Lacework Asset Graph Powers Expansion

Diving deeper into

Lacework

Company Report
Lacework now have the ability to use that mapping of data elements as a foundation from which to launch new types of products.
Analyzed 9 sources

The real asset is not the alert engine, it is the shared graph of how workloads, identities, APIs, configs, and activity connect across a cloud estate. Once that map exists, Lacework can ship adjacent products without asking the customer to deploy another system first. The same data model that powers anomaly detection can also rank attack paths, watch runtime behavior, and extend into identity and network level controls.

  • Lacework already ingests cloud APIs and runtime signals from environments like AWS, Kubernetes, EC2, and ECS, then correlates them in one platform. That means a new module can reuse the same telemetry rather than starting from zero, which makes expansion into broader CNAPP functions much cheaper and faster.
  • This is how the category has evolved. Orca expanded from core posture management into identities, Kubernetes, secrets, and code security on top of its cloud visibility layer. CrowdStrike extends from endpoint into cloud workload and identity protection by correlating telemetry in one platform. The winning products are built around a reused data foundation.
  • The strategic value of that foundation was validated by the Fortinet acquisition. Fortinet said it wanted Lacework for its organically built CNAPP platform, homegrown data lake, AI and ML, and code to cloud coverage, then folded it into Lacework FortiCNAPP. Buyers increasingly want fewer tools, so a broad platform built on one schema matters more than another standalone feature.

Cloud security is heading toward fewer vendors with deeper control over the same underlying asset graph. The companies that already understand what is running, who can access it, what changed, and what is risky will keep adding products around that core. In that market, the map becomes the product factory.