Lacework Adds Active Host Vulnerability Monitoring and CI/CD Integrations
August 19, 2020

Lacework will introduce Active Host Vulnerability Monitoring, pre-flight checks, and CI/CD automation workflows to its comprehensive SaaS security offering.

Customers scaling services in the cloud will now have the telemetry to know what to fix in just three clicks without having to reference multiple tools as they safely build and innovate at speed.

Lacework was built from the ground up for detecting and observing security threats in the cloud, including serverless, containers, and Kubernetes workloads, and streamlines security tasks for software teams building on Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). The company has seen a surge of demand for seamless DevSecOps workflow tooling and a unified, well-integrated cloud security solution.

The addition of host vulnerability monitoring addresses the security challenges of protecting modern, ephemeral container and host architectures and workflows. It consolidates multiple tools and significantly eases the process of fixing vulnerabilities before they go into production with preflight host vulnerability scans, active vulnerability identification, and enhanced CI/CD tooling for DevOps workflows. Lacework’s intrusion detection agent helps DevOps stay focused on innovation by alerting teams to only those vulnerabilities that carry a viable potential risk.

“Incumbent security offerings focus on vulnerabilities, but they do not capture or decipher the breadth of data—at scale—required to know whether you are truly vulnerable or not,” said Dan Hubbard, CEO of Lacework. ”Efficacy is crucial because not all vulnerabilities render you vulnerable. For example, one of our customers believed they had 51,000 vulnerable hosts but were able to narrow that down to 78 active machine images with Lacework. The power of our SaaS cloud security platform is that we can add new capabilities quickly so that our customers can build and secure clouds more effectively.”

By providing telemetry of what is actually active and vulnerable at the package level, Lacework helps customers focus their remediation effort on something that is actionable and manageable. Additional benefits of Lacework’s Active Host Vulnerability Monitoring update include:

- Ephemeral Hosts at scale: Telemetry to distill and focus on vulnerabilities in ephemeral and immutable infrastructure.

- Pre-Flight Check API: Scan a host image (e.g., AWS AMI) for known vulnerabilities before deploying to a live environment.

- Active vulnerabilities: connect known CVEs with active packages on hosts for live visibility to active packages with associated vulnerabilities.

- CI/CD Integrations: Tighten the feedback loop and shift security left by integrating the Lacework API into CircleCI, Github, Gitlab, Jenkins, and other workflows.

- Security team reports: Shift security right with tailored reports on new active CVEs, and know definitively when a patch has been applied.

- Updated CLI for self-serve vulnerability scanning and data and a new vulnerability dashboard.

Lacework’s SaaS cloud security platform protects against threats from build-time through run-time. As a result, customers are able to access an always growing suite of well-integrated security capabilities in a central, unified solution.

Share this

Industry News

February 13, 2025

LaunchDarkly announced the private preview of Warehouse Native Experimentation, its Snowflake Native App, to offer Data Warehouse Native Experimentation.

February 13, 2025

SingleStore announced the launch of SingleStore Flow, a no-code solution designed to greatly simplify data migration and Change Data Capture (CDC).

February 13, 2025

ActiveState launched its Vulnerability Management as a Service (VMaas) offering to help organizations manage open source and accelerate secure software delivery.

February 12, 2025

Genkit for Node.js is now at version 1.0 and ready for production use.

February 12, 2025

JFrog signed a strategic collaboration agreement (SCA) with Amazon Web Services (AWS).

February 12, 2025

mabl launched of two new innovations, mabl Tools for Playwright and mabl GenAI Test Creation, expanding testing capabilities beyond the bounds of traditional QA teams.

February 11, 2025

Check Point® Software Technologies Ltd. announced a strategic partnership with leading cloud security provider Wiz to address the growing challenges enterprises face securing hybrid cloud environments.

February 11, 2025

Jitterbit announced its latest AI-infused capabilities within the Harmony platform, advancing AI from low-code development to natural language processing (NLP).

February 11, 2025

Rancher Government Solutions (RGS) and Sequoia Holdings announced a strategic partnership to enhance software supply chain security, classified workload deployments, and Kubernetes management for the Department of Defense (DOD), Intelligence Community (IC), and federal civilian agencies.

February 10, 2025

Harness and Traceable have entered into a definitive merger agreement, creating an advanced AI-native DevSecOps platform.

February 10, 2025

Endor Labs announced a partnership with GitHub that makes it easier than ever for application security teams and developers to accurately identify and remediate the most serious security vulnerabilities—all without leaving GitHub.

February 07, 2025

Are you using OpenTelemetry? Are you planning to use it? Click here to take the OpenTelemetry survey.

February 06, 2025

GitHub announced a wave of new features and enhancements to GitHub Copilot to streamline coding tasks based on an organization’s specific ways of working.

February 06, 2025

Mirantis launched k0rdent, an open-source Distributed Container Management Environment (DCME) that provides a single control point for cloud native applications – on-premises, on public clouds, at the edge – on any infrastructure, anywhere.

February 06, 2025

Hitachi Vantara announced a new co-engineered solution with Cisco designed for Red Hat OpenShift, a hybrid cloud application platform powered by Kubernetes.