Lacework

Lacework

Fortinet
+
+

Related Products

  • Wiz
    1,101 Ratings
    Visit Website
  • Orca Security
    493 Ratings
    Visit Website
  • Kasm Workspaces
    125 Ratings
    Visit Website
  • Carbide
    88 Ratings
    Visit Website
  • SpamTitan
    815 Ratings
    Visit Website
  • Bitdefender Ultimate Small Business Security
    3 Ratings
    Visit Website
  • UTunnel VPN and ZTNA
    118 Ratings
    Visit Website
  • Cloudflare
    1,915 Ratings
    Visit Website
  • Guardz
    105 Ratings
    Visit Website
  • ManageEngine Log360
    140 Ratings
    Visit Website

About

Use data and automation to protect your multi-cloud environment, prioritize risks with pinpoint accuracy, and innovate with confidence. Enable faster innovation with security built in from the first line of code. Gain meaningful security insights to build apps quickly and confidently by shining a light on issues before they reach production — all within your existing workflows. With patented machine learning and behavioral analytics, our platform automatically learns what’s normal for your environment and reveals any abnormal behavior. 360º visibility tells you exactly what’s happening across your entire multicloud environment and detects threats, vulnerabilities, misconfigurations, and unusual activity. Data and analytics drive unmatched fidelity. Automatically surface what matters most and remove pointless alerts. With an adaptive and ever-learning platform, monolithic rules become optional.

About

ThreatKey integrates seamlessly with your third party SaaS providers and contextualizes the data in your environment. ThreatKey finds what is vulnerable and gives you safe remediations and recommendations to reduce your risk instantly, before incidents happen. ThreatKey constantly scans and monitors your ever-changing environment to alert you as misconfigurations appear through your SaaS application stack. Teams across your organization procure new third-party platforms to do their job effectively. But configurations around SaaS is convenience first, not security first. Finally, teams across your company can adopt new tech with confidence that they didn’t just widen the attack surface. ThreatKey Deputy enables modern security teams to shift left and automate first-line communications regarding suspicious events and indicators.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Companies searching for a solution to manage their cloud security operations

Audience

SaaS security risk solution for organizations

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Fortinet
Founded: 2015
United States
www.lacework.com

Company Information

ThreatKey
www.threatkey.com

Alternatives

Alternatives

Lacework

Lacework

Fortinet
Aqua

Aqua

Aqua Security
Cortex Cloud

Cortex Cloud

Palo Alto Networks

Categories

Categories

Cloud Security Features

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Compliance Features

Archiving & Retention
Artificial Intelligence (AI)
Audit Management
Compliance Tracking
Controls Testing
Environmental Compliance
FDA Compliance
HIPAA Compliance
Incident Management
ISO Compliance
OSHA Compliance
Risk Management
Sarbanes-Oxley Compliance
Surveys & Feedback
Version Control
Workflow / Process Automation

Integrations

Akitra Andromeda
Avalor
Blink
Box
Chronicle SOAR
Cyclops
Google
Kaholo
Kondukto
Monad
New Relic
OpsLevel
Opus Security
Phoenix Security
Seemplicity
Silk Security
Slack
Stream Security
Tines
Zoom

Integrations

Akitra Andromeda
Avalor
Blink
Box
Chronicle SOAR
Cyclops
Google
Kaholo
Kondukto
Monad
New Relic
OpsLevel
Opus Security
Phoenix Security
Seemplicity
Silk Security
Slack
Stream Security
Tines
Zoom
Claim Lacework and update features and information
Claim Lacework and update features and information
Claim ThreatKey and update features and information
Claim ThreatKey and update features and information