SlideShare a Scribd company logo
ABOUT LACEWORK AND AWS
Guidebook connects people with the places in which they spend their time. Thousands of organizations use
Guidebook to create apps for conferences, corporate meetings, university campuses, and other events.
But it doesn’t stop there. Forward-thinking professionals are using Guidebook’s simple app builder to make
interactive mobile guides for student orientations, college campus tours, venues and corporate campuses,
airports, and any other place where there’s a lot going on.
At Guidebook, innovation is an essential part of their mission
to mobilize customer events and information. Using AWS, the
company can build, test and deploy new capabilities faster than
ever.
Customers trust Guidebook to protect the sensitive information
they provide when creating a new app. Guidebook’s security
commitment means they can’t afford data breaches of any size.
Security professionals at Guidebook reviewed available options
for AWS security and realized they faced a lengthy development
process if they relied strictly on platform-native tools.
“I’m extremely happy with Lacework. I sleep better at night knowing
we have full visibility into our cloud operations. It was the one tool that
checked all my security boxes.” - Devin Ertel, Director of Security & IT
at Guidebook
Lacework is Guidebook’s central security service. Security now keeps
pace with the rapid changes in Guidebook’s AWS implementation.
Guidebook uses Lacework for host-based intrusion detection,
configuration monitoring and AWS API monitoring. The solution
reduces false alarms so the company can focus on addressing
legitimate security vulnerabilities.
With Lacework, Guidebook has a clear
and complete picture of security operations
across their entire AWS implementation, from
the AWS API to server and user level activity.
AWS empowers Lacework to consistently develop and implement solutions that address today’s most challenging cloud security needs. Developing and
deploying on AWS provides Lacework with the immediate benefits of: elasticity and ability to scale, turnkey high availability & disaster recovery and rapid access
to the most innovative technologies.
In addition to being Guidebook’s primary
security service, the company’s DevOps and
Engineering teams use it to troubleshoot
issues and to gain operational insights.
Since installing Lacework, Guidebook staff
and PEN testers have been immediately
alerted to potential vulnerabilities that
otherwise may not have been discovered.
Complete Visibility Cross-Functional Versatility Effective Protection
Guidebook
THE CHALLENGE THE SOLUTION
THE BENEFITS
AWS Security Case Study
Securing Customer Event and App Data
© 2018 Lacework Inc. All Rights Reserved. www.lacework.com
NEXT STEPS
As an AWS customer, you will have access to the tools and services you need to meet your organization’s unique security and
compliance needs.
To learn more about how AWS and Lacework can help your business, visit www.lacework.com

More Related Content

What's hot

Modernizing Technology Governance
Modernizing Technology GovernanceModernizing Technology Governance
Modernizing Technology Governance
Alert Logic
 
AWS Security Hub
AWS Security HubAWS Security Hub
AWS Security Hub
Crishantha Nanayakkara
 
Mitigate Security Threats with SIEM
Mitigate Security Threats with SIEMMitigate Security Threats with SIEM
Mitigate Security Threats with SIEM
Akamai Developers & Admins
 
Securing Remote Access for Cloud-Based Systems
Securing Remote Access for Cloud-Based SystemsSecuring Remote Access for Cloud-Based Systems
Securing Remote Access for Cloud-Based Systems
francisdinha
 
Introducing Silver
Introducing SilverIntroducing Silver
Introducing Silver
Sriram Chakravarthy
 
AWS Security Enabiling Fintech Pace Security AWS Summit SG 2017
AWS Security Enabiling Fintech Pace Security AWS Summit SG 2017 AWS Security Enabiling Fintech Pace Security AWS Summit SG 2017
AWS Security Enabiling Fintech Pace Security AWS Summit SG 2017
Amazon Web Services
 
We-Donut.io presentation of Platform
We-Donut.io presentation of PlatformWe-Donut.io presentation of Platform
We-Donut.io presentation of Platform
Dennis Reurings
 
