Frequently Asked Questions

Product Information & Security Graphs

What is a security graph in cloud environments?

A security graph models entities such as users, roles, resources, and policies as nodes, with relationships as edges. This structure enables queries to reveal both direct and transitive access paths for entitlements management in cloud setups like AWS or GCP. (Source: Original Webpage)

How does FalkorDB enable fast multi-hop traversals for security graphs?

FalkorDB's sparse-matrix engine delivers p99 latency up to 496x faster than alternatives, supporting in-memory analytics for entitlement audits and lateral movement simulation across millions of nodes without performance hits. (Source: Original Webpage, Knowledge Base)

What entities and relationships can be modeled in a security graph?

Security graphs capture users, roles, permissions, policies, resources, and activities as nodes, with edges representing assignments, group memberships, policy applications, and logged activities. Properties can be added to nodes and edges for extra details like timestamps or severity. (Source: Original Webpage)

How does FalkorDB help visualize exposure paths and privilege combinations?

FalkorDB allows you to build schemas capturing entities like users, policies, and events, then run queries to visualize exposure paths, IP-based access patterns, and toxic privilege combos. This streamlines CSPM and threat detection workflows. (Source: Original Webpage)

What are the main benefits of using a graph database for security data?

Graph databases treat relationships as first-class citizens, enabling fast multi-hop traversals and efficient mapping of complex, many-to-many, and indirect connections. This makes it easier to answer questions about access, dependencies, and privilege escalation in real time. (Source: Original Webpage)

How does FalkorDB's architecture support real-time security analytics?

FalkorDB uses a sparse-matrix and linear algebra engine for querying, enabling ultra-fast, scalable traversals across millions of nodes and edges with minimal memory overhead. It runs in memory but persists data to disk, ensuring real-time performance and durability. (Source: Original Webpage, Knowledge Base)

What query language does FalkorDB support for security graphs?

FalkorDB implements the standard OpenCypher query language, plus proprietary extensions. It includes commands like GRAPH.PROFILE and GRAPH.EXPLAIN to debug query plans and optimize performance. (Source: Original Webpage)

How does FalkorDB handle multi-tenancy for security graphs?

FalkorDB supports co-located multiple graphs (tenants) within a single instance. Each environment remains fully isolated for security and governance, while sharing infrastructure for efficiency. (Source: Original Webpage, Knowledge Base)

What built-in graph algorithms does FalkorDB offer for security analytics?

FalkorDB includes algorithms like label propagation (CDLP), betweenness centrality, weakly connected components (WCC), and shortest path analysis. These enable threat and lateral-movement detection directly in-database. (Source: Original Webpage)

How does FalkorDB support memory-efficient analytics for large security graphs?

FalkorDB features string interning to deduplicate repeated metadata, keeping memory use lean in graphs with millions of users, roles, and resources. The GRAPH.MEMORY USAGE command provides detailed breakdowns for fine-grained performance tuning. (Source: Original Webpage)

Security & Compliance

Is FalkorDB SOC 2 Type II compliant?

Yes, FalkorDB is SOC 2 Type II compliant, ensuring rigorous standards for security, availability, processing integrity, confidentiality, and privacy. This certification demonstrates FalkorDB's commitment to maintaining the highest standards of security and compliance. (Source: Knowledge Base)

What security features does FalkorDB provide?

FalkorDB protects against unauthorized access, ensures system availability, delivers accurate and timely data processing, safeguards sensitive information, and complies with privacy regulations. (Source: Knowledge Base)

Features & Capabilities

What are the key performance metrics of FalkorDB?

FalkorDB offers up to 496x faster latency and 6x better memory efficiency compared to competitors like Neo4j. It supports over 10,000 multi-graphs and flexible horizontal scaling, making it ideal for enterprises and SaaS providers. (Source: Knowledge Base)

Does FalkorDB support advanced AI use cases?

Yes, FalkorDB is optimized for advanced AI applications such as GraphRAG and agent memory, enabling intelligent agents and chatbots with real-time adaptability. (Source: Knowledge Base)

What integrations are available with FalkorDB?

FalkorDB integrates with frameworks like Graphiti (by ZEP), g.v() for visualization, Cognee for AI agent memory, LangChain and LlamaIndex for LLM integration. For more details, visit the official documentation and blog. (Source: Knowledge Base)

Does FalkorDB provide an API?

