Skip to main content
TrustRadius

Overview

What is Lacework?

Lacework is a cloud-native application protection platform offered as-a-Service; delivering build-time to run-time threat detection, behavioral anomaly detection, and cloud compliance across multicloud environments, workloads, containers, and Kubernetes.

Read more
Recent Reviews

TrustRadius Insights

Lacework is a versatile product that has proven to be invaluable in various use cases. Customers have praised its ability to perform …
Continue reading

Solid Product

10 out of 10
December 18, 2021
We are using Lacework to keep an eye on our cloud environments. Lacework gives us a single pane of glass to see across all of our cloud …
Continue reading

Help improve your cloud security

8 out of 10
December 08, 2021
The detailed visibility of all our containers across multiple accounts is great. Anomaly-based detection allows us to focus our efforts …
Continue reading
Read all reviews
Return to navigation

Pricing

View all pricing
N/A
Unavailable

What is Lacework?

Lacework is a cloud-native application protection platform offered as-a-Service; delivering build-time to run-time threat detection, behavioral anomaly detection, and cloud compliance across multicloud environments, workloads, containers, and Kubernetes.

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

3 people also want pricing

Alternatives Pricing

What is Snyk?

Snyk’s Developer Security Platform automatically integrates with a developer’s workflow and helps security teams to collaborate with their development teams. It boasts a developer-first approach that ensures organizations can secure all of the critical components of their applications from code to…

Return to navigation

Product Demos

Partner Integration on Twitch: Lacework

YouTube

Introduction to Lacework — Data-Driven Security Platform for the Cloud | Demo & Tutorial

YouTube

Lacework Demo from 2018 Re:Invent

YouTube
Return to navigation

Product Details

What is Lacework?

Lacework is a cloud-native application protection platform offered as-a-Service; delivering build-time to run-time threat detection, behavioral anomaly detection, and cloud compliance across multicloud environments, workloads, containers, and Kubernetes.

Lacework Video

Lacework Polygraph Data Platform Overview

Lacework Technical Details

Operating SystemsUnspecified
Mobile ApplicationNo

Frequently Asked Questions

Lacework is a cloud-native application protection platform offered as-a-Service; delivering build-time to run-time threat detection, behavioral anomaly detection, and cloud compliance across multicloud environments, workloads, containers, and Kubernetes.

Aqua Cloud Native Security Platform, Wiz, and Snyk are common alternatives for Lacework.

The most common users of Lacework are from Mid-sized Companies (51-1,000 employees).
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(7)

Community Insights

TrustRadius Insights are summaries of user sentiment data from TrustRadius reviews and, when necessary, 3rd-party data sources. Have feedback on this content? Let us know!

Lacework is a versatile product that has proven to be invaluable in various use cases. Customers have praised its ability to perform behavioral analysis of the AWS infrastructure layer, server host processes, and user activities within AWS and the server itself. This comprehensive visibility enables security teams to monitor and alert on security risk and compliance issues within cloud environments efficiently.

Users also appreciate Lacework's vulnerability assessment and malware detection capabilities for Docker container images. By providing vulnerability scanning for production instances with centralized logging and event analysis, Lacework helps organizations identify potential security flaws proactively. Additionally, the platform's integration with ticketing systems automates the creation of tickets when anomalous behavior is detected, streamlining incident response efforts.

Furthermore, Lacework's intrusion detection capabilities play a vital role in monitoring cloud workloads for malicious behavior. The platform acts as a single pane of glass, offering detailed visibility of all containers across multiple accounts. This feature has been highly valued by users as it allows security and DevOps teams to improve their company's security posture in the cloud environment.

Integrations with popular tools such as Jira and Slack are effortless to configure, enhancing workflow efficiency for users. Moreover, customers have reported positive experiences with the Lacework team's support throughout the purchase process.

Overall, Lacework's ability to establish a baseline of usual behavior in systems and provide timely alerts regarding anomalies makes it an essential tool for monitoring vulnerabilities, threats, and compliance in cloud environments. Daily alerts ensure that incident response teams can prioritize and address urgent issues promptly.

