#RSAC26CISO SafeSpace at RSAC26
Security Graph + Lake

See everything.
Miss nothing.

Two graph layers build a living digital twin. One maps internal posture, the other syncs global threat intel.

Supported by security leaders from
CoupangRoss StoresMicrosoft GamingStanfordCencoraThoughtSpotSandsCoupangRoss StoresMicrosoft GamingStanfordCencoraThoughtSpotSands
Entity Resolution Engine

One record per entity, across every source.

  • Per-tenant Unified Security Graph builds a digital twin that deepens over time
  • Duplicate records eliminated without manual mapping or configuration
  • Full attribute history preserved under a single canonical node
Entity Resolution Engine
EDRDESKTOP-K2M4
hostname:DESKTOP-K2M4
os:Windows 11
agent_id:cs-4821
CloudDESKTOP-K2M4
instance:i-0abc123ef
vpc:vpc-prod-01
region:us-east-1
NetworkDESKTOP-K2M4
mac:00:1A:2B:3C
ip:10.0.1.44
vlan:corp-net
RESOLVE
UNIFIED ENTITY
DESKTOP-K2M4
EDRCloudNetwork
hostname:DESKTOP-K2M4
ip:10.0.1.44
risk:67
sources:3 merged
3 sources · 1 canonical record
Resolving 10.4M entities across all sources in real time
Relationship Mapping

Every connection captured, typed, and timestamped.

  • User-to-asset, process-to-network, and lateral movement paths all mapped
  • Relationships inferred from logins, flows, and process spawns automatically
  • Typed edges with timestamps for precise forensic and investigation use
Relationship Map
LOGGED_INSSH_TOjsmithDESKTOP-K…SRV-DC01cmd.exe185.220.1…
jsmith
USER
Risk Score94
DeptIT Ops
MFADisabled
Connections
DESKTOP-K2M4
LOGGED_IN
SRV-DC01
SSH_TO
847K typed relationships mapped
Sub-Second Graph Queries

Any security question answered instantly.

  • Unified and Global graph layers queried together for full context
  • Global Security Graph syncs threat intel, IOCs, and adversary insights across instances
  • Graph context powers every AI agent, triage engine, and investigation
Graph Query
Find threat paths from jsmithwithin 3 hopsin the last 48 hours
87ms· 3 paths
LOGGED_INSPAWNEDC2_BEACONjsmithDESKTOPcmd.exe185.220.x
Temporal Graph History

Investigate incidents months after they happened.

  • 365 days of full relationship history maintained and queryable
  • Point-in-time snapshots of any entity or relationship chain
  • Retroactive investigation with no data loss or reconstruction needed
Temporal Graph
Clean baseline
Show activity for admin@corp with outbound connections in the last 48h
AUTHLOGINSSHjsmithadminDESKTOPSRV-DC01WS-097cmd.exe185.220.…5nodes3edges
How It Works

Raw data to knowledge graph

Data Sources
EDR2,847 events/s
Identity412 events/s
Cloud1,103 events/s
Network5,291 events/s
01

Connect Data Sources

  • Feed EDR telemetry, cloud APIs, identity systems, and network flows
  • Graph entities created automatically from incoming data
  • Supports dozens of native integrations out of the box
Entity Graph
jsmith
02

Relationships Inferred

  • Entity resolution engine unifies duplicate records
  • Relationships inferred from logins, network flows, and process spawns
  • All mapped automatically with no manual configuration
Graph Query
Show all hostslogged into by users with risk above 0.8
03

Graph Powers Everything

  • Every AI agent and triage engine queries the Security Graph
  • Investigations and detections always use current, contextual data
  • Single ground truth shared across the entire platform
Integrations

Works with your existing stack

CrowdStrike
Splunk
Microsoft Sentinel
Elastic
SentinelOne
Okta
Jira
ServiceNow
PagerDuty
Microsoft Teams
Microsoft Defender
IBM QRadar
Palo Alto
Fortinet
Zscaler
Cisco
Check Point
Darktrace
AWS Security Hub
Azure Security
Google Cloud
Wiz
Orca Security
CyberArk
Microsoft Entra
Slack
Recorded Future
MISP
VirusTotal
Mandiant
Tenable
Rapid7
CrowdStrike
Splunk
Microsoft Sentinel
Elastic
SentinelOne
Okta
Jira
ServiceNow
PagerDuty
Microsoft Teams
Microsoft Defender
IBM QRadar
Palo Alto
Fortinet
Zscaler
Cisco
Check Point
Darktrace
AWS Security Hub
Azure Security
Google Cloud
Wiz
Orca Security
CyberArk
Microsoft Entra
Slack
Recorded Future
MISP
VirusTotal
Mandiant
Tenable
Rapid7

+ 100 more integrations

See the Security Graph in action.

Fully queryable within 48 hours of connecting sources.

Why Alaris

Not a CMDB or SIEM view.
A live knowledge graph.

Alaris Graph
Manual Process
Entity resolution
Automatic across all sources
Spreadsheets, no deduplication
Relationship mapping
Real-time typed graph edges
Point-in-time manual maps
Query response time
Sub-100ms at any scale
Hours of pivot work
Historical lookback
365 days full history retained
Scattered, incomplete logs
Asset coverage
10M+ entities across all sources
Known assets, best-effort
Investigation context
Full graph context in every alert
Manual pivot across tools
Further Reading

Additional Resources

See your environment the way attackers do