📄️ Detections Reference
Lacework leverages several detections to swiftly identify security incidents, enabling you to mitigate risks and protect sensitive data. These detections are generated by security tools and systems that monitor network traffic, system logs, user behavior, and other data sources to identify signs of cyber threats and attacks.
📄️ Anomaly Detection Models
Lacework uses the following anomaly detection methods to address three common adversarial techniques: active scanning, domain generation algorithm, and SSH brute force.