Product
IntegrationS
Check out our evergrowing list of integrations
Detect
Risk-driven threat detection with automated triage
Investigate
Investigate without drowning in data—Automated Storylines reveal the entry point, map the attack flow, guide quarantine and containment with ease.
Respond
Respond to attacks with surgical precision and speed to minimize impact
Integrations
Why Stream?
Customers
Book a Demo
Resources
All Resources
Learn about cloud detection and response
Blog
Datasheets
Reports
Webinars
Join our live event or watch on demand
Upcoming Events
Meet our team at upcoming expos and events
Company
About us
Get to know our story and team.
Solution Overview
Download PDF (2-page overview)
Press
News, articles and press resources.
Jobs
Join us, we're hiring!
Contact us
Try it out
Book a Demo
Blog
Download Solution Brief
Recent
Product
Stream x Salesforce: Advanced Threat Detection to Stop the Next Drift-Style Breach
Stream now integrates with Salesforce for advanced threat detection. The integration provides in-depth detection capabilities that will help you catch Salesforce breaches in real time, including the recent Salesloft Drift compromise.
Asaf Haski
Sep 8
4
min
All categories
AI
Cloud Detection & Response
Cloud Security
Product
All posts
Cloud Security
Popular
Highlights
Cloud Investigation and Response Automation (CIRA)
Cloud Investigation and Response Automation (CIRA) - CIRA vs CDR
Stream Team
May 11, 2023
min
Cloud Security
Popular
Highlights
IAM best practices and troubleshooting tips for AWS EKS
IAM plays a crucial role in securing access to resources in an AWS EKS cluster, therefor it’s important to have a strong understanding of IAM (Identity and Access Management) to effectively troubleshoot any issues that may arise.
Tal Shladovsky
May 11, 2023
4
min
Product
Popular
Highlights
AWS Service Control Policies (SCP), the why, the what and the how.
Service Control Policies (SCPs) in AWS offer a robust mechanism for preserving security standards, which is essential for compliance and averting security breaches.
Stream Team
May 9, 2023
6
min
Cost
Popular
Highlights
AWS Cost best practices for MSK
Amazon Managed Streaming for Apache Kafka (MSK) is a fully managed service that makes it easy to build and run applications that use Apache Kafka to process streaming data. Although MSK simplifies the setup and management of Apache Kafka clusters, it's essential to optimize costs to make the most of the service. This article outlines some best practices for optimizing Amazon MSK costs without compromising performance or reliability.
Stream Team
Apr 27, 2023
min
Cloud Security
Popular
Highlights
How to deploy sysdig Falco on an EKS cluster
Deploying Sysdig Falco on an Amazon EKS (Elastic Kubernetes Service) cluster
Stream Team
Apr 25, 2023
min
Popular
Highlights
Common IAM Issues and Solutions for AWS EKS
When deploying workloads to EKS, it is important to ensure that appropriate access control is in place to protect resources and data. This is where IAM roles and policies come into play. IAM roles and policies in Amazon EKS are used to define and manage permissions for Kubernetes resources running in an EKS cluster. IAM roles are used to grant access to AWS resources and services, while Kubernetes policies are used to grant access to Kubernetes resources.
Tal Shladovsky
Apr 25, 2023
6
min
Cloud Security
Popular
Highlights
Continuous Threat Exposure Management (CTEM)
Breaking down the CTEM (Continuous Threat Exposure Management)
Stream Team
Apr 18, 2023
min
Popular
Highlights
Hands-on Guide: Resolve Common EKS Cluster Autoscaler Problems
The Cluster Autoscaler in Kubernetes is a component that dynamically resizes the cluster according to the workload. In Amazon Elastic Kubernetes Service (EKS), the Cluster Autoscaler optimizes resource utilization and cost by scaling down nodes during periods of low demand and scaling up when demand increases.
Stream Team
Apr 18, 2023
13
min
Cloud Security
Popular
Highlights
Cloud Infrastructure Entitlement Management (CIEM) Explained
Cloud Infrastructure Entitlement Manage (CIEM) solutions automate the process of managing user entitlements and privileges in cloud environments.
Stream Team
Mar 23, 2023
min
Previous
Load more
What's new
Blog
Stream x Salesforce: Advanced Threat Detection to Stop the Next Drift-Style Breach
Asaf Haski
Resources
How Shield Transformed Its Security Strategy with Cloud Detection and Response for Real-Time Protection
All Resources >
Upcoming event
San Diego Cybersecurity Summit
All events >
News
Stream Security Automates Cloud Incident Response with Guided Runbooks
Stream Team