Azure Logic, API & Mobile Apps
Azure Logic, API & Mobile AppsAzure Logic, API & Mobile Apps
Azure Logic, API & Mobile Apps
HARIHARAN R
 
Big Apps, Big Data, and Why "Connected Things" are not the IoT
Big Apps, Big Data, and Why "Connected Things" are not the IoTBig Apps, Big Data, and Why "Connected Things" are not the IoT
Big Apps, Big Data, and Why "Connected Things" are not the IoT
Apigee | Google Cloud
 
Nader Dabit - Introduction to Mobile Development with AWS.pdf
Nader Dabit - Introduction to Mobile Development with AWS.pdfNader Dabit - Introduction to Mobile Development with AWS.pdf
Nader Dabit - Introduction to Mobile Development with AWS.pdf
Amazon Web Services
 
Making application threat intelligence practical - DEM06 - AWS reInforce 2019
Making application threat intelligence practical - DEM06 - AWS reInforce 2019 Making application threat intelligence practical - DEM06 - AWS reInforce 2019
Making application threat intelligence practical - DEM06 - AWS reInforce 2019
Amazon Web Services
 
When Your Software is Your Business: Building a SaaS Business on AWS - AWS Su...
When Your Software is Your Business: Building a SaaS Business on AWS - AWS Su...When Your Software is Your Business: Building a SaaS Business on AWS - AWS Su...
When Your Software is Your Business: Building a SaaS Business on AWS - AWS Su...
Amazon Web Services
 
Force Sites
Force SitesForce Sites
Force Sites
BLmarketing
 
Building Mobile Apps with AWS Amplify
Building Mobile Apps with AWS AmplifyBuilding Mobile Apps with AWS Amplify
Building Mobile Apps with AWS Amplify
Amazon Web Services
 
Azure software as a service
Azure software as a serviceAzure software as a service
Azure software as a service
Prancer Io
 
Introduction to API's
Introduction to API'sIntroduction to API's
Introduction to API's
Nagasahas DS
 
How to Achieve Agile API Security
How to Achieve Agile API SecurityHow to Achieve Agile API Security
How to Achieve Agile API Security
Apigee | Google Cloud
 
Kin Lane - Gluecon - Whats Next for APIs?
Kin Lane - Gluecon - Whats Next for APIs?Kin Lane - Gluecon - Whats Next for APIs?
Kin Lane - Gluecon - Whats Next for APIs?
Kin Lane
 
Cloudreach Voices - Azure Active Directory
Cloudreach Voices - Azure Active DirectoryCloudreach Voices - Azure Active Directory
Cloudreach Voices - Azure Active Directory
Cloudreach
 
Conqsys ppt
Conqsys pptConqsys ppt
Conqsys ppt
Kamal Taneja
 

What's hot (20)

Modernizing Technology Governance
Modernizing Technology GovernanceModernizing Technology Governance
Modernizing Technology Governance
 
AWS Security Hub
AWS Security HubAWS Security Hub
AWS Security Hub
 
Mitigate Security Threats with SIEM
Mitigate Security Threats with SIEMMitigate Security Threats with SIEM
Mitigate Security Threats with SIEM
 
Securing Remote Access for Cloud-Based Systems
Securing Remote Access for Cloud-Based SystemsSecuring Remote Access for Cloud-Based Systems
Securing Remote Access for Cloud-Based Systems
 
Introducing Silver
Introducing SilverIntroducing Silver
Introducing Silver
 
AWS Security Enabiling Fintech Pace Security AWS Summit SG 2017
AWS Security Enabiling Fintech Pace Security AWS Summit SG 2017 AWS Security Enabiling Fintech Pace Security AWS Summit SG 2017
AWS Security Enabiling Fintech Pace Security AWS Summit SG 2017
 
We-Donut.io presentation of Platform
We-Donut.io presentation of PlatformWe-Donut.io presentation of Platform
We-Donut.io presentation of Platform
 
