Skip Navigation
Get a Demo
 
 
 
 
 
 
 
 
 
Resources Blog Microsoft

Microsoft recognizes Red Canary with its Security Trailblazer award

Red Canary awarded for innovating with Microsoft security tools

Cordell BaanHofman
Originally published . Last modified .

We are thrilled to announce that Microsoft recognized Red Canary as the winner of its Security Trailblazer Award at its Security Excellence Awards. Nominees were partners that are:

“outstanding leaders in accelerating customers’ efforts to mitigate cybersecurity threats and that have developed innovative solutions or services that leverage Microsoft Security products.”

We’re proud to win this award, as it reflects the strength of our MDR for Microsoft offering. We take a different approach to MDR using Microsoft technologies: we analyze not only alerts from Microsoft endpoint, identity, email, and other tools, but we also apply behavior-based detections to raw Microsoft telemetry. As an example, we’ve recently detailed a way that we detect email account compromise using Office 365 telemetry. The result of our approach is that we discover more threats than these tools alone discover; for instance, we detect on average ~3.8x more threats by analyzing Microsoft endpoint telemetry than Defender for Endpoint alone detects.

The award also reflects our innovative approach to threat response: we offer both automated threat response capabilities and hands-on-keyboard remediation support. More specifically, with Active Remediation our security experts respond to and remediate threats on your behalf across your endpoints as soon as we detect a threat.

We look forward to our continued collaboration with Microsoft and to serving our joint customers. To check out Microsoft-focused case studies, podcasts, ROI guides, and more, check out our MDR for Microsoft page. You can also schedule a demo to see Red Canary in action.

 

Red Canary brings MDR expertise to Microsoft Azure Cloud

 

How Red Canary supports Microsoft customers

 

When MFA isn’t an option: The legacy of ROPC

 

Investigating legacy authentication: The curious case of “BAV2ROPC”

Subscribe to our blog

 
 
Back to Top