Fraud & Identity Fraud & Identity

Fraud & Identity Industry News

TMCNet:  Lacework Recognized in Independent Cloud Workload Security Solutions Vendor Landscape Report

[September 12, 2017]

Lacework Recognized in Independent Cloud Workload Security Solutions Vendor Landscape Report

MOUNTAIN VIEW, Calif., Sept. 12, 2017 /PRNewswire/ -- Lacework™, the industry's first zero-touch cloud security solution, today announced its inclusion in Forrester's September 2017 report, Vendor Landscape: Cloud Workload Security Solutions Q3 2017, by Andras Cser, vice president and principal analyst at Forrester Research. The report provides security and risk professionals with an overview of the Cloud Workload Security (CWS) vendor landscape, critical selection criteria and key vendor differentiation.

According to the Forrester Research report, "as businesses continue to adopt both infrastructure-as-a-service (IaaS) and platform as-a-service (PaaS) cloud platforms, security and risk professionals struggle to protect their organization's valuable data while minimizing the threat surface of cloud and hybrid cloud workloads." The research highlights the multiple challenges reported by S&R pros (security professionals), such as the need to match the speed of DevOps and the fact that cloud workloads can't be secured with manual tools and traditional technologies.

Lacework is redefining the industry as the first zero-touch cloud workload security platform that instantly detects breaches, manages insider threats, delivers insights into workloads, and offers graphical investigation tools for public, private and hybrid cloud workloads. Lacework eliminates the reliance on labor-intensive policy and rule development and time-consuming log correlation activities that chracterize today's alternatives. Within two hours of activation, Lacework builds a polygraph that baselines activities and normal behaviors. Deviation from the baseline are automatically identified and generate an alert indicating misconfiguration, abnormal behavior, or a malicious intrusion.

"Many of the current vendors in the cloud workload protection platform industry have developed solutions that simply do not address public, private and hybrid cloud workloads. For this reason, Lacework has taken industry leadership by approaching cloud workload security from a completely different approach," said Jack Kudale, CEO, Lacework. "With Polygraph, organizations can detect security breaches sooner, manage insider threats, fast-track investigation and obtain better insights into all cloud activities."

Lacework provides organizations with a self-service acquisition model, making it dramatically easier for security operations and DevOps personnel to get started. Lacework Polygraph is available for general use immediately at $250/instance/year and via a 14-day free trial which can be accessed on the company's website. Lacework Polygraph is also available on the Amazon Web Services (AWS) marketplace as an hourly subscription model. To learn more about Lacework and the benefits of the Polygraph Platform, please visit and follow the company on Twitter and LinkedIn.

About Lacework
Mountain View, California-based Lacework enables security teams to keep up with the pace of application deployment by providing the industry's first zero-touch security platform for public and private clouds. Polygraph, Lacework's flagship product, continuously monitors all cloud components, workloads, applications, processes, containers, machines, users and accounts, and automatically detects anomalous behaviors out of billions of events per hour. Providing unprecedented visibility, Lacework Polygraph compresses the breach detection cycle, reduces false positives, delivers precise alerts and simplifies incident investigations. For more information, please visit

Media Contact
Matt Russell
Lumina Communications on behalf of Lacework
(646) 741-8359

View original content:

SOURCE Lacework

[ Back To Fraud & Identity's Homepage ]

Industry Insights

(MobileID) Proactive Fraud Prevention

Interconnect-related fraud such as International Revenue Share Fraud (IRSF) and PBX hacking fraud continue to be a billion dollar problem to the telecom industry.

(Defender Shield) Defense solutions for the modern SMS ecosystem

SMS is a ubiquitous communication method for person-to-person (P2P) text messaging, which has been in use globally for nearly 20 years.

(Defender Shield) Preventing Grey Routes and the Multi-billion dollar Threat

The convenience of mobile messaging has brought communication efficiency to billions of consumers worldwide. As is often the case with widely accepted technologies; however, convenience can provide a vulnerable gateway to fraudulent activity.

Product Documents

Asset Protect

While unlimited or high-volume voice and SMS plans offer great value to subscribers, sometimes fraudsters exploit these plans to avoid paying termination and interconnect fees.

Defender Shield

In a world with ever-increasing Application-to-Person (A2P) messaging needs and competition, improving customer satisfaction and eliminating revenue leakage is key for protecting SMS profits.


Accurate and cost-efficient routing of voice calls and SMS is critical. Unfortunately, gathering reliable routing data on ported numbers and keeping up with constant changes in number plans is expensive and time-consuming.

Fraud Solutions

Communications fraud is a $20B annual global problem and growing. Companies are looking for peace of mind so that their business and their customers are protected from the onslaught of technology crime that is damaging their reputations and their balance sheets.