from build to runtime. Lacework is the only company that extends anomaly detection across AWS, Google Cloud, Microsoft Azure, and Kubernetes environments.
These new agentless scanning capabilities, announced today, are available in alpha to select Lacework customers.
Additional Resources:
- Check out our blog for more information on our new agentless scanning capabilities.
- For more information on connecting with our team at RSA Conference, visit our website or our booth at #4528, Moscone North Expo.
- Learn more about Lacework and how to reduce security risks in the cloud during our webinar with IDC.
- Become an expert on security fundamentals and learn more from your security and developer peers through Lacework Academy and the Lacework Community.
- Read what Lacework customers have to say about the Lacework Polygraph Data Platform.
Lacework is the data-driven security company for the cloud. The Lacework Polygraph® Data Platform automates cloud security at scale so our customers can innovate with speed and safety. Only Lacework can collect, analyze, and accurately correlate data across an organization's AWS, Microsoft Azure, Google Cloud, and Kubernetes environments, and narrow it down to the handful of security events that matter. Customers all over the globe depend on Lacework to drive revenue, bring products to market faster and safer, and consolidate point security solutions into a single platform. Founded in 2015 and headquartered in San Jose, Calif., Lacework is backed by leading investors like Sutter Hill Ventures, Altimeter Capital, D1 Capital Partners, Tiger Global Management, Counterpoint Global (Morgan Stanley), Franklin Templeton, Durable Capital, GV, General Catalyst, XN, Coatue, Dragoneer, Liberty Global Ventures, and Snowflake Ventures, among others. Get started at www.lacework.com.
Contact: [email protected]
SOURCE Lacework
Share this article