Compare Lacework vs. Threat Stack Cloud Security Platform

Cancel
You must select at least 2 products to compare!
Most Helpful Review
Find out what your peers are saying about Palo Alto Networks, Check Point, Cisco and others in Cloud Workload Security. Updated: February 2021.
464,857 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pricing and Cost Advice
Information Not Available
"Pricing seems to be in line with the market structure. It's fine.""It is very expensive compared to some other products. The pricing is definitely high.""I'm happy with the amount that we spend for the product that we get and the overall service that we get. It's not cheap, but I'm still happy with the spend.""We find the licensing and pricing very easy to understand and a good value for the services provided.""It came in cheaper than Trend Micro when we purchased it a few years ago.""What we're paying now is somewhere around $15 to $20 per agent per month, if I recall correctly. The other cost we have is SecOps."

More Threat Stack Cloud Security Platform Pricing and Cost Advice »

report
Use our free recommendation engine to learn which Cloud Workload Security solutions are best for your needs.
464,857 professionals have used our research since 2012.
Ranking
16th
Views
1,157
Comparisons
960
Reviews
0
Average Words per Review
0
Rating
N/A
6th
Views
4,592
Comparisons
2,012
Reviews
6
Average Words per Review
1,999
Rating
8.3
Popular Comparisons
Also Known As
Polygraph
Threat Stack, CSP,
Learn More
Lacework
Video Not Available
Threat Stack
Video Not Available
Overview

Lacework’s unified cloud security platform provides unprecedented visibility, automates intrusion detection, delivers one-click investigation, and simplifies cloud compliance across AWS, Azure, and GCP, providing a comprehensive view of risks across cloud workloads and containers.

Threat Stack Cloud Security Platform® is purpose-built to support organizations running in the cloud and the unique requirements of a cloud-based or hybrid infrastructure. In order to protect your sensitive data (the crown jewels) you need to know who is doing what, where and when – at all times. With continuous cloud security monitoring and up-to-the-second alerting, you’ll always have the complete visibility you need to detect anomalous activity and know what occurred immediately.

Offer
Learn more about Lacework
Learn more about Threat Stack Cloud Security Platform
Sample Customers
J.Crew, AdRoll, Snowflake, VMWare, Iterable, Pure Storage, TrueCar, NerdWallet, and more.
StatusPage.io, Walkbase, Spanning, DNAnexus, Jobcase, Nextcapital, Smartling, Veracode, 6sense
Top Industries
VISITORS READING REVIEWS
Computer Software Company31%
Comms Service Provider21%
Media Company6%
Construction Company5%
VISITORS READING REVIEWS
Computer Software Company30%
Comms Service Provider12%
Media Company11%
Financial Services Firm10%
Company Size
No Data Available
REVIEWERS
Small Business13%
Midsize Enterprise63%
Large Enterprise25%
Find out what your peers are saying about Palo Alto Networks, Check Point, Cisco and others in Cloud Workload Security. Updated: February 2021.
464,857 professionals have used our research since 2012.

Lacework is ranked 16th in Cloud Workload Security while Threat Stack Cloud Security Platform is ranked 6th in Cloud Workload Security with 6 reviews. Lacework is rated 0.0, while Threat Stack Cloud Security Platform is rated 8.4. On the other hand, the top reviewer of Threat Stack Cloud Security Platform writes "SecOps program for us, as a smaller company, is amazing; they know what to look for". Lacework is most compared with Prisma Cloud by Palo Alto Networks, Dome9, Amazon GuardDuty, Illumio Adaptive Security Platform and Morphisec Unified Threat Prevention Platform, whereas Threat Stack Cloud Security Platform is most compared with Prisma Cloud by Palo Alto Networks, Amazon GuardDuty, Dome9, Tenable.io Container Security and Qualys VM.

See our list of best Cloud Workload Security vendors.

We monitor all Cloud Workload Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.