Azure Logic, API & Mobile Apps
Azure Logic, API & Mobile AppsAzure Logic, API & Mobile Apps
Azure Logic, API & Mobile Apps
 
Big Apps, Big Data, and Why "Connected Things" are not the IoT
Big Apps, Big Data, and Why "Connected Things" are not the IoTBig Apps, Big Data, and Why "Connected Things" are not the IoT
Big Apps, Big Data, and Why "Connected Things" are not the IoT
 
Nader Dabit - Introduction to Mobile Development with AWS.pdf
Nader Dabit - Introduction to Mobile Development with AWS.pdfNader Dabit - Introduction to Mobile Development with AWS.pdf
Nader Dabit - Introduction to Mobile Development with AWS.pdf
 
Making application threat intelligence practical - DEM06 - AWS reInforce 2019
Making application threat intelligence practical - DEM06 - AWS reInforce 2019 Making application threat intelligence practical - DEM06 - AWS reInforce 2019
Making application threat intelligence practical - DEM06 - AWS reInforce 2019
 
When Your Software is Your Business: Building a SaaS Business on AWS - AWS Su...
When Your Software is Your Business: Building a SaaS Business on AWS - AWS Su...When Your Software is Your Business: Building a SaaS Business on AWS - AWS Su...
When Your Software is Your Business: Building a SaaS Business on AWS - AWS Su...
 
Force Sites
Force SitesForce Sites
Force Sites
 
Building Mobile Apps with AWS Amplify
Building Mobile Apps with AWS AmplifyBuilding Mobile Apps with AWS Amplify
Building Mobile Apps with AWS Amplify
 
Azure software as a service
Azure software as a serviceAzure software as a service
Azure software as a service
 
Introduction to API's
Introduction to API'sIntroduction to API's
Introduction to API's
 
How to Achieve Agile API Security
How to Achieve Agile API SecurityHow to Achieve Agile API Security
How to Achieve Agile API Security
 
Kin Lane - Gluecon - Whats Next for APIs?
Kin Lane - Gluecon - Whats Next for APIs?Kin Lane - Gluecon - Whats Next for APIs?
Kin Lane - Gluecon - Whats Next for APIs?
 
Cloudreach Voices - Azure Active Directory
Cloudreach Voices - Azure Active DirectoryCloudreach Voices - Azure Active Directory
Cloudreach Voices - Azure Active Directory
 
Conqsys ppt
Conqsys pptConqsys ppt
Conqsys ppt
 

Similar to Guidebook Case Study

Azure quick-start-for-net-developers
Azure quick-start-for-net-developersAzure quick-start-for-net-developers
Azure quick-start-for-net-developers
imdurgesh
 
Sathish resume
Sathish resumeSathish resume
Sathish resume
Sathish Kumar Rajendiran
 
Introducing drie
Introducing drieIntroducing drie
Introducing drie
Jeremy Suarez
 
Introducing drie
Introducing drieIntroducing drie
Introducing drie
Jeremy Suarez
 
AWS devops content
AWS devops contentAWS devops content
AWS devops content
MUDDUKRISHNA14
 
AWS devops content 1(2023).docx
AWS devops content 1(2023).docxAWS devops content 1(2023).docx
AWS devops content 1(2023).docx
MUDDUKRISHNA14
 
AWS devops
AWS devopsAWS devops
AWS devops
MUDDUKRISHNA14
 
AWS devops content
AWS devops contentAWS devops content
AWS devops content
MUDDUKRISHNA14
 
AWSome Day Philippines Keynote 2015
AWSome Day Philippines Keynote 2015AWSome Day Philippines Keynote 2015
AWSome Day Philippines Keynote 2015
Hwee Bee Tan
 
