UPDATE: Lacework has become trash since the Fortinet acquision. It is missing basic functionality and they have ceased investment in the platform. IF YOU ARE CONSIDERING USING LACEWORK/FORTINET THEN RUN AWAY AS FAST AS YOU CAN! Ignore anyone who tells you otherwise.
Lacework provides agentless and agent-based introspection into Cloud as well as on-prem environments. Im most impressed by how much it has improved my organization's security posture across our multi-cloud, containerized, and hybrid environments. The platform's automation, continuous monitoring, and deep visibility features are top-notch, helping us detect and fix security vulnerabilities, misconfigurations, and compliance issues in real time.
One of the most impressive aspects of Lacework is its threat intelligence and behavioral anomaly detection capabilities. It identifies and responds to potential threats before they can do any serious damage, giving us peace of mind knowing our critical assets are protected. Their offer outpaces other products like Orca and Wiz by not soley relying on cloud logs within their detections. You also have the added layer of defense offered by their agent. When your agentless only provider fails to detect sophiticated attackers, maybe you should give this solution a try instead. You will quickly realize that value of having eBPF probe level introspection into your machines activity vs relying log streams.
Lacework continues to iterate and improve on their product consistently over time adding more and more value to their platform. On top of that their customer support and white glove approach to helping you get the most value from the product is best in class. They have an entire training catalog for your infrastructure security teams and SOC to dive into and become proficient within the platform.
To sum it up, Lacework forms the backbone of our Infrastructure Security program as well as acting as a key component to our Vulnerability Management Program as well as SecOps activities within the infra domain. It provides the insights required to successfully meet audit and compliance requirements, contractual obligations, identify policy violations, scan and report vulnerabilities, identify misconfigurations and detect infrastructure access related issues and more. We use this platform daily to make real security happen. Review collected by and hosted on G2.com.