Ease of Implementation: Users have found it easy to set up the agent in their cloud workloads, indicating that the implementation process is straightforward and hassle-free. This sentiment was expressed by multiple reviewers.

Comprehensive Visibility: Reviewers highly value the product's ability to provide detailed visibility of all container workloads across multiple accounts. This feature allows users to have comprehensive insights into their container environment, facilitating effective monitoring and management. Several users have mentioned this as a key advantage.

Threat Detection Capabilities: The product's detection of threats and utilization of machine learning models has been praised by users. This shows that the advanced technologies employed by the product enable proactive identification of potential security issues and anomalies, allowing for efficient resource allocation. A number of reviewers have highlighted this aspect as valuable.

Poor Product Support: Some users have expressed dissatisfaction with the product support, particularly in terms of alert handling and scanning capabilities. They feel that there is room for improvement in these areas.

Insufficient Data in Runtime Behavior Alerts: Several reviewers have mentioned that not all runtime behavior alerts provide enough data to determine whether something is malicious. They suggest providing more detailed information, such as identifying the process responsible for a specific action.

Complicated User Interface: Many users find the user interface complicated and have difficulty locating information. They recommend making the web GUI more user-friendly and improving the clarity of where to click to find desired information.

Users have provided several recommendations for Lacework based on their experiences. The most common recommendations include:

  1. Understand your needs: It is important to understand what you want out of the tools before talking to Lacework. This will help you effectively communicate your expectations and ensure that the tool aligns with your needs.

  2. Test the solution: Users suggest testing the solution during a Proof of Concept (PoC) to see its value in action. By conducting a PoC, you can evaluate how Lacework performs and determine its suitability for your organization's security needs.

  3. Request feature updates: Users recommend making use of the tool to its full potential and requesting feature updates for company growth. By actively engaging with Lacework and suggesting improvements, you can help shape the tool to better meet your evolving security requirements.

Overall, users highly recommend considering Lacework as a security tool due to its ease of setup, structured approach, and ability to provide a comprehensive view of corporate infrastructure. They emphasize the importance of being prepared to make changes in your cloud environment when using Lacework and putting in the work to achieve the targets it provides. Additionally, users find value in Lacework's ability to bring awareness to previously unknown alerts while monitoring IDS and suggest testing its user interface and requesting needed features from the product roadmap.

Reviews

(1-7 of 7)
Companies can't remove reviews or game the system. Here's why
Score 9 out of 10
Vetted Review
Verified User
Incentivized
  • installation at the OS level and containers.
  • Queries for the latest vulns (e.g log4j, ksmbd...) to scan the systems.
  • Alerts and notifications
  • The Web GUI could be more user friendly
  • The information fetched from AWS services (like CloudTrail specifically) could be more verbose.
Richard Russell | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
  • Ease of deployment
  • Log and event correlation and alerting
  • Vulnerability & Compliance scanning
  • Addition of scanning of on-prem[ise] assets
  • Addition of SaaS resource scanning
December 18, 2021

Solid Product

Score 10 out of 10
Vetted Review
Verified User
  • Single pane of glass for all cloud instances.
  • Easy to use UI
  • Seamless integration
  • Windows Agent still missing
Score 8 out of 10
Vetted Review
Verified User
Incentivized
  • Easy to set-up the agent in cloud workloads.
  • Easy integration with ticketing and messaging tools.
  • Detailed visibility of all our container workloads across multiple accounts.
  • Not all runtime behaviour alerts offer enough data to decide whether or not something is malicious. Having even more data (e.g., what process is doing a specific action) would help.
Score 8 out of 10
Vetted Review
Verified User
  • The detailed visibility of all our container across multiple accounts is great.
  • Anomaly-based detection allows us to focus our efforts and time on other events. Integrations with Jira, Slack, etc. are very easy to set up.
  • The lacework team is very helpful before and during purchase.
  • UI can be complicated and hard to know where to click to find information.
  • Ability to create and manage cases or tickets from events that trigger.
Return to navigation