Red Canary is excited to announce new integrations and capabilities that broaden the scope of Red Canary MDR. We’ve deepened our integrations with the following leading security tools:
ExtraHop Reveal(x) 360 and Reveal(x) Enterprise
Red Canary now investigates alerts from both ExtraHop Reveal(x) 360 and Reveal(x) Enterprise. ExtraHop’s leading NDR software gives customers unparalleled visibility into traffic–even if it’s encrypted–in their environment; the network intelligence ExtraHop generates extends security coverage to assets, like IoT devices, that can’t be covered by traditional endpoint sensors. Our integration with ExtraHop allows us to monitor for threats, reduce alert fatigue, and give customers back time and peace of mind.
Microsoft Defender for Cloud Apps
Red Canary now investigates alerts from Microsoft Defender for Cloud Apps, a Cloud Access Security Broker (CASB) that supports various deployment modes including log collection, API connectors, and reverse proxy. It provides rich visibility, control over data travel, and sophisticated analytics to identify and combat cyberthreats across all your Microsoft and third-party cloud services. Red Canary’s coverage of your critical SaaS applications now applies to any products you integrate with Defender for Cloud Apps: just connect it to Red Canary and we will review all alerts from products like Slack, Box, WebEx, etc. that you send to Defender for Cloud Apps.
Red Canary now supports integration with Cisco Meraki to ingest and investigate alert data. As a Cloud Network Management solution, Meraki Cloud provides a single point to manage the Meraki ecosystem of network devices including firewalls, routers and switches, wireless access points, as well as cameras and IoT devices. Red Canary will integrate directly with the Cisco Meraki cloud dashboard to ingest security-relevant alerts from your Meraki network devices and will analyze and correlate that data across your other security tools to help identify and respond to threats.