Product
IntegrationS
Check out our evergrowing list of integrations
Detect
Risk-driven threat detection with automated triage
Investigate
Investigate without drowning in data—Automated Storylines reveal the entry point, map the attack flow, guide quarantine and containment with ease.
Respond
Respond to attacks with surgical precision and speed to minimize impact
Integrations
Why Stream?
Customers
Book a Demo
Resources
All Resources
Learn about cloud detection and response
Blog
Datasheets
Reports
Webinars
Join our live event or watch on demand
Upcoming Events
Meet our team at upcoming expos and events
Company
About us
Get to know our story and team.
Solution Overview
Download PDF (2-page overview)
Press
News, articles and press resources.
Jobs
Join us, we're hiring!
Contact us
Try it out
Book a Demo
Blog
Download Solution Brief
Recent
Cloud Detection & Response
Getting Started with Stream’s CDRGoat
Get started with Stream's CDRGoat! This post will walk through how to set up your environment, run your first scenario and start gaining value from the detections it generates.
David Moss
Sep 19
5
min
All categories
AI
Cloud Detection & Response
Cloud Security
Product
All posts
Cloud Security
Popular
Highlights
Cloud-Native Application Protection Platforms (CNAPP)
Understanding CNAPP and the Market Shift Towards It
Stream Team
May 18, 2023
min
Cloud Security
Popular
Highlights
IAM Guide: Kubernetes on AWS
IAM roles for service accounts provide a secure and efficient way to manage access to cloud resources in a cloud environment. By assigning roles to service accounts instead of individual users, organizations can improve their security posture by minimizing the risk of human error or credential misuse.
Tal Shladovsky
May 18, 2023
10
min
Cloud Security
Popular
Highlights
Cloud Investigation and Response Automation (CIRA)
Cloud Investigation and Response Automation (CIRA) - CIRA vs CDR
Stream Team
May 11, 2023
min
Cloud Security
Popular
Highlights
IAM best practices and troubleshooting tips for AWS EKS
IAM plays a crucial role in securing access to resources in an AWS EKS cluster, therefor it’s important to have a strong understanding of IAM (Identity and Access Management) to effectively troubleshoot any issues that may arise.
Tal Shladovsky
May 11, 2023
4
min
Product
Popular
Highlights
AWS Service Control Policies (SCP), the why, the what and the how.
Service Control Policies (SCPs) in AWS offer a robust mechanism for preserving security standards, which is essential for compliance and averting security breaches.
Stream Team
May 9, 2023
6
min
Cost
Popular
Highlights
AWS Cost best practices for MSK
Amazon Managed Streaming for Apache Kafka (MSK) is a fully managed service that makes it easy to build and run applications that use Apache Kafka to process streaming data. Although MSK simplifies the setup and management of Apache Kafka clusters, it's essential to optimize costs to make the most of the service. This article outlines some best practices for optimizing Amazon MSK costs without compromising performance or reliability.
Stream Team
Apr 27, 2023
min
Cloud Security
Popular
Highlights
How to deploy sysdig Falco on an EKS cluster
Deploying Sysdig Falco on an Amazon EKS (Elastic Kubernetes Service) cluster
Stream Team
Apr 25, 2023
min
Popular
Highlights
Common IAM Issues and Solutions for AWS EKS
When deploying workloads to EKS, it is important to ensure that appropriate access control is in place to protect resources and data. This is where IAM roles and policies come into play. IAM roles and policies in Amazon EKS are used to define and manage permissions for Kubernetes resources running in an EKS cluster. IAM roles are used to grant access to AWS resources and services, while Kubernetes policies are used to grant access to Kubernetes resources.
Tal Shladovsky
Apr 25, 2023
6
min
Cloud Security
Popular
Highlights
Continuous Threat Exposure Management (CTEM)
Breaking down the CTEM (Continuous Threat Exposure Management)
Stream Team
Apr 18, 2023
min
Previous
Load more
What's new
Blog
Getting Started with Stream’s CDRGoat
David Moss
Resources
How Shield Transformed Its Security Strategy with Cloud Detection and Response for Real-Time Protection
All Resources >
Upcoming event
San Diego Cybersecurity Summit
All events >
News
Stream Security Automates Cloud Incident Response with Guided Runbooks
Stream Team