

Around 7.5 percent of them converted into confirmed threats (72,592 confirmed to be part of malicious activity). Red Canary analysts have investigated each of the 969,565 potentially threatening events.

Investigation: Because Red Canary does not want to burden customers with false positives, its solution includes analyst investigations of potentially threatening events.In the past 10 months, Red Canary claims to have detected 969,565 potentially threatening events. Detection: Red Canary uses multiple detection technologies to analyze every endpoint event: application behavioral analysis, user behavior analytics, threat intelligence, binary analysis and intelligence customers provide about their organizational policies.That means for a typical Red Canary customer with 1,000 endpoints, Red Canary collects 150,000,000 events per day An average endpoint produces about 150,000 events/day. Collection: Red Canary uses the EDR sensor Carbon Black to collect event information from every endpoint across a customer’s environment.Some details on the specific product offerings: What is the Red Canary offering all about? The product covers the security lifecycle of data collection, detection of risks, investigation and response. And the load on security solutions and professionals isn't decreasing-the AV-TEST Institute registers over 550,000 new malicious programs every day. At the same time, research firm Frost & Sullivan estimate the shortfall in the global information security workforce to reach 1.5 million by 2020. Gartner found that the average time it takes an organization to detect a breach is 205 days. Research suggests that this is a very real problem to resolve. Red Canary's raison d'être is to assemble these different tools into a single, cohesive offering. Covering all of those basics requires multiple tools, but-and this is the important thing-those tools are generally better with a degree of human decision making and expertise alongside them. Organizations need a multi-layered approach that covers monitoring and investigation of suspected threats and response to those threats. As such, simply installing a tool and expecting it will protect the organization is naive.Īt the same time, however, all but the largest of organizations lack the resources to be able to effectively detect and respond to threats. All of these companies contend that cyber threats are bypassing existing tools. Instead of simply trying to productize security response with a monolithic endpoint product, these players take a "best of both worlds" approach, combining human experts with powerful machine learning security software.
