Product
Streamline
Integration Program
Bring your security stack into the cloud
Protect
Identify potential entry points for threat actors
Trap
Trap threat actors to mitigate breach impact in the cloud
Detect
Bring dynamic cloud detection to the SOC with advanced triaging
Investigate
Investigate threats and predict attack impact without drowning in data
Respond
Respond to attacks with surgical precision and speed to minimize impact
Integrations
Use Cases
Prepare
Prepare your SecOps team to detect and respond to cloud threats
Detect
Bring dynamic cloud detection to the SOC with advanced triaging
Investigate
Investigate threats and predict attack impact without drowning in data
Respond
Respond to attacks with surgical precision and speed to minimize impact
Why Stream?
Customers
Book a Demo
Resources
All Resources
Learn about cloud detection and response
Blog
Datasheets
Reports
Webinars
Join our live event or watch on demand
Upcoming Events
Meet our team at upcoming expos and events
Partners
Company
About us
Get to know our story and team.
Solution Overview
Download PDF (2-page overview)
Press
News, articles and press resources.
Jobs
Join us, we're hiring!
Contact us
Start free 14‑day trial
Book a Demo
Blog
Download Solution Brief
Recent
Product
We Asked, You Answered. And We’re Listening: Stream.Security Scores a 96% in Customer Satisfaction
We’re grateful to share that customers rated their overall satisfaction with Stream.Security at 96.3%.
Margo Barysheva
Jun 30
4
min
Browse by Tag
AWS
Atlantis
CDR
CNAPP
CloudTwin
Compliance
Compute
Cost Optimization
DSPM
Data Security
Disaster Recovery
EDR
Flow Logs
Gartner
Kubernetes
Networking
Permissions
Reliability
Resilience
SIEM
SOAR
Secrets
Shift-left
Stream Traps
Sustainability
Terraform
Troubleshooting
XDR
re:Invent
All posts
Cloud Security
Popular
Highlights
IAM Guide: Kubernetes on AWS
IAM roles for service accounts provide a secure and efficient way to manage access to cloud resources in a cloud environment. By assigning roles to service accounts instead of individual users, organizations can improve their security posture by minimizing the risk of human error or credential misuse.
Tal Shladovsky
May 18, 2023
10
min
Cloud Security
Popular
Highlights
Cloud Investigation and Response Automation (CIRA)
Cloud Investigation and Response Automation (CIRA) - CIRA vs CDR
Stream Team
May 11, 2023
min
Cloud Security
Popular
Highlights
IAM best practices and troubleshooting tips for AWS EKS
IAM plays a crucial role in securing access to resources in an AWS EKS cluster, therefor it’s important to have a strong understanding of IAM (Identity and Access Management) to effectively troubleshoot any issues that may arise.
Tal Shladovsky
May 11, 2023
4
min
Product
Popular
Highlights
AWS Service Control Policies (SCP), the why, the what and the how.
Service Control Policies (SCPs) in AWS offer a robust mechanism for preserving security standards, which is essential for compliance and averting security breaches.
Stream Team
May 9, 2023
6
min
Cost
Popular
Highlights
AWS Cost best practices for MSK
Amazon Managed Streaming for Apache Kafka (MSK) is a fully managed service that makes it easy to build and run applications that use Apache Kafka to process streaming data. Although MSK simplifies the setup and management of Apache Kafka clusters, it's essential to optimize costs to make the most of the service. This article outlines some best practices for optimizing Amazon MSK costs without compromising performance or reliability.
Stream Team
Apr 27, 2023
min
Cloud Security
Popular
Highlights
How to deploy sysdig Falco on an EKS cluster
Deploying Sysdig Falco on an Amazon EKS (Elastic Kubernetes Service) cluster
Stream Team
Apr 25, 2023
min
Popular
Highlights
Common IAM Issues and Solutions for AWS EKS
When deploying workloads to EKS, it is important to ensure that appropriate access control is in place to protect resources and data. This is where IAM roles and policies come into play. IAM roles and policies in Amazon EKS are used to define and manage permissions for Kubernetes resources running in an EKS cluster. IAM roles are used to grant access to AWS resources and services, while Kubernetes policies are used to grant access to Kubernetes resources.
Tal Shladovsky
Apr 25, 2023
6
min
Cloud Security
Popular
Highlights
Continuous Threat Exposure Management (CTEM)
Breaking down the CTEM (Continuous Threat Exposure Management)
Stream Team
Apr 18, 2023
min
Popular
Highlights
Hands-on Guide: Resolve Common EKS Cluster Autoscaler Problems
The Cluster Autoscaler in Kubernetes is a component that dynamically resizes the cluster according to the workload. In Amazon Elastic Kubernetes Service (EKS), the Cluster Autoscaler optimizes resource utilization and cost by scaling down nodes during periods of low demand and scaling up when demand increases.
Stream Team
Apr 18, 2023
13
min
Previous
Load more
What's new
Blog
We Asked, You Answered. And We’re Listening: Stream.Security Scores a 96% in Customer Satisfaction
Margo Barysheva
Resources
Stream.Security Named in Gartner® 2025 Emerging Tech Innovators Intelligent Simulation Report
All Resources >
Upcoming event
Cybersecurity Summit Chicago
All events >
News
Stream Security Automates Cloud Incident Response with Guided Runbooks
Stream Team