Red Canary, a Top 250 MSSP and managed detection and response (MDR) platform provider, has launched Red Canary Alert Center to help security teams view, manage and prioritize alerts, according to a prepared statement.
Security teams can use any security product to send alerts to Alert Center via email, syslog, API and other options, Red Canary said. Next, Red Canary reviews and correlates the alerts to identify patterns and trends.
Furthermore, Alert Center checks security alerts against millions of indicators of compromise, Red Canary pointed out. This helps security teams guard against repeat attacks.
What Does Alert Center Offer Security Teams?
Alert Center offers intelligent alert prioritization and automation to drive real-time threat response, Red Canary said. It provides access to security veterans who investigate high-severity alerts that correlate with endpoint telemetry and apply intelligence and custom risk weighting to produce a prioritized list of alerts.
In addition, Alert Center provides rapid tuning rules to help security teams quickly identify relevant alerts, Red Canary noted. It also enables end-users to create playbooks that notify security teams or automatically respond when specific types of alerts occur.
Introducing Red Canary MDR for Microsoft Defender Advanced Threat Protection
The Alert Center release comes after Red Canary in May launched Red Canary MDR for Microsoft Defender Advanced Threat Protection (MDATP).
Organizations can use Red Canary MDR to collect and analyze MDATP alerts and telemetry, identify potential threats and automatically remediate them, the company stated. Also, security teams can leverage Red Canary MDR to eliminate false-positive alerts.
Along with MDATP, Red Canary offers MDR for VMware Carbon Black and CrowdStrike. Red Canary MDR combines threat detection, analytics and automation, and it allows security teams to identify and investigate threats.