Skip to main content
Why ClearVector
Identity-driven detection and response
See exactly who did what, when
Defending production environments
Purpose-built for cloud infrastructure
Take a self guided tour
Start tour now
Product
Sensors
Identity-driven visibility inside workloads
Private SaaS
Deployed entirely in your environment
Detection engine
Identity-driven detection in seconds
Identity graph
Map every identity and interaction
Runtime visibility
See identity actions as they execute
Environments
Unify identity across cloud platforms
Take a self guided tour
Start tour now
Solutions
Security leadership
Prove control, reduce breach impact
Detection and response teams
Investigate faster, contain with precision
Take a self guided tour
Start tour now
Pricing
Resources
Blog
Perspectives on identity-driven security
Take a self guided tour
Start tour now
Company
About
Built for the modern security org
Press
News from ClearVector and partners
Contact
Reach our team directly
Take a self guided tour
Start tour now
Sign In
Sign In
Sign In
Connect with us
Connect with us
Connect with us
Why ClearVector
Identity-driven detection and response
See exactly who did what, when
Defending production environments
Purpose-built for cloud infrastructure
Take a self guided tour
Start tour now
Product
Sensors
Identity-driven visibility inside workloads
Private SaaS
Deployed entirely in your environment
Detection engine
Identity-driven detection in seconds
Identity graph
Map every identity and interaction
Runtime visibility
See identity actions as they execute
Environments
Unify identity across cloud platforms
Take a self guided tour
Start tour now
Solutions
Security leadership
Prove control, reduce breach impact
Detection and response teams
Investigate faster, contain with precision
Take a self guided tour
Start tour now
Pricing
Resources
Blog
Perspectives on identity-driven security
Take a self guided tour
Start tour now
Company
About
Built for the modern security org
Press
News from ClearVector and partners
Contact
Reach our team directly
Take a self guided tour
Start tour now
Sign In
Sign In
Sign In
Connect with us
Connect with us
Connect with us
Andrew Davis
Articles from Andrew Davis
Merge Order Hijacking in AWS Lambda
Andrew Davis
Text Link
March 26, 2024
•
8 min read
Research
Introducing runtime detection and isolation for Lambda and EC2
John Laliberte
Andrew Davis
Text Link
June 6, 2023
•
3 min read
Product
Lambda internals (Part one)
Andrew Davis
Text Link
November 9, 2022
•
7 min read
Research
LambdaSpy - Implanting the Lambda execution environment (Part two)
Andrew Davis
Text Link
November 9, 2022
•
8 min read
Research
Auditing identity activity for NOBELIUM and MagicWeb in AWS
John Laliberte
Andrew Davis
Phil Puleo
Text Link
August 25, 2022
•
min read
Security
How to set up an AWS environment
John Laliberte
Andrew Davis
Phil Puleo
Text Link
January 18, 2022
•
6 min read
Engineering
1