Product
Integration
Check out our evergrowing list of integrations
Protect
Spot critical changes before threat actors exploit them
Trap
Plant canaries across your cloud to catch attackers and contain impact
Detect
Risk-driven threat detection with automated triage
Investigate
Investigate without drowning in data—Automated Storylines reveal the entry point, map the attack flow, guide quarantine and containment with ease.
Respond
Respond to attacks with surgical precision and speed to minimize impact
Integrations
Why Stream?
Customers
Book a Demo
Resources
All Resources
Learn about cloud detection and response
Blog
Datasheets
Reports
Webinars
Join our live event or watch on demand
Upcoming Events
Meet our team at upcoming expos and events
Company
About us
Get to know our story and team.
Solution Overview
Download PDF (2-page overview)
Press
News, articles and press resources.
Jobs
Join us, we're hiring!
Contact us
Try it out
Book a Demo
Cloud
Wiki
Cloud Provider
Microsoft Azure
An index of
Microsoft Azure
resources with an overview of all configurable attributes, including examples for helm and terraform.
Kubernetes
Amazon Web Services
AKS
Active Directory
App-Service Plan
Blob Storage
Bot
CDN Profile
Cache for Redis
Cosmos DB
Data Lake Storage
Disk Storage
Domain Service
Files
Firewall
Firewall Policy
Firewall Policy Rule Collection Group
Front Door
Function App
Group
Image
Network Interface
Network Security Group
PostgreSQL
Queue Storage
Resource Group
Role Definition
Route Table
SQL Database
SQL Server
Snapshot
Storage Account
Subnet
User
Virtual Machine
Virtual Network