Listing Thumbnail

    Red Canary Managed Detection and Response

     Info
    Deployed on AWS
    Vendor Insights
    Red Canary detects and stops threats 24x7 across your endpoints, network, cloud, identities and SaaS applications.

    Overview

    Red Canary gives customers the confidence they need with unmatched, actionable intelligence and 24x7 expert response to stay ahead of adversarial threats. With customer-validated 99% threat detection accuracy, security teams can focus on the threats that matter instead of wasting time on noise. With a combination of actionable threat profiles, intel-driven analytics, and specific response and remediation recommendations, your team can make better decisions and prioritize resources according to the most relevant threats to your organization. Features:

    • 24/7/365 expert investigation of potential threats
    • Advanced threat detection
    • Global threat intelligence team
    • Continuous threat hunting
    • Proactive response and remediation

    Highlights

    • Unmatched threat detection accuracy, Red Canary helps protect your endpoints, network, cloud, identity and SaaS applciations.
    • Actionable threat intelligence with on-demand adversary insights and expert collaboration so you can stay ahead of threats.
    • Guided, automated or human-led 24/7 expert response so you can focus on your business objectives instead of the next cybersecurity event.

    Details

    Delivery method

    Deployed on AWS

    Unlock automation with AI agent solutions

    Fast-track AI initiatives with agents, tools, and solutions from AWS Partners.
    AI Agents

    Features and programs

    Vendor Insights

     Info
    Skip the manual risk assessment. Get verified and regularly updated security info on this product with Vendor Insights.
    Security credentials achieved
    (2)

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Red Canary Managed Detection and Response

     Info
    Pricing is based on the duration and terms of your contract with the vendor, and additional usage. You pay upfront or in installments according to your contract terms with the vendor. This entitles you to a specified quantity of use for the contract duration. Usage-based pricing is in effect for overages or additional usage not covered in the contract. These charges are applied on top of the contract price. If you choose not to renew or replace your contract before the contract end date, access to your entitlements will expire.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    12-month contract (4)

     Info
    Dimension
    Description
    Cost/12 months
    Overage cost
    Endpoint
    Computer or instance running Windows, MacOS, or Linux
    $120.00
    Account
    User account
    $100.00
    Resource
    Cloud resource
    $250.00
    Network
    Network coverage
    $20.00

    Vendor refund policy

    No refunds

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Support

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly

    Accolades

     Info
    Top
    50
    In Security Observability, Device Security
    Top
    100
    In Security

    Customer reviews

     Info
    Sentiment is AI generated from actual customer reviews on AWS and G2
    Reviews
    Functionality
    Ease of use
    Customer service
    Cost effectiveness
    5 reviews
    Insufficient data
    Insufficient data
    Insufficient data
    Positive reviews
    Mixed reviews
    Negative reviews

    Overview

     Info
    AI generated from product descriptions
    Threat Detection
    Advanced machine learning and behavioral analytics for comprehensive security monitoring across endpoints, network, cloud, and SaaS applications
    Continuous Monitoring
    24/7/365 expert investigation and continuous threat hunting with real-time threat detection capabilities
    Threat Intelligence
    Global threat intelligence team providing actionable threat profiles and intel-driven analytics for proactive security
    Incident Response
    Automated and human-led response with specific remediation recommendations and expert collaboration
    Multi-Vector Protection
    Comprehensive security coverage across endpoints, network, cloud, identities, and SaaS application environments
    Threat Monitoring
    Comprehensive 24x7 monitoring across networks, endpoints, and cloud environments for detecting cyber threats
    Incident Response
    Rapid detection and mitigation of critical security incidents with guided response mechanisms
    Security Team Expertise
    Dedicated security experts with specialized cloud security knowledge providing advanced threat investigation
    Multi-Environment Coverage
    Integrated security monitoring spanning network, endpoint, and cloud infrastructure platforms
    Continuous Security Analysis
    Real-time threat detection and risk assessment using advanced monitoring technologies
    Threat Detection and Response
    Advanced Managed Detection & Response (MDR) with 24x7x365 monitoring and precision threat response capabilities
    Security Operations Technology Stack
    Curated industry-leading SOC technologies integrating AWS, Splunk, and foundational security tools
    Security Posture Assessment
    Proprietary Dynamic Risk Scoring alert engine with quantitative analysis and industry benchmarking
    Endpoint Security Management
    Comprehensive Managed Endpoint Detection & Response (MEDR) with continuous monitoring
    Vulnerability Management
    Proactive vulnerability scanning and management with dedicated security expertise

    Security credentials

     Info
    Validated by AWS Marketplace
    FedRAMP
    GDPR
    HIPAA
    ISO/IEC 27001
    PCI DSS
    SOC 2 Type 2
    -
    -
    -
    -
    -
    No security profile
    No security profile

    Contract

     Info
    Standard contract
    No
    No
    No

    Customer reviews

    Ratings and reviews

     Info
    0 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    0%
    0%
    0%
    0%
    0%
    0 AWS reviews
    |
    120 external reviews
    Star ratings include only reviews from verified AWS customers. External reviews can also include a star rating, but star ratings from external reviews are not averaged in with the AWS customer star ratings.
    Computer Software