Yes, FalkorDB provides an API with comprehensive references and guides available in the official documentation. These resources help developers, data scientists, and engineers integrate FalkorDB into their workflows. (Source: Knowledge Base)

What technical documentation is available for FalkorDB?

FalkorDB offers comprehensive technical documentation and API references at docs.falkordb.com, including guides, release notes, and advanced configuration details. (Source: Knowledge Base)

Use Cases & Benefits

How does FalkorDB help with Cloud Infrastructure Entitlement Management (CIEM)?

FalkorDB enables mapping relationships between cloud users, groups, roles, and resources in real time, helping find users with excessive permissions, pinpoint unused roles, and enforce least privilege policies. (Source: Original Webpage)

How does FalkorDB support Cloud Security Posture Management (CSPM)?

FalkorDB lets you visualize the entire infrastructure, including assets, configurations, dependencies, and risky changes, as a connected map. It helps surface misconfigurations, automate compliance checks, and prioritize risks. (Source: Original Webpage)

How does FalkorDB improve Identity and Access Management (IAM)?

FalkorDB enables mapping every user, group, and role, detecting risky privilege combinations or overlaps, and tracing who can access sensitive resources directly or indirectly. (Source: Original Webpage)

How does FalkorDB enhance threat detection and lateral movement analysis?

FalkorDB's high-speed graph traversal and analytics help identify all possible attack paths, simulate breach scenarios, and visualize privilege escalation risks, enabling proactive defense. (Source: Original Webpage)

What business impact can customers expect from using FalkorDB?

Customers can expect improved scalability, enhanced trust and reliability, reduced alert fatigue in cybersecurity, faster time-to-market, and support for advanced AI applications. These outcomes empower businesses to unlock the full potential of their data and achieve strategic goals. (Source: Knowledge Base)

Competition & Comparison

How does FalkorDB compare to Neo4j?

FalkorDB offers up to 496x faster latency, 6x better memory efficiency, flexible horizontal scaling, and includes multi-tenancy in all plans. Neo4j uses an on-disk storage model and offers multi-tenancy only in premium plans. (Source: Knowledge Base)

How does FalkorDB compare to AWS Neptune?

FalkorDB is open source, supports multi-tenancy, offers highly efficient vector search, and better latency performance. AWS Neptune is proprietary, has limited vector search, and does not support multi-tenancy. (Source: Knowledge Base)

How does FalkorDB compare to TigerGraph?

FalkorDB delivers faster latency, better memory efficiency, and flexible horizontal scaling. TigerGraph offers multi-tenancy and vector search but has limited horizontal scaling and moderate memory efficiency. (Source: Knowledge Base)

How does FalkorDB compare to ArangoDB?

FalkorDB demonstrates superior latency and memory efficiency, flexible horizontal scaling, and is rated as fast compared to ArangoDB's poor latency and moderate memory efficiency. (Source: Knowledge Base)

Pricing & Plans

What pricing plans does FalkorDB offer?

FalkorDB offers four pricing plans: FREE (for MVPs with community support), STARTUP (from /1GB/month, includes TLS and automated backups), PRO (from 0/8GB/month, includes cluster deployment and high availability), and ENTERPRISE (custom pricing with VPC, custom backups, and 24/7 support). (Source: Knowledge Base)

What features are included in the FalkorDB PRO plan?

The PRO plan starts from 0/8GB/month and includes advanced features like cluster deployment, high availability, and more. (Source: Knowledge Base)

Support & Implementation

How easy is it to start using FalkorDB?

FalkorDB is built for rapid deployment, enabling teams to go from concept to enterprise-grade solutions in weeks. You can sign up for FalkorDB Cloud, launch a free instance, run locally with Docker, schedule a demo, or access comprehensive documentation. (Source: Knowledge Base)

What support and training options are available for FalkorDB?

FalkorDB provides comprehensive documentation, community support via Discord and GitHub Discussions, solution architects for tailored advice, and free trial/demo options for onboarding. (Source: Knowledge Base)

Customer Proof & Case Studies

Who are some of FalkorDB's customers?

FalkorDB is trusted by AdaptX (healthcare), XR.Voyage (media/entertainment), and Virtuous AI (ethical AI development). Case studies are available on the FalkorDB website. (Source: Knowledge Base)

What industries are represented in FalkorDB's case studies?

