Red Canary Managed Detection and Response

Request a demo to learn more

Red Canary includes the technology, process, and expertise to detect attacks and stop breaches without burdening your security teams:

Red Canary Collects All Endpoint Activity


Endpoint Sensors

Visibility into activity across your organization is foundational to threat detection and response. Red Canary uses Carbon Black’s market leading lightweight sensor to continuously record the activity on your laptops, workstations, and servers – including network connections to and from your systems.

Quickly deploy using SCCM, GPO, Casper and other deployment tools in a matter of minutes with no reboot or user interaction required.

Monitoring & Management

True endpoint security requires a significant amount of infrastructure and support. Your team should not be spending time checking server health, patching software, and monitoring performance.

Red Canary’s fully hosted and managed solution removes all infrastructure and engineering burdens from your team.

The Detection Engine Hunts for Potential Threats


Application Behavioral Analysis

An attacker must take several actions in order to accomplish their objective. Red Canary hunts for hundreds of different patterns of behaviors including:

  • Execution from abnormal filesystem locations
  • Modification of user accounts
  • Network connections to newly registered domains
  • Execution of a recently signed binary
  • Hiding processes from a logged-in user
  • …and an ever growing list of hundreds more

User Behavior Analytics

Red Canary builds and continuously updates a baseline of your environment. Every process execution is compared with the baseline to identify unusual activity such as user activity on new endpoints or at abnormal times of day.

Threat Intelligence

MD5s, IP addresses, domains, and more are checked against intelligence from threat intelligence sources for potential matches. This includes cross referencing the entire Red Canary IOC database from historical threats detected across our customers.

Threat Research

Red Canary’s Threat Research Team and Security Operations Center constantly evaluate and improve detection coverage against the newest attacker tactics and techniques.

Malware analysis and teardowns using static analysis and sandbox execution is commonly used to determine the tactics, techniques, and procedures used by the latest attackers. Everything we learn results in new techniques for detection.

Red Canary SOC Investigates Potential Threats


Investigative Tools

Once a potential threat has been identified, a fast and comprehensive triage is essential. Event correlation and enrichment help Red Canary Threat Analysts determine the legitimacy of the threat and its severity.

Tuning and Feedback

As a byproduct of the Threat Analyst triage, the Red Canary Analysis Platform collects feedback on suppression, threat scoring, and detection fidelity. Every decision a Red Canary analyst makes teaches the Detection Engine to be more accurate and efficient.

Threat Analysts and Forensicators

Red Canary Threat Analysts investigate every potential threat surfaced by the detection technology. Analysts have a deep understanding of application and process behaviors across various operating systems and how threats manifest themselves on your endpoints.

You Respond with Power


Intelligence and Response Tooling

When you receive a threat detection from Red Canary, you know it has been triaged by a human and requires immediate action. Red Canary comes with the intelligence and tools you need to respond to any threat on your endpoint.


Red Canary’s open API easily supports integration across your existing security tools. Your Technical Account Manager ensures that Red Canary threat detections and endpoint telemetry are properly integrated into your security.

Technical Account Management

Red Canary Account Managers are an extension of your team. They support your incident response efforts by answering questions about detections and can provide guidance on remediation. Your first experience is reviewing the baseline of your environment and integrating Red Canary with your existing security tools.

Best of all, every Red Canary Account Manager has real-world security experience.

Start securing your endpoints today