Skip Navigation
Get a Demo
 

Our AI agents are transforming SecOps

Benefit from agentic AI in your security program today

99% noise reduction

3 min AI agent investigations

↓60% triage + notification time

Threat hunting recommendations

Generates threat hunting recommendations based on analyzed security incidents.

Potential threat escalation analysis

Analyzes threat data to determine how highly to prioritize the alert.

Identity - CrowdStrike Falcon Identity

Investigate and triage identity-based security alerts from the Falcon Identity Protection platform.

Identity - Microsoft Entra Identity Protection

Investigate and triage alerts from Microsoft Entra Identity Protection.

Identity - Microsoft Cloud App Security

Investigate and triage identity security alerts from Microsoft Cloud App Security.

Identity - Okta Workforce Identity

Investigate and triage security alerts from Okta Workforce Identity.

Identity - Cisco Duo

Investigate and triage security alerts from Cisco Duo Trust Monitor.

Identity - Red Canary Identity Engine

Investigate and triage identity events from Red Canary’s detection engine.

Cloud - AWS GuardDuty

Investigate and triage security alerts from AWS GuardDuty.

Endpoint - Microsoft Defender for Endpoint

Investigate and triage security alerts from Microsoft Defender for Endpoint.

Endpoint - CrowdStrike Falcon Endpoint Security

Investigates and triages CrowdStrike Falcon endpoint alerts.

Endpoint - SentinelOne

Investigate and triage security alerts from SentinelOne Singularity Platform.

Endpoint - Palo Alto Cortex XDR

Investigate and triage security alerts from Cortex XDR.

Endpoint - Red Canary Endpoint Engine

Investigate and triage EDR events from Red Canary’s detection engine.

SIEM - Microsoft Sentinel

Investigate and triage security alerts from Microsoft Sentinel.

Endpoint & identity - Wiz

Investigates and triages Wiz security alerts across both endpoint (WIZ_SENSOR) and identity-based threat detections.

User baselining & analysis

Analyze login patterns over a 30-day period, identify anomalies, and generate concise reports.

Threat review & agentic tuning

Consults your organizational preferences and security context to recommend whether an alert should be suppressed.

Email analysis

Analyzes emails and attachments to generate comprehensive reports and analysis.

Phish identification

Identify phishing emails and provide comprehensive reports.

Event & threat analysis

Provide summaries, recommendations, and narratives about a threat to aid understanding and response.

Threat response recommendations

Provides prioritized remediation guidance for containment, eradication, and hardening directly in the threat timeline.

Alert analysis

Analyzes security alerts, enriches them with context, and routes them to specialized platform-specific agents.

Notes & annotations

Add context to threat timelines related to user activity vs typical baseline behavior.

Intelligence insights

Provide detailed threat intelligence context for ongoing security investigations, including profiles.

Platform & tool assistance

Provide knowledge to SOC personnel regarding Red Canary products and copilot features.

Alert summary

Analyzes security alerts from various platforms and generates structured summaries and recommendations.

Customization review

Reviews user-provided tuning instructions and provides feedback on whether they need changes before being implemented.

Suppression explanation

Generates a concise explanation comment for why a security alert was considered non-malicious.

Hardening recommendations

Generates system hardening recommendations based on threat indicators.

Threat summary generation

Generates concise 1-3 sentence threat summaries from cybersecurity incident data.

Reporting coordination

Coordinates sub-agents to produce comprehensive threat reporting.

Supported Integrations

Red Canary AI agents dynamically interact with data and systems to execute a specific job based on real-time inputs and context.

Powered by AI models like LLM, these agents adapt their behavior based on tasking – a massive upgrade from rigid automated workflows.

What is an AI Agent Infographic

Red Canary’s AI agents and experts deliver SecOps excellence at machine speed

How our AI Agents are different infographic

Red Canary AI agents are different:

Most AI agents chase breadth at the expense of reliability. Red Canary’s AI agents are specialized, focusing on a narrow set of tasks that they perform flawlessly.

  1. Imbued with a decade+ of real-world security operations experience
  2. Guided by narrowly-scoped, expert-crafted standard operating procedures
  3. Managed and tuned by elite human operators
  4. Continuously optimized with feedback and new intelligence

Red Canary’s AI agents have contributed to 2.5+ investigations and counting.