Industries include healthcare (AdaptX), media and entertainment (XR.Voyage), and artificial intelligence/ethical AI development (Virtuous AI). (Source: Knowledge Base)

Can you share specific customer success stories using FalkorDB?

AdaptX uses FalkorDB for rapid access to clinical data and SPC charts; XR.Voyage overcame scalability challenges in immersive platforms; Virtuous AI built a high-performance, multi-modal data store for ethical AI. Case studies are linked on the FalkorDB website. (Source: Knowledge Base)

What feedback have customers given about FalkorDB's ease of use?

Customers like AdaptX and 2Arrows have praised FalkorDB's rapid access to complex data and ease of running non-traversal queries, highlighting its user-friendly nature and high-speed capabilities. (Source: Knowledge Base)

Technical Requirements & Implementation

How long does it take to implement FalkorDB?

FalkorDB enables teams to go from concept to enterprise-grade solutions in weeks, not months, making it ideal for organizations seeking rapid deployment. (Source: Knowledge Base)

What deployment options are available for FalkorDB?

FalkorDB offers cloud and on-prem deployment options, supporting flexible integration into diverse environments. (Source: Knowledge Base)

Target Audience & Pain Points

Who is the target audience for FalkorDB?

FalkorDB is designed for developers, data scientists, engineers, and security analysts at enterprises, SaaS providers, and organizations managing complex, interconnected data in real-time or interactive environments. (Source: Knowledge Base)

What pain points does FalkorDB address for customers?

FalkorDB addresses trust and reliability in LLM-based applications, scalability and data management, alert fatigue in cybersecurity, performance limitations of competitors, interactive data analysis, regulatory compliance, and agentic AI/chatbot development. (Source: Knowledge Base)

A Practical Guide to Security Graphs and Cloud Entitlements

A Practical Guide to Security Graphs and Cloud Entitlements

Highlights

Why Security Needs Graph Thinking

If you’re working in IT or security today, you already know the landscape is anything but simple. Every user is tied to roles, which link to groups, which inherit permissions across resources that may be scattered across multiple clouds. Additionally, the number of users, cloud resources, permissions, and policies seems to grow every week, and everything is connected in ways that are hard to keep track of. In most cases, this is managed using multiple cloud IAM dashboards. However, even though IAM dashboards can show direct permissions, they rarely expose the indirect chains of access that attackers look for.  This makes cloud security fairly challenging to manage, especially as the number of users grows.

That’s where security graphs come in. Instead of trying to force all those relationships into rows and columns, a security graph lets you map users, resources, roles, and policies as nodes, and shows how they’re all connected. Suddenly, the big questions get a lot easier to answer, like:

  • Who can (even indirectly) get into a sensitive resource?
  • Which outside systems does this service depend on?
  • Are there users with more access than they should really have?

 

To make this work in practice, you need a database that can handle complex, fast-changing relationships without slowing you down. That’s where FalkorDB comes in. It’s designed for speed, scale, and ease of use, so you can analyze your security environment in real time, no matter how large or complicated things get.

What you’ll get from this article:

  • What a security graph actually is (with examples)
  • Why graphs are better than old-school databases for this kind of work
  • How you can set up a security graph yourself (using FalkorDB)
  • How we chose what to model and why
  • Real-world use cases, and where to go from here

By the end, you’ll know what security graphs can do for you, and have a clear starting point for building one that works for your own environment.

Inside a Security Graph: Nodes, Edges, and Metadata

A security graph is a data model built to capture the tangled, real-world relationships between users, roles, permissions, policies, resources, and activities, all as a connected network of nodes and edges.

Here’s how it works:

  • Nodes stand for security-relevant entities like users, roles, policies, resources, or permissions.
  • Edges (relationships) show how these entities are linked; for example: who grants what, who belongs to which group, which policy applies, or what activity was logged.
  • Properties can be added to nodes and edges to capture extra details, such as timestamps, severity, or permission levels.

A simple example:

  • Node: User: Alice
  • Node: Resource: Database1
  • Edge: (Alice) —[HAS_ACCESS {method: “IAM”}]→ (Database1)

With a structure like this, you can answer tough questions in milliseconds, such as:

  • Does Alice have direct or indirect (transitive) access to Database1?
  • Which high-risk policies are active on production systems?

Security graphs make it possible to see and query these relationships instantly, even as your environment grows and changes.