    Great Experience Overall

    Reviewed on Jul 07, 2025
    Review provided by G2
    What do you like best about the product?
    Red Canary provides timely alerts with rich contextual information, which significantly accelerates my ability to triage and respond to security incidents. The quality of the alerting is excellent, with very low false positive escalation rates, saving me valuable time and reducing alert fatigue. I also appreciate the platform’s automation capabilities, which allow for streamlined and automated incident response workflows, making it easier to contain and remediate threats efficiently.
    What do you dislike about the product?
    I have not encountered any major downsides so far.
    What problems is the product solving and how is that benefiting you?
    Red Canary is solving the challenge of providing comprehensive, around-the-clock security monitoring and threat detection without requiring a large internal SOC team. With Red Canary’s managed detection and response, we’re able to maintain 24/7 coverage and quickly identify important security events, even with a small team. This allows us to confidently focus on other operational priorities, knowing that critical threats will be surfaced promptly and with actionable context. As a result, we can shift our attention back to security response only when it truly matters, improving both our efficiency and our security posture.
    Verified User in Business Supplies and Equipment

    Red Canary’s team continuously monitors your environment

    Reviewed on Jul 07, 2025
    Review provided by G2
    What do you like best about the product?
    Threat Intelligence & Behavioral Analytics
    Powered by thousands of analytics and deep threat research (mapping to MITRE ATT&CK), Red Canary delivers data-driven, intelligence-led operations
    What do you dislike about the product?
    Would you like to dive deeper into any component—such as their threat intelligence engine, MDR SOC workflows, or integration specifics?
    What problems is the product solving and how is that benefiting you?
    Readiness Exercises & Training
    On-demand and facilitated tabletop exercises using real-world TTPs (e.g., from Scattered Spider), atomic tests, and attack simulations improve incident-response readiness continuously
    sales.superagi.com
    +4
    redcanary.com
    +4
    redcanary.com
    +4
    .

    Automation & SOAR Capabilities
    Red Canary offers automated, customizable playbooks that accelerate response time and reduce operator workload
    Architecture & Planning

    Red Canary Sentinel Integration

    Reviewed on Jun 19, 2025
    Review provided by G2
    What do you like best about the product?
    Their deep knowledge of Sentinel and all Microsoft services.
    What do you dislike about the product?
    Not sure if this was an internal issue or a Red Canary issue but at time the scheduling of meetings were a bit hectic.
    What problems is the product solving and how is that benefiting you?
    Sentinel Integration
    Hospital & Health Care

    Awesome team, and support.

    Reviewed on Jun 12, 2025
    Review provided by G2
    What do you like best about the product?
    Having the team monitor all data and respond. I like knowing we have a security over watch that is so responsive, and reactive.
    What do you dislike about the product?
    There is nothing I dislike about the team or software.
    What problems is the product solving and how is that benefiting you?
    Monitoring and investigation of events.
    Insurance

    Great core product

    Reviewed on Jun 04, 2025
    Review provided by G2
    What do you like best about the product?
    Red Canary excels at ingesting and correlating telemetry and alerts from our Microsoft Defender suite, combining and deconflicting that data into a single, cohesive threat narrative for a given machine or activity. This correlation capability provides a clearer picture of threats than we get from our other tools and can reduce the time our analysts spend on manual investigation. The platform itself is intuitive and well-designed, making it easy to navigate and use. Additionally, the customer support has been excellent—particularly Annalise and Matthew, who have been responsive and helpful, with Matthew providing deep technical assistance on integrations and automation. Overall, Red Canary adds meaningful value to our security operations.
    What do you dislike about the product?
    While Red Canary offers strong automation capabilities, there are some limitations that impact our ability to fully leverage the platform. One of the main issues is the inconsistency between the GUI, automation platform, and API. For example, when closing out threats, the options available in the automation platform differ from those in the GUI and API—such as missing specific closure reasons like "Internal testing." Additionally, the automation platform only supports "AND" logic in trigger conditions, which makes it difficult to build flexible workflows that share common traits but differ in just one condition. These limitations force us to rely on custom scripts and direct API calls to achieve the functionality we need, rather than managing everything within Red Canary itself.
    What problems is the product solving and how is that benefiting you?
    As the lead of our Breach and Attack Simulation (BAS) Team, my use of Red Canary differs from that of our SOC analysts. I simulate attacks against our network and assets using AttackIQ, and Red Canary plays a critical role in helping me identify and track this activity across our environment. It excels at correlating AttackIQ-generated telemetry with the correct target assets and associated alerts in Microsoft Defender, which is something we struggle to do effectively with other tools. This correlation allows us to validate detection coverage and response workflows more accurately. Additionally, we leverage Red Canary’s automation capabilities to ensure that our simulations don’t overwhelm the SOC or disrupt normal security operations, helping us maintain operational efficiency while testing our defenses.
    View all reviews