Investigation agents

  • Alert enrichment agent: Contextualizes alert details with threat intelligence and recent user and endpoint activity
  • Authentication research agent: Assesses recent authentication attempts, protocol use, and application context
  • Reputation analysis agent: Analyzes IP, URL, ISP prevalence, VPN/TOR usage, and geography
  • Device compliance agent: Examines adherence to policies, enrollment details, and suspicious user agents in sessions

Email triage agent

  • Enrich and evaluate email content and metadata against phishing indicators to assess likelihood of phish

Intelligence agent

  • Retrieves comprehensive profiles for known threats and suspicious indicators on-demand

Threat analysis agent

  • Summarizes, recommends actions, and narrates to aid in understanding and containment of threats

User behavior agents

  • User activities agent: Retrieve and enrich identity telemetry to contextualize login activity
  • User baseline agent: Compares real-time behavior to historical patterns and escalates suspicious anomalies

Identity threat detection agents

  • Crowdstrike Falcon Identity
    Investigate and triage identity-based security alerts from the Falcon Identity Protection platform.
  • Microsoft Entra Identity Protection
    Investigate and triage alerts from Microsoft Entra Identity Protection.
  • Microsoft Cloud App Security
    Investigate and triage identity security alerts from Microsoft Cloud App Security.
  • Okta Workforce Identity
    Investigate and triage security alerts from Okta Workforce Identity.
  • User Baselining & Analysis
    Analyze login patterns over a 30-day period, identifies anomalies, and generates concise reports
  • Cisco Duo
    Investigate and triage security alerts from Cisco Duo Trust Monitor.

Cloud & SIEM threat detection agents

  • Cloud – AWS GuardDuty
    Investigate and triage security alerts from AWS GuardDuty
  • Cloud- Microsoft Defender for Endpoint
    Investigate and triage security alerts from Microsoft Defender for Endpoint.
  • Cloud – SentinelOne
    Investigate and triage security alerts from SentinelOne Singularity Platform
  • Cloud – Red Canary MDR for Endpoints
    Investigate and triage security alerts from SentinelOne Singularity Platform
  • SIEM – Microsoft Sentinel
    Investigate and triage security alerts from Microsoft Sentinel.

Detection Engineering / SOC Analyst agents

  • Threat Analysis
    Provide summaries, recommendations, and narratives about a threat to aid understanding and response.
  • Notes & Annotations
    Add context to threat timelines related to user activity vs typical baseline behavior.
  • Intelligence Insights
    Provide detailed threat intelligence context for ongoing security investigations, including profiles.
  • Platform & Tool Assistance
    Provide knowledge to SOC personnel regarding Red Canary products and Copilot features
  • Email Triage Agent
    Assess likelihood of email being a phish or not a phish, and provide a reason why.

Incident response agent

  • Response & Remediation
    Provide actionable plans for containment, eradication, hardening, and escalation risks.

Intelligence agent

  • Intelligence Insights
    Provide detailed threat intelligence context for ongoing security investigations, including profiles.

Agentic Tuning

Filter out highly specific and difficult-to-tune alerts with a few plain-language sentences.

Learn More
Agentic Tuning screenshot

Specialized AI agents

Specialization makes each agent reliable and highly-skilled.

Learn More

Agent visibility

See exactly what your AI agents are doing and why.

Coming Soon

Agentic visibility historical context screenshot

FAQs

How can I access these AI agents?

+

Red Canary MDR customers already have expert AI agents working on their behalf. We are actively exploring pricing and packaging models, alongside MCP server options, for future customers looking to access these AI agents directly.

What data was used to train these AI agents?

+

Our AI agents are trained on 11+ years and counting of high-fidelity threat detection, investigation, and incident response data and industry-leading security operations workflows. The richness and reliability of the training data is what contributes to a 99.7% threat accuracy rating and rapid responses times when they collaborate with our human experts.

How do you ensure the privacy of my data?

+

Data utilized by our AI agents never leaves Red Canary controlled infrastructure for processing, storage, training or any other reason. Your data is (1) not available to other customers, (2) not available to third parties, (3) not used to train external AI models, and (4) not used to improve any third-party products or services. The underlying AI models do not interact with other external services, such as ChatGPT.

How does Red Canary get feedback on AI agent performance?

+

We solicit customer feedback–’thumbs up, thumbs down’ on outputs–in our product and manually review all off-target feedback. We also continuously measure the impact of AI agents on our accuracy, completeness, and timeliness of threat notifications. We only use AI agents to the extent that they benefit our overall performance for our customers.

How do you ensure the outputs of your AI agents can be trusted?

+

We validate trustworthiness of AI agent performance via extensive functional testing in which all outputs that vary beyond 10% of our ideal output are manually inspected. And as mentioned in the prior question, we continuously measure the impact of AI agents on our accuracy, completeness, and timeliness of threat notifications. We only use AI agents to the extent that they benefit our overall performance for our customers.

Security gaps? We got you.

Sign up for our monthly email newsletter for expert insights on MDR, threat intel, and security ops—straight to your inbox.


 
 
Back to Top