Sample Ontology

“Graphs can turn your tangled security data into a living, interactive map, making it possible to spot risks and answer tough questions in real time.” Roi Lipman, CTO, FalkorDB

Why Use a Graph for Your Organization's Security?

Traditional databases, whether SQL or NoSQL, organize information into rows, columns, or key-value pairs. That works fine for simple, flat, or strictly hierarchical data. But security data rarely fits into neat boxes. In real-world environments, you’re dealing with:

  • Many-to-many relationships (like users with multiple roles, or roles that grant multiple permissions)
  • Deep, indirect connections (such as user → group → role → policy → resource)
  • Constant change (users join, roles shift, resources and permissions are added or removed)

Graph databases are built for this kind of complexity.

  • Relationships are first-class citizens; they don’t need workarounds like JOIN tables.
  • Multi-hop traversals (across even the most nested or indirect links) are fast and efficient.
  • Security teams can finally see the big picture, mapping how users, policies, and resources are actually connected.

Put simply, graphs can turn your tangled security data into a living, interactive map, making it possible to spot risks and answer tough questions in real time.

Security Graphs comparison with traditional databases

Why Graph Databases Power Security Systems

When you’re building or querying a security graph, you’re dealing with entities and relationships — how users map to roles, policies connect to resources, and how access flows across complex paths. A graph database like FalkorDB is built for exactly this kind of data.

What Sets FalkorDB Apart

  • Sparse Matrix + Linear Algebra Engine
    FalkorDB represents the graph internally as sparse matrices and uses linear algebra operations for querying. This architecture enables ultra-fast, scalable traversals across millions of nodes and edges with minimal memory overhead – ideal for identifying indirect access paths or privilege escalation scenarios.
  • OpenCypher Support with Optimizations
    FalkorDB implements the standard OpenCypher query language (plus a few proprietary extensions), making it intuitive for security teams familiar with graph queries. It includes commands like GRAPH.PROFILE and GRAPH.EXPLAIN to debug query plans and optimize performance in real-world environments.
  • In-Memory Performance with Persistence
    FalkorDB runs in memory but persists data to disk, giving you real-time query performance without sacrificing durability. This combination is essential for scenarios like entitlement analysis or lateral-movement detection, where every millisecond counts.
  • Multi‑Tenancy at Enterprise Scale
    FalkorDB supports co-located multiple graphs (tenants) within a single instance. Each environment remains fully isolated for security and governance, while sharing the same infrastructure for efficiency.
  • Rich Graph Analytics & Built‑In Algorithms
    Beyond simple queries, FalkorDB offers graph algorithms like label propagation (CDLP), betweenness centrality, weakly connected components (WCC), and shortest path analysis — enabling threat and lateral-movement detection directly in-database.

Why Relational or NoSQL Databases Fall Short

  • Schema rigidity and JOIN Pain
    SQL/NoSQL databases handle relationships via join tables or embedded documents — a cumbersome and often inefficient approach when dealing with access graphs that change rapidly or require multiple hops to trace.
  • Complexity Escalates Quickly
    Building systems to answer questions like “Which users could indirectly access this resource?” requires multi-level joins and deep subqueries, often leading to poor performance, convoluted queries, and missed insight.
  • Limited Graph Reasoning Capabilities
    Even if relational systems support some graph-like querying, they lack native support for graph analytics (like shortest-path or centrality) — making them challenging to build algorithms where graph reasoning is required.

What This Means for Security Use Cases

  • Access Path Analysis
    Security teams can rapidly determine whether a user has direct or indirect access to a resource, even across deep chains (e.g., User → Group → Role → Policy → Resource).
  • Least Privilege Auditing
    You can quickly flag over-permissioned identities or unused roles and simplify entitlement reviews through graph traversals.
  • Threat Detection & Lateral Movement
    Built-in path and community algorithms help model attacker movement potential, detect suspicious privilege escalation paths, and visualize risk relationships.

Security Graph Use Cases

Security graphs deliver real results across a range of modern security challenges. With a graph database like FalkorDB, organizations can move from static reports and scattered spreadsheets to living, queryable maps of their security landscape. Here’s how security teams are using security graphs in practice:

Cloud Infrastructure Entitlement Management (CIEM)

Cloud environments grow fast and change constantly. It’s easy to lose track of which users, roles, and services have access to what. Identity sprawl, excessive permissions, and inherited access can put your entire organization at risk.

