Visibility into activity across your organization is foundational to threat detection and response. Red Canary uses Carbon Black’s market leading lightweight sensor to continuously record the activity on your laptops, workstations, and servers – including network connections to and from your systems.
Quickly deploy using SCCM, GPO, Casper and other deployment tools in a matter of minutes with no reboot or user interaction required.
Monitoring & Management
True endpoint security requires a significant amount of infrastructure and support. Your team should not be spending time checking server health, patching software, and monitoring performance.
Red Canary’s fully hosted and managed solution removes all infrastructure and engineering burdens from your team.
The Detection Engine Hunts for Potential Threats
Application Behavioral Analysis
An attacker must take several actions in order to accomplish their objective. Red Canary hunts for hundreds of different patterns of behaviors including:
Execution from abnormal filesystem locations
Modification of user accounts
Network connections to newly registered domains
Execution of a recently signed binary
Hiding processes from a logged-in user
…and an ever growing list of hundreds more
User Behavior Analytics
Red Canary builds and continuously updates a baseline of your environment. Every process execution is compared with the baseline to identify unusual activity such as user activity on new endpoints or at abnormal times of day.
MD5s, IP addresses, domains, and more are checked against intelligence from threat intelligence sources for potential matches. This includes cross referencing the entire Red Canary IOC database from historical threats detected across our customers.
Red Canary’s Threat Research Team and Security Operations Center constantly evaluate and improve detection coverage against the newest attacker tactics and techniques.
Malware analysis and teardowns using static analysis and sandbox execution is commonly used to determine the tactics, techniques, and procedures used by the latest attackers. Everything we learn results in new techniques for detection.
Red Canary SOC Investigates Potential Threats
Once a potential threat has been identified, a fast and comprehensive triage is essential. Event correlation and enrichment help Red Canary Threat Analysts determine the legitimacy of the threat and its severity.
Tuning and Feedback
As a byproduct of the Threat Analyst triage, the Red Canary Analysis Platform collects feedback on suppression, threat scoring, and detection fidelity. Every decision a Red Canary analyst makes teaches the Detection Engine to be more accurate and efficient.
Threat Analysts and Forensicators
Red Canary Threat Analysts investigate every potential threat surfaced by the detection technology. Analysts have a deep understanding of application and process behaviors across various operating systems and how threats manifest themselves on your endpoints.
You Respond with Power
Intelligence and Response Tooling
When you receive a threat detection from Red Canary, you know it has been triaged by a human and requires immediate action. Red Canary comes with the intelligence and tools you need to respond to any threat on your endpoint.
Red Canary’s open API easily supports integration across your existing security tools. Your Technical Account Manager ensures that Red Canary threat detections and endpoint telemetry are properly integrated into your security.
Technical Account Management
Red Canary Account Managers are an extension of your team. They support your incident response efforts by answering questions about detections and can provide guidance on remediation. Your first experience is reviewing the baseline of your environment and integrating Red Canary with your existing security tools.
Best of all, every Red Canary Account Manager has real-world security experience.