Product
CLOUD detection & Response
Real-time exposure & drift detection
Track all changes, detect critical exposure and toxic combinations before attackers do
Agentless Threat Detection
Reduce noise with a unique approach that fuses tactics and behavioral analytics
Automated Investigation and Response
Automated attack timelines and blast radius graphs to investigate and resolve alerts in minutes
Access Segmentation
Define Access Governance across Network and Permissions
Cloud security & governance
Real-time CSPM, CIEM, KSPM
Harden external exposure & lateral movement risks, prioritized based on toxic combinations
Attack Path Prioritization
Risk-Based Misconfigurations and Vulnerability fix prioritization
Posture Aware IaC Security
Shift-left with runtime impact analysis
Compliance
Achieve continuous compliance
Book a 30 min call with one of our solution experts
Book a Demo
Use Cases
CLOUD DETECTION & RESPONSE
Real-time exposure detection
Agentless Threat Detection
Automated Investigation and Response
Zero Trust Segmentation
CLOUD SECURITY & GOVERNANCE
CSPM, CIEM, KSPM
Attack Path Prioritization
Terraform IaC governance
Real-time Compliance
Why Stream?
Customers
Book a Demo
Resources
Blog
Solution Overview
Download PDF (2-page overview)
Upcoming Events
Meet our team at upcoming expos and events
Whitepapers
Learn about cloud security, cost, availability and more.
Watch on demand
Webinar: Building an adaptive cyber resilient cloud
Watch now
Partners
Company
About us
Get to know our story and team.
Press
News, articles and press resources.
Jobs
Join us, we're hiring!
Contact us
Chat with Expert
Book a demo
Cloud
Wiki
Cloud Provider
Amazon Web Services
An index of
Amazon Web Services
resources with an overview of all configurable attributes, including examples for helm and terraform.
Kubernetes
Microsoft Azure
ALB
Network
AMI
Storage
API Gateway
Network
Athena
Analytics
Auto Scaling Group
Compute
Availability Zone
Compute
CloudFormation Stack
Management
CloudFront
Network
CloudTrail
Management
CloudWatch
Security
Config
Management
DMS
Database
Direct Connect
Network
Direct Connect Gateway
Network
DocumentDB
Database
DynamoDB
Database
EBS Snapshots
Storage
EBS Volume
Storage
EC2
Compute
ECS
Compute
ECS Task Definition
Compute
EFS
Storage
EKS
Compute
ELB
Network
EMR
Analytics
ENI
Network
ElastiCache
Database
Elastic IP
Network
GLB
Network
Glue
Analytics
GuardDuty
Security
IAM Account Password Policy
Permissions
IAM Group
Permissions
IAM Policy
Permissions
IAM Role
Permissions
IAM User
Permissions
Instance Profile
Permissions
Internet Gateway
Network
KMS
Security
Kinesis
Analytics
Lambda Function
Compute
MQ
Queue
MSK
Queue
NAT Gateway
Network
NLB
Network
Network ACL
Security
OpenSearch
Analytics
Prefix List
Network
RDS
Database
Redshift
Analytics
Region
Compute
Route 53
Network
Route Table
Network
S3 Bucket
Storage
S3 Glacier
Storage
SCP
Permissions
SES
Queue
SNS
Queue
SQS
Queue
SageMaker Notebook
Compute
Security Group
Security
Site-to-Site VPN Connection
Network
Subnet
Network
Target Group
Network
Transit Gateway
Network
VPC
Network
VPC Endpoint
Network
VPC Peering
Network
VPN Customer Gateway
Network
Virtual Private Gateway
Network
WAF
Security