Adobe nondisclosure-agreement-automation-solution-sb.pd
Adobe nondisclosure-agreement-automation-solution-sb.pdAdobe nondisclosure-agreement-automation-solution-sb.pd
Adobe nondisclosure-agreement-automation-solution-sb.pd
oh seongkooi
 
zscaler-aws-zero-trust.pdf
zscaler-aws-zero-trust.pdfzscaler-aws-zero-trust.pdf
zscaler-aws-zero-trust.pdf
MuhammadSajidAbdulga
 
AWS Training Institute in Gurgaon.pptx
AWS Training Institute in Gurgaon.pptxAWS Training Institute in Gurgaon.pptx
AWS Training Institute in Gurgaon.pptx
APTRON Gurgaon
 
Third party cloud services cloud computing
Third party cloud services cloud computingThird party cloud services cloud computing
Third party cloud services cloud computing
SohailAliMalik
 
Amazon Web Services Integration with Netsuite
Amazon Web Services Integration with NetsuiteAmazon Web Services Integration with Netsuite
Amazon Web Services Integration with Netsuite
IRJET Journal
 
Cloud Solutions
Cloud SolutionsCloud Solutions
Cloud Solutions
Businessware Technologies
 
AWS DevOps: Introduction to DevOps on AWS
  AWS DevOps: Introduction to DevOps on AWS  AWS DevOps: Introduction to DevOps on AWS
AWS DevOps: Introduction to DevOps on AWS
Datacademy.ai
 
How to Deploy Java Web App in AWS| Edureka
How to Deploy Java Web App in AWS| EdurekaHow to Deploy Java Web App in AWS| Edureka
How to Deploy Java Web App in AWS| Edureka
Edureka!
 
How to Choose the Right Technology Stack for SaaS Development?.pdf
How to Choose the Right Technology Stack for SaaS Development?.pdfHow to Choose the Right Technology Stack for SaaS Development?.pdf
How to Choose the Right Technology Stack for SaaS Development?.pdf
Dark Bears
 
Seminar Report On Amazon Web Service
Seminar Report On Amazon Web ServiceSeminar Report On Amazon Web Service
Seminar Report On Amazon Web Service
shishupal choudhary
 
AppViewX CERT+ Brochure
AppViewX CERT+ BrochureAppViewX CERT+ Brochure
AppViewX CERT+ Brochure
AppViewX
 

Similar to Guidebook Case Study (20)

Azure quick-start-for-net-developers
Azure quick-start-for-net-developersAzure quick-start-for-net-developers
Azure quick-start-for-net-developers
 
Sathish resume
Sathish resumeSathish resume
Sathish resume
 
Introducing drie
Introducing drieIntroducing drie
Introducing drie
 
Introducing drie
Introducing drieIntroducing drie
Introducing drie
 
AWS devops content
AWS devops contentAWS devops content
AWS devops content
 
AWS devops content 1(2023).docx
AWS devops content 1(2023).docxAWS devops content 1(2023).docx
AWS devops content 1(2023).docx
 
AWS devops
AWS devopsAWS devops
AWS devops
 
AWS devops content
AWS devops contentAWS devops content
AWS devops content
 
AWSome Day Philippines Keynote 2015
AWSome Day Philippines Keynote 2015AWSome Day Philippines Keynote 2015
AWSome Day Philippines Keynote 2015
 
Adobe nondisclosure-agreement-automation-solution-sb.pd
Adobe nondisclosure-agreement-automation-solution-sb.pdAdobe nondisclosure-agreement-automation-solution-sb.pd
Adobe nondisclosure-agreement-automation-solution-sb.pd
 
zscaler-aws-zero-trust.pdf
zscaler-aws-zero-trust.pdfzscaler-aws-zero-trust.pdf
zscaler-aws-zero-trust.pdf
 
AWS Training Institute in Gurgaon.pptx
AWS Training Institute in Gurgaon.pptxAWS Training Institute in Gurgaon.pptx
AWS Training Institute in Gurgaon.pptx
 
Third party cloud services cloud computing
Third party cloud services cloud computingThird party cloud services cloud computing
Third party cloud services cloud computing
 
