Skip to main content

Lacework Edge Concepts

Use Case Guides

Companies are more distributed than ever. And not just the employees, but the applications, systems, and data have also dispersed from on-premise data centers to global cloud services and application providers. Securing a company's key assets — users, applications, and data — requires more than locking down the perimeter. It requires distributing the security across those systems and user devices.

The Lacework Edge provides a holistic, flexible, risk-aware approach to securing today’s companies. Lacework Edge relies on a zero-trust approach, which assumes the threat can come from inside or outside of an organization.

It ties together the pillars of your organization into a unified view, so you can understand, for example, how user behavior presents risks to your applications or documents.

Use Case Overview

To set up Lacework Edge, you configure the following key usage scenarios:

  • Private Access helps you to protect access to your important business applications. Once enabled with a workflow you configure, users connect to applications or cloud networks and systems through the Lacework Edge proxy. For more information, see Private Access.
  • Internet Security helps you control and protect your users on the Internet. After secure Internet access is configured, your users are blocked or warned when they attempt to access malicious or inappropriate sites. For more information, see Internet Security.
  • Data Security protects against data loss or exposure, including rules for exposing data on external sites. For more information, see Data Security.