PRESS RELEASE. DENVER, March 5, 2024 - Red Canary today announced full coverage of its detection and response capabilities to include all major cloud infrastructure and platform services providers, such as Amazon Web Services, Microsoft Azure, and Google Cloud Platform.
Red Canary can detect suspicious activity across all major cloud environments and seamlessly correlate that data with other leading cloud security products, enabling enterprises to find and stop threats before they can cause damage.
Red Canary's vendor-agnostic approach underpins these new capabilities, providing security teams with actionable threat intelligence and comprehensive visibility from the control plane to containers and workloads.
Security teams rely on various tools, but integrating them internally for threat detection and response can be challenging, especially in large organizations with multicloud environments.
Recent research shows that many businesses are currently using or planning to use at least two cloud infrastructure providers and about 31 percent are using four or more.
As a result, IT and security teams are facing an increasing number of new cloud threats.
In 2023, Red Canary detected cloud account compromises 16 times more frequently than in 2022, ranking it among the top five MITRE ATT&CK techniques analyzed across 58,000 confirmed threats identified in 216 petabytes of telemetry.
With Red Canary, organizations can protect their cloud environments, identities, and endpoints, all using a single, intelligence-led security operations platform.
By trusting Red Canary to detect and respond to prevalent threats, internal security teams can have more time to focus on their business's specific security needs and requirements.
Defend complex environments and streamline workflows with comprehensive detection and response coverage across all major cloud providers.
Actionable threat intelligence: 400+ updated threat profiles provide deep insights into cloud threats and how adversaries operate in cloud environments.
Run more effective tabletops: New scenarios allow customers to confidently understand, prepare for, and effectively respond to prevalent and emerging threats.
Enhance threat protection across containers and production environments.
Additional support for containers and Kubernetes: Improved metadata collection adds new insights for Linux-based environments empowering security analysts to quickly locate threat origins.
Enrich threat data with identified risks and misconfigurations.
Deeper integrations with cloud security posture management tools: Correlated alert data from vendors like Lacework and Wiz provides additional context that speeds up threat detection and response, and optimizes prevention efforts.
Co-managed Microsoft Sentinel engagement: Expanded services to deploy and optimize SIEM technology include a security goals consultation along with analytics, threat hunting queries, automation playbooks, and dashboards to maximize SIEM value.
Support for Google Cloud Platform is currently in early access and expected to be generally available in Q2 of this fiscal year.
Register now for the webinar unveiling the 2024 Threat Detection Report on March 13.
As the security ally for nearly 1,000 organizations, we provide MDR across our customers' cloud workloads, identities, SaaS applications, networks, and endpoints.
This Cyber News was published on www.darkreading.com. Publication date: Thu, 14 Mar 2024 21:45:08 +0000