Amazon Web Services Integration with Netsuite
Amazon Web Services Integration with NetsuiteAmazon Web Services Integration with Netsuite
Amazon Web Services Integration with Netsuite
 
Cloud Solutions
Cloud SolutionsCloud Solutions
Cloud Solutions
 
AWS DevOps: Introduction to DevOps on AWS
  AWS DevOps: Introduction to DevOps on AWS  AWS DevOps: Introduction to DevOps on AWS
AWS DevOps: Introduction to DevOps on AWS
 
How to Deploy Java Web App in AWS| Edureka
How to Deploy Java Web App in AWS| EdurekaHow to Deploy Java Web App in AWS| Edureka
How to Deploy Java Web App in AWS| Edureka
 
How to Choose the Right Technology Stack for SaaS Development?.pdf
How to Choose the Right Technology Stack for SaaS Development?.pdfHow to Choose the Right Technology Stack for SaaS Development?.pdf
How to Choose the Right Technology Stack for SaaS Development?.pdf
 
Seminar Report On Amazon Web Service
Seminar Report On Amazon Web ServiceSeminar Report On Amazon Web Service
Seminar Report On Amazon Web Service
 
AppViewX CERT+ Brochure
AppViewX CERT+ BrochureAppViewX CERT+ Brochure
AppViewX CERT+ Brochure
 

More from Lacework

BSides Denver 2019 - Cloud Wars Episode V: The Cryptojacker Strikes Back
BSides Denver 2019 - Cloud Wars Episode V: The Cryptojacker Strikes BackBSides Denver 2019 - Cloud Wars Episode V: The Cryptojacker Strikes Back
BSides Denver 2019 - Cloud Wars Episode V: The Cryptojacker Strikes Back
Lacework
 
DerbyCon 2019: Prepare to be Boarded! A Tale of Kubernetes, Plunder, and Cryp...
DerbyCon 2019: Prepare to be Boarded! A Tale of Kubernetes, Plunder, and Cryp...DerbyCon 2019: Prepare to be Boarded! A Tale of Kubernetes, Plunder, and Cryp...
DerbyCon 2019: Prepare to be Boarded! A Tale of Kubernetes, Plunder, and Cryp...
Lacework
 
Batten Down the Hatches: A Practical Guide to Securing Kubernetes - RMISC 2019
Batten Down the Hatches: A Practical Guide to Securing Kubernetes - RMISC 2019Batten Down the Hatches: A Practical Guide to Securing Kubernetes - RMISC 2019
Batten Down the Hatches: A Practical Guide to Securing Kubernetes - RMISC 2019
Lacework
 
Lacework | Top 10 Cloud Security Threats
Lacework | Top 10 Cloud Security ThreatsLacework | Top 10 Cloud Security Threats
Lacework | Top 10 Cloud Security Threats
Lacework
 
All Your Containers Are Belong To Us
All Your Containers Are Belong To UsAll Your Containers Are Belong To Us
All Your Containers Are Belong To Us
Lacework
 
Practical Guide to Securing Kubernetes
Practical Guide to Securing KubernetesPractical Guide to Securing Kubernetes
Practical Guide to Securing Kubernetes
Lacework
 
AWS Security Week | Getting to Continuous Security and Compliance Monitoring ...
AWS Security Week | Getting to Continuous Security and Compliance Monitoring ...AWS Security Week | Getting to Continuous Security and Compliance Monitoring ...
AWS Security Week | Getting to Continuous Security and Compliance Monitoring ...
Lacework
 
Lacework Kubernetes Meetup | August 28, 2018
Lacework Kubernetes Meetup | August 28, 2018Lacework Kubernetes Meetup | August 28, 2018
Lacework Kubernetes Meetup | August 28, 2018
Lacework
 
Lacework AWS Security Week Presentation
Lacework AWS Security Week PresentationLacework AWS Security Week Presentation
Lacework AWS Security Week Presentation
Lacework
 
