Fast data lake search
When you execute a query, Scanner launches serverless Lambda functions massively in parallel to traverse its index files. Data structures like posting lists and numerical ranges guide Scanner to the regions of logs that contain hits. Searching for a needle-in-haystack across 100TB of logs takes less than 10 seconds; across 1PB of logs, less than 100 seconds. Scanner queries can be 10-100x faster than in other tools that also scan logs in S3, like Trino, Amazon Athena, or CloudWatch.
Reduce log costs by 80%
Scanner was built from the ground up to leverage the low cost of cloud storage and burstable, serverless compute. This allows Scanner to be up to 80% less expensive than traditional log tools that still use an architecture from the on-premise era.
Build a modern security and observability stack
Using Scanner's API on top of your data lake in S3, you can build a modern security and observability stack at a fraction of the cost of other tools. For example, you can use Vector or Cribl to write logs and traces into S3, use Scanner's time series API to power dashboards in Grafana or Tableau, and send threat detection events to various destinations: Slack, Tines, Torq, Jira, and custom webhooks.
Eliminate data engineering work
Scanner analyzes data lake log files stored in JSON, Parquet, CSV, or plaintext format in your S3 buckets. You do not need to perform significant data engineering work to transform your logs to match a strict schema, unlike Amazon Athena or Snowflake. All fields are indexed automatically. Spend time searching, not transforming.
No vendor lock-in
Scanner maintains all of its index files in your S3 buckets, giving you full control of your log data with no vendor lock-in. You can think of Scanner as a fast search and detections layer on top of your data lake in S3.
A trustworthy partner
Scanner is committed to the security of your log data. Your logs stay in your S3 buckets, and Scanner's compute stays in an isolated AWS account unique to your organization. Scanner has completed SOC 2 Type I and Type II audits.