A security graph makes cloud entitlements fully visible by mapping relationships between cloud users, groups, roles, and resources in real time. With a system built using graph databases, you can:

  • Find users with excessive or outdated permissions
  • Pinpoint unused roles and clean up over-provisioning
  • Enforce least privilege policies with simple, expressive graph queries

Result: Audits are easier, compliance gets smoother, and risk drops dramatically.

Cloud Security Posture Management (CSPM)

CSPM is all about continuous oversight of your cloud environment to spot security gaps, misconfigurations, and policy violations before attackers do.

Security graphs let you visualize the entire infrastructure, including cloud assets, configurations, dependencies, and even risky changes, as a connected, always-up-to-date map. Using FalkorDB:

  • See how resources are interconnected (and where single points of failure may lurk)
  • Surface misconfigurations or assets missing critical controls
  • Automate compliance checks and policy enforcement as your environment evolves

This bird’s-eye view makes it easier to predict, prioritize, and address risks across your cloud footprint.

Identity and Access Management (IAM)

IAM is about understanding the web of relationships between users, groups, roles, and the resources they touch. These relationships are inherently a graph problem.

With a security graph, you can:

  • Map every user, group, and role, and see their access paths
  • Detect risky privilege combinations or role overlaps (“toxic combinations”)
  • Trace and review who can access sensitive resources, directly or indirectly

You can use FalkorDB to build a security graph of your system, that helps security teams review access, catch anomalies, and keep permissions lean and well-audited.

Threat Detection and Lateral Movement Analysis

Attackers rarely go straight for the prize: they move laterally, exploiting weak links and privilege escalation opportunities. Traditional tools struggle to map these potential attack paths in a changing, interconnected environment.

Modeling your infrastructure as a graph makes it possible to:

  • Identify all possible paths an attacker could take from initial access to sensitive systems
  • Simulate breach scenarios and visualize privilege escalation risks
  • Spot and remediate the weakest links before they’re exploited

FalkorDB’s high-speed graph traversal and analytics help you build security systems that can allow for proactive defense, helping you outthink attackers, not just react to them.

Benefits of FalkorDB for Security Graphs

Unmatched Real-Time Performance

FalkorDB is a graph database where the graph architecture is designed as a sparse-matrix with linear-algebra engine, delivering ultra-fast responses, even under large-scale production workloads. Benchmark tests show p99 latency up to 496× faster than Neo4j, making FalkorDB ideal for security operations that demand split-second access reviews, entitlement checks, and lateral movement tracing.

Memory-Efficient and Transparent

Features like string interning help deduplicate repeated metadata, keeping memory use lean in graphs with millions of users, roles, and resources. The GRAPH.MEMORY USAGE command provides a detailed breakdown of memory consumption by nodes, edges, and indices, supporting fine-grained performance tuning and easy capacity planning.

True Multi-Tenancy by Design

FalkorDB supports multiple fully isolated graphs (“tenants”) within a single instance, enabling organizations or SaaS platforms to separate environments or keep customer datasets isolated, which is essential for MSSPs, regulated industries, and complex enterprise orgs.

Scales with Your Data

Whether your environment is doubling every quarter or changing minute-by-minute, FalkorDB is designed for high-velocity, ever-evolving security data. Features like robust array indexing, configurable query memory limits, and rapid ingestion allow it to handle permission and resource churn without missing a beat.

Advanced Graph Algorithms

FalkorDB includes production-ready algorithms for label propagation (CDLP), weakly connected components (WCC), and betweenness centrality, letting security teams:

  • Detect user/resource communities
  • Find potential attack pivots or privilege escalation points
  • Simulate breaches and automate exposure scoring—all without exporting data

FAQ

What are security graphs in cloud environments?

Security graphs model entities as nodes (users, roles, resources) and relationships as edges (assignments, policies), allowing queries to reveal direct and transitive access paths for entitlements management in AWS or GCP setups.

They map lateral movement risks via shortest-path algorithms and community detection, simulating attacker pivots from initial breaches to critical assets, with FalkorDB enabling real-time analysis of privilege escalation chains.

FalkorDB offers linear-algebra optimizations for scalable traversals, multi-tenancy for isolated graphs, and built-in algorithms like betweenness centrality, making it ideal for high-velocity security data in enterprise IAM.

References and citations

  1.