Product
IntegrationS
Check out our evergrowing list of integrations
Detect
Risk-driven threat detection with automated triage
Investigate
Investigate without drowning in data—Automated Storylines reveal the entry point, map the attack flow, guide quarantine and containment with ease.
Respond
Respond to attacks with surgical precision and speed to minimize impact
Integrations
Why Stream?
Customers
Book a Demo
Resources
All Resources
Learn about cloud detection and response
Blog
Datasheets
Reports
Webinars
Join our live event or watch on demand
Upcoming Events
Meet our team at upcoming expos and events
Company
About us
Get to know our story and team.
Solution Overview
Download PDF (2-page overview)
Press
News, articles and press resources.
Jobs
Join us, we're hiring!
Contact us
Try it out
Book a Demo
Blog
Download Solution Brief
Recent
Product
Stream x Salesforce: Advanced Threat Detection to Stop the Next Drift-Style Breach
Stream now integrates with Salesforce for advanced threat detection. The integration provides in-depth detection capabilities that will help you catch Salesforce breaches in real time, including the recent Salesloft Drift compromise.
Asaf Haski
Sep 8
4
min
All categories
AI
Cloud Detection & Response
Cloud Security
Product
All posts
Cloud Security
Popular
Highlights
Cloud Threat Detection Using the MITRE ATT&CK Framework
In the realm of cybersecurity, the escalation of threats, especially in cloud environments, demands robust and adaptive strategies for threat detection and response. The MITRE ATT&CK framework, a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations, offers a structured approach to understanding and tackling security threats. This article delves into the utilization of the MITRE ATT&CK framework for enhancing cloud threat detection.
Stream Team
Nov 9, 2023
min
Availability
Popular
Highlights
Troubleshoot AWS Reachability Issues with VPC Flow Logs
In this article, we will introduce one of the most useful tools that every engineer responsible for the network layer should have in their arsenal: VPC flow logs. Back in the day when private data centers were cool, when we needed to troubleshoot network problems, we had to “tap the wire” and that could take many forms such as installing packet sniffers on various network segments or configuring complicated traffic mirroring options. Enter VPC flow logs! With the cloud and the advent of software defined networks, troubleshooting IP networks has never been easier.
Tal Shladovsky
Nov 9, 2023
6
min
Product
Popular
Highlights
Stream.Security Events vs AWS Config
AWS Config offers basic capabilities for change management in small AWS environments but has limitations when it comes to complex and dynamic environments. You can consider Stream Security as a more capable, scalable and cost-effective alternative to AWS Config. Stream Security saves your teams cycles with effective root-cause & impact analysis, prioritized & customizable rules and real-time capabilities with runtime events. You can gain these benefits in a predictable and cost-effective way.
Tal Shladovsky
Nov 8, 2023
8
min
Cloud Security
Popular
Highlights
How to identify a compromised EC2 instance using VPC Flow logs and Amazon GuardDuty
Amazon GuardDuty is a threat detection service that uses machine learning and other techniques to identify malicious activity and unauthorized behavior in your AWS accounts and workloads. It integrates with other AWS security services to provide a comprehensive view of your security posture and helps Security, DevOps, Compliance and Incident response teams to quickly respond to security threats.
Tal Shladovsky
Nov 7, 2023
7
min
Product
Popular
Highlights
Stream.Security introduces Cross Accounts connections via assume role
Explore how Stream Security can help you gain control over existing cross account connections and design risk free configuration changes...
Michael Schwartz
Nov 6, 2023
2
min
Cloud Security
Popular
Highlights
Cloud Security Posture Management (CSPM) Explained
Stream Team
Nov 2, 2023
min
Cloud Security
Popular
Highlights
AWS Well-Architected Framework: Security
The Security pillar of the AWS Well-Architected Framework is focused on ensuring that workloads are designed, deployed, and managed in a secure manner. It includes implementing security best practices, such as protecting data confidentiality, integrity, and availability, managing user access and privileges, and implementing network and application-level security controls.
Tal Shladovsky
Nov 2, 2023
4
min
Availability
Popular
Highlights
Architecting Cloud Resilience: Options and Trade-offs for AWS
As businesses increasingly migrate their applications and infrastructure to the cloud, ensuring resiliency becomes paramount to maintain service availability and minimize disruptions. Resilient cloud architectures are designed to withstand failures and recover quickly from disruptions, offering enhanced reliability and performance. This article provides an overview of resiliency patterns and trade-offs that can help architects build efficient and robust cloud solutions.
Tal Shladovsky
Aug 4, 2023
9
min
Cloud Security
Popular
Highlights
AWS GuardDuty for threat detection
Amazon GuardDuty serves as a threat detection solution that employs machine learning and various methodologies to detect malevolent activities and unauthorized conduct within your AWS accounts and workloads.
Stream Team
Jul 13, 2023
min
Previous
Load more
What's new
Blog
Stream x Salesforce: Advanced Threat Detection to Stop the Next Drift-Style Breach
Asaf Haski
Resources
How Shield Transformed Its Security Strategy with Cloud Detection and Response for Real-Time Protection
All Resources >
Upcoming event
San Diego Cybersecurity Summit
All events >
News
Stream Security Automates Cloud Incident Response with Guided Runbooks
Stream Team