Lacework Overview: Security Redefined for Cloud Scale
Lacework Overview: Security Redefined for Cloud ScaleLacework Overview: Security Redefined for Cloud Scale
Lacework Overview: Security Redefined for Cloud Scale
Lacework
 
Containers At-Risk: A Review of 21,000 Cloud Environments
Containers At-Risk: A Review of 21,000 Cloud EnvironmentsContainers At-Risk: A Review of 21,000 Cloud Environments
Containers At-Risk: A Review of 21,000 Cloud Environments
Lacework
 
Lacework Protection for AWS S3 Buckets
Lacework Protection for AWS S3 BucketsLacework Protection for AWS S3 Buckets
Lacework Protection for AWS S3 Buckets
Lacework
 
Container Security Research
Container Security ResearchContainer Security Research
Container Security Research
Lacework
 
Security for AWS: Journey to Least Privilege
Security for AWS: Journey to Least PrivilegeSecurity for AWS: Journey to Least Privilege
Security for AWS: Journey to Least Privilege
Lacework
 
Containers At-Risk A Review of 21,000 Cloud Environments
Containers At-Risk A Review of 21,000 Cloud EnvironmentsContainers At-Risk A Review of 21,000 Cloud Environments
Containers At-Risk A Review of 21,000 Cloud Environments
Lacework
 
Lacework for AWS Security Overview
Lacework for AWS Security OverviewLacework for AWS Security Overview
Lacework for AWS Security Overview
Lacework
 

More from Lacework (16)

BSides Denver 2019 - Cloud Wars Episode V: The Cryptojacker Strikes Back
BSides Denver 2019 - Cloud Wars Episode V: The Cryptojacker Strikes BackBSides Denver 2019 - Cloud Wars Episode V: The Cryptojacker Strikes Back
BSides Denver 2019 - Cloud Wars Episode V: The Cryptojacker Strikes Back
 
DerbyCon 2019: Prepare to be Boarded! A Tale of Kubernetes, Plunder, and Cryp...
DerbyCon 2019: Prepare to be Boarded! A Tale of Kubernetes, Plunder, and Cryp...DerbyCon 2019: Prepare to be Boarded! A Tale of Kubernetes, Plunder, and Cryp...
DerbyCon 2019: Prepare to be Boarded! A Tale of Kubernetes, Plunder, and Cryp...
 
Batten Down the Hatches: A Practical Guide to Securing Kubernetes - RMISC 2019
Batten Down the Hatches: A Practical Guide to Securing Kubernetes - RMISC 2019Batten Down the Hatches: A Practical Guide to Securing Kubernetes - RMISC 2019
Batten Down the Hatches: A Practical Guide to Securing Kubernetes - RMISC 2019
 
Lacework | Top 10 Cloud Security Threats
Lacework | Top 10 Cloud Security ThreatsLacework | Top 10 Cloud Security Threats
Lacework | Top 10 Cloud Security Threats
 
All Your Containers Are Belong To Us
All Your Containers Are Belong To UsAll Your Containers Are Belong To Us
All Your Containers Are Belong To Us
 
Practical Guide to Securing Kubernetes
Practical Guide to Securing KubernetesPractical Guide to Securing Kubernetes
Practical Guide to Securing Kubernetes
 
AWS Security Week | Getting to Continuous Security and Compliance Monitoring ...
AWS Security Week | Getting to Continuous Security and Compliance Monitoring ...AWS Security Week | Getting to Continuous Security and Compliance Monitoring ...
AWS Security Week | Getting to Continuous Security and Compliance Monitoring ...
 
