Listing Thumbnail

    Rad Security

     Info
    Deployed on AWS
    Rad Security extends the Kubernetes API event stream to continuously surface, prevent and remediate the most significant security issues.

    Overview

    RAD Security is a cloud native security company that empowers engineering and security teams to push boundaries, build technology and drive innovation so they can focus on growth versus security problems. In sharp contrast to one-size-fits-all, legacy CWPP and container detection and response solutions, RAD takes a custom, behavioral approach to cloud native detection and response that can counter evolving threats while sharpening inputs into shift-left and posture management.

    RAD Security creates behavioral fingerprints of your unique good behavior to eliminate zero day attacks, apply zero trust principles, and verify your posture in real-time.

    Highlights

    • Discover real time event-based misconfiguration that update as fast as your Kubernetes environment changes.
    • Aggregate and easily find over-permissions in Kubernetes RBAC.
    • Proactively reduce your potential blast radius by preventing deployment of non-compliant workloads.

    Details

    Categories

    Delivery method

    Deployed on AWS
    New

    Introducing multi-product solutions

    You can now purchase comprehensive solutions tailored to use cases and industries.

    Multi-product solutions

    Features and programs

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Pricing is based on the duration and terms of your contract with the vendor. This entitles you to a specified quantity of use for the contract duration. If you choose not to renew or replace your contract before it ends, access to these entitlements will expire.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    12-month contract (1)

     Info
    Dimension
    Description
    Cost/12 months
    Annual Commit
    Annual commitment fee based on number of kubernetes nodes, starting at
    $25,000.00

    Vendor refund policy

    All fees are non-cancellable and non-refundable except as required by law.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Resources

    Vendor resources

    Support

    Vendor support

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly
    By Rad Security
    By Uptycs

    Accolades

     Info
    Top
    25
    In Data Analytics

    Customer reviews

     Info
    Sentiment is AI generated from actual customer reviews on AWS and G2
    Reviews
    Functionality
    Ease of use
    Customer service
    Cost effectiveness
    0 reviews
    Insufficient data
    Insufficient data
    Insufficient data
    Insufficient data
    2 reviews
    Insufficient data
    Insufficient data
    Insufficient data
    Insufficient data
    13 reviews
    Insufficient data
    Positive reviews
    Mixed reviews
    Negative reviews

    Overview

     Info
    AI generated from product descriptions
    Kubernetes API Event Streaming
    Extends the Kubernetes API event stream to continuously surface, prevent and remediate security issues in real-time.
    Behavioral Fingerprinting
    Creates behavioral fingerprints of unique good behavior to eliminate zero day attacks and apply zero trust principles.
    Real-time Misconfiguration Detection
    Discovers real-time event-based misconfiguration that updates as fast as the Kubernetes environment changes.
    RBAC Over-permission Analysis
    Aggregates and identifies over-permissions in Kubernetes RBAC for access control optimization.
    Workload Compliance Prevention
    Prevents deployment of non-compliant workloads to proactively reduce potential blast radius.
    Advanced Threat Detection
    Correlates individual events using machine-learning algorithms and contextual attack storylines to detect potential attacks such as data theft, crypto mining, and service violations.
    Agentless Architecture
    Provides agentless, cloud-native solution for comprehensive protection of AWS assets without requiring agent installation on workloads.
    Permission Analysis and Hardening
    Detects excessive permissions of users and roles by analyzing the gap between granted and used permissions and provides smart hardening recommendations to reduce attack surface.
    Multi-Plane Coverage
    Covers both data plane and control plane to enable protection of individual assets while considering overall account context across users, communication, machines, databases, storage, and AWS services.
    Automated Threat Remediation
    Provides built-in automated remediation measures to address suspicious behavior upon detection without manual intervention delays.
    Multi-Cloud and Workload Coverage
    Supports deployment across more than 40 AWS services including compute, containers, storage, databases, networking, developer tools, management and governance, analytics, security, application integration, end user computing, machine learning, and migration services. Extends coverage to public and private cloud, Kubernetes, rare Linux distros, IBM LinuxONE, Linux on Z, IBM Power, AIX, and HPC environments.
    Unified Security Data Platform
    Consolidates cloud security into a single console with unified policy framework and data lake. Normalizes security telemetry close to collection point and streams into detection cloud for queryable attack surface analysis without ETL requirements.
    Full Lifecycle Application Protection
    Provides end-to-end protection including malware and suspicious behavior detection on developer endpoints, vulnerability identification in build process, secure configuration verification, runtime monitoring, exposure scanning, full attack path analysis, anomaly and behavior-based threat detection, Infrastructure as Code misconfigurations identification, and Identity Threat Detection and Response (ITDR) capabilities.
    Agentless and Agent-Based Detection
    Offers instant-on agentless coverage with optional osquery-based agent utilizing eBPF technology for runtime protection, advanced remediation, and forensics. Agent designed to minimize memory, CPU, and disk I/O footprint while providing rich security telemetry including file system files, Augeas lens, DNS lookups, sudoers list, and disk encryption data.
    Compliance and Security Standards Support
    Supports CIS benchmarks, HIPAA, ISO 27001, NIST, PCI, and SOC 2 compliance requirements. Includes file integrity monitoring (FIM), vulnerability scanning, security hygiene assessment, cyber asset management, and 13-month historical data lookback for compliance and forensic analysis.

    Security credentials

     Info
    Validated by AWS Marketplace
    FedRAMP
    GDPR
    HIPAA
    ISO/IEC 27001
    PCI DSS
    SOC 2 Type 2
    No security profile
    No security profile
    -
    -
    -
    -
    -

    Contract

     Info
    Standard contract
    No
    No

    Customer reviews

    Ratings and reviews

     Info
    0 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    0%
    0%
    0%
    0%
    0%
    0 reviews
    No customer reviews yet
    Be the first to review this product . We've partnered with PeerSpot to gather customer feedback. You can share your experience by writing or recording a review, or scheduling a call with a PeerSpot analyst.