Listing Thumbnail

    Red Canary Managed Detection and Response

     Info
    Sold by: Red Canary 
    Deployed on AWS
    Vendor Insights
    Red Canary detects and stops threats 24x7 across your endpoints, network, cloud, identities and SaaS applications.

    Overview

    Red Canary gives customers the confidence they need with unmatched, actionable intelligence and 24x7 expert response to stay ahead of adversarial threats. With customer-validated 99% threat detection accuracy, security teams can focus on the threats that matter instead of wasting time on noise. With a combination of actionable threat profiles, intel-driven analytics, and specific response and remediation recommendations, your team can make better decisions and prioritize resources according to the most relevant threats to your organization. Features:

    • 24/7/365 expert investigation of potential threats
    • Advanced threat detection
    • Global threat intelligence team
    • Continuous threat hunting
    • Proactive response and remediation

    Highlights

    • Unmatched threat detection accuracy, Red Canary helps protect your endpoints, network, cloud, identity and SaaS applciations.
    • Actionable threat intelligence with on-demand adversary insights and expert collaboration so you can stay ahead of threats.
    • Guided, automated or human-led 24/7 expert response so you can focus on your business objectives instead of the next cybersecurity event.

    Details

    Delivery method

    Deployed on AWS

    Features and programs

    Vendor Insights

     Info
    Skip the manual risk assessment. Get verified and regularly updated security info on this product with Vendor Insights.
    Security credentials achieved
    (3)

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Red Canary Managed Detection and Response

     Info
    Pricing is based on the duration and terms of your contract with the vendor, and additional usage. You pay upfront or in installments according to your contract terms with the vendor. This entitles you to a specified quantity of use for the contract duration. Usage-based pricing is in effect for overages or additional usage not covered in the contract. These charges are applied on top of the contract price. If you choose not to renew or replace your contract before the contract end date, access to your entitlements will expire.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    12-month contract (4)

     Info
    Dimension
    Description
    Cost/12 months
    Overage cost
    Endpoint
    Computer or instance running Windows, MacOS, or Linux
    $120.00
    Account
    User account
    $100.00
    Resource
    Cloud resource
    $250.00
    Network
    Network coverage
    $20.00

    Vendor refund policy

    No refunds

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Support

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Similar products

    Customer reviews

    Ratings and reviews

     Info
    0 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    0%
    0%
    0%
    0%
    0%
    0 AWS reviews
    |
    113 external reviews
    External reviews are sourced from G2  and are not included in the star rating for this product.
    Hospital & Health Care

    Awesome team, and support.

    Reviewed on Jun 12, 2025
    Review provided by G2
    What do you like best about the product?
    Having the team monitor all data and respond. I like knowing we have a security over watch that is so responsive, and reactive.
    What do you dislike about the product?
    There is nothing I dislike about the team or software.
    What problems is the product solving and how is that benefiting you?
    Monitoring and investigation of events.
    Insurance

    Great core product

    Reviewed on Jun 04, 2025
    Review provided by G2
    What do you like best about the product?
    Red Canary excels at ingesting and correlating telemetry and alerts from our Microsoft Defender suite, combining and deconflicting that data into a single, cohesive threat narrative for a given machine or activity. This correlation capability provides a clearer picture of threats than we get from our other tools and can reduce the time our analysts spend on manual investigation. The platform itself is intuitive and well-designed, making it easy to navigate and use. Additionally, the customer support has been excellent—particularly Annalise and Matthew, who have been responsive and helpful, with Matthew providing deep technical assistance on integrations and automation. Overall, Red Canary adds meaningful value to our security operations.
    What do you dislike about the product?
    While Red Canary offers strong automation capabilities, there are some limitations that impact our ability to fully leverage the platform. One of the main issues is the inconsistency between the GUI, automation platform, and API. For example, when closing out threats, the options available in the automation platform differ from those in the GUI and API—such as missing specific closure reasons like "Internal testing." Additionally, the automation platform only supports "AND" logic in trigger conditions, which makes it difficult to build flexible workflows that share common traits but differ in just one condition. These limitations force us to rely on custom scripts and direct API calls to achieve the functionality we need, rather than managing everything within Red Canary itself.
    What problems is the product solving and how is that benefiting you?
    As the lead of our Breach and Attack Simulation (BAS) Team, my use of Red Canary differs from that of our SOC analysts. I simulate attacks against our network and assets using AttackIQ, and Red Canary plays a critical role in helping me identify and track this activity across our environment. It excels at correlating AttackIQ-generated telemetry with the correct target assets and associated alerts in Microsoft Defender, which is something we struggle to do effectively with other tools. This correlation allows us to validate detection coverage and response workflows more accurately. Additionally, we leverage Red Canary’s automation capabilities to ensure that our simulations don’t overwhelm the SOC or disrupt normal security operations, helping us maintain operational efficiency while testing our defenses.
    Cristian W.

    RC Review by ULT

    Reviewed on Jun 02, 2025
    Review provided by G2
    What do you like best about the product?
    The integrations with other vendors and playbooks.
    What do you dislike about the product?
    Maybe the decommission Endpoint when inactive for days could be incrieased.
    What problems is the product solving and how is that benefiting you?
    The infected devices are isolated due the playbooks triggers.
    Hospital & Health Care

    Satisfied Customer!

    Reviewed on May 30, 2025
    Review provided by G2
    What do you like best about the product?
    I provide cyber support for a healthcare organization. There are times where I need additional support whether it be in investigating an alert from our EDR or a technical question regarding the Red Canary web portal. Red Canary is quick to answer my questions and address any concerns I may have.
    What do you dislike about the product?
    I would like additional features when it comes to Threats that are published by Red Canary. For example, If I remediate a Threat by adding an end user to be allowed to use a specific application and later would like to revert those changes. I need to submit a ticket to Red Canary to have the user removed.
    What problems is the product solving and how is that benefiting you?
    Red Canary is receiving our telemetry from various sources and is able to correlate multiple events to formulate a Threat. These Threats are often not seen by our internal Cyber security tools. This is beneficial in identifying advance threats.
    Manufacturing

    I have no issues with the product so far

    Reviewed on May 28, 2025
    Review provided by G2
    What do you like best about the product?
    The UI of the site is and the clarity of the alerts
    What do you dislike about the product?
    Nothing to report so far. The product seems to be working as designed
    What problems is the product solving and how is that benefiting you?
    IT is catching alerts and the support is clarifying issues
    View all reviews