Lacework Kubernetes Meetup | August 28, 2018
Lacework Kubernetes Meetup | August 28, 2018Lacework Kubernetes Meetup | August 28, 2018
Lacework Kubernetes Meetup | August 28, 2018
 
Lacework AWS Security Week Presentation
Lacework AWS Security Week PresentationLacework AWS Security Week Presentation
Lacework AWS Security Week Presentation
 
Lacework Overview: Security Redefined for Cloud Scale
Lacework Overview: Security Redefined for Cloud ScaleLacework Overview: Security Redefined for Cloud Scale
Lacework Overview: Security Redefined for Cloud Scale
 
Containers At-Risk: A Review of 21,000 Cloud Environments
Containers At-Risk: A Review of 21,000 Cloud EnvironmentsContainers At-Risk: A Review of 21,000 Cloud Environments
Containers At-Risk: A Review of 21,000 Cloud Environments
 
Lacework Protection for AWS S3 Buckets
Lacework Protection for AWS S3 BucketsLacework Protection for AWS S3 Buckets
Lacework Protection for AWS S3 Buckets
 
Container Security Research
Container Security ResearchContainer Security Research
Container Security Research
 
Security for AWS: Journey to Least Privilege
Security for AWS: Journey to Least PrivilegeSecurity for AWS: Journey to Least Privilege
Security for AWS: Journey to Least Privilege
 
Containers At-Risk A Review of 21,000 Cloud Environments
Containers At-Risk A Review of 21,000 Cloud EnvironmentsContainers At-Risk A Review of 21,000 Cloud Environments
Containers At-Risk A Review of 21,000 Cloud Environments
 
Lacework for AWS Security Overview
Lacework for AWS Security OverviewLacework for AWS Security Overview
Lacework for AWS Security Overview
 

Recently uploaded

Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
Dinusha Kumarasiri
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
Hiike
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 

Recently uploaded (20)

Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 

Guidebook Case Study

  • 1. ABOUT LACEWORK AND AWS Guidebook connects people with the places in which they spend their time. Thousands of organizations use Guidebook to create apps for conferences, corporate meetings, university campuses, and other events. But it doesn’t stop there. Forward-thinking professionals are using Guidebook’s simple app builder to make interactive mobile guides for student orientations, college campus tours, venues and corporate campuses, airports, and any other place where there’s a lot going on. At Guidebook, innovation is an essential part of their mission to mobilize customer events and information. Using AWS, the company can build, test and deploy new capabilities faster than ever. Customers trust Guidebook to protect the sensitive information they provide when creating a new app. Guidebook’s security commitment means they can’t afford data breaches of any size. Security professionals at Guidebook reviewed available options for AWS security and realized they faced a lengthy development process if they relied strictly on platform-native tools. “I’m extremely happy with Lacework. I sleep better at night knowing we have full visibility into our cloud operations. It was the one tool that checked all my security boxes.” - Devin Ertel, Director of Security & IT at Guidebook Lacework is Guidebook’s central security service. Security now keeps pace with the rapid changes in Guidebook’s AWS implementation. Guidebook uses Lacework for host-based intrusion detection, configuration monitoring and AWS API monitoring. The solution reduces false alarms so the company can focus on addressing legitimate security vulnerabilities. With Lacework, Guidebook has a clear and complete picture of security operations across their entire AWS implementation, from the AWS API to server and user level activity. AWS empowers Lacework to consistently develop and implement solutions that address today’s most challenging cloud security needs. Developing and deploying on AWS provides Lacework with the immediate benefits of: elasticity and ability to scale, turnkey high availability & disaster recovery and rapid access to the most innovative technologies. In addition to being Guidebook’s primary security service, the company’s DevOps and Engineering teams use it to troubleshoot issues and to gain operational insights. Since installing Lacework, Guidebook staff and PEN testers have been immediately alerted to potential vulnerabilities that otherwise may not have been discovered. Complete Visibility Cross-Functional Versatility Effective Protection Guidebook THE CHALLENGE THE SOLUTION THE BENEFITS AWS Security Case Study Securing Customer Event and App Data © 2018 Lacework Inc. All Rights Reserved. www.lacework.com NEXT STEPS As an AWS customer, you will have access to the tools and services you need to meet your organization’s unique security and compliance needs. To learn more about how AWS and Lacework can help your business, visit www.lacework.com