Consultant at a financial services firm with 11-50 employees
Real User
Top 20
2022-03-28T17:20:20Z
Mar 28, 2022
We mainly used Red Canary MDR for detecting and containing suspicious or malicious behavior on an endpoint, whether it's a suspicious act that a hacker might be conducting or actual malware. We are using Red Canary MDR with Carbon Black. Carbon Black supports different EDRs.
Find out what your peers are saying about Red Canary, Cisco, Skyhigh Security and others in Cloud Access Security Brokers (CASB). Updated: October 2024.
When protecting your data in the cloud, you can’t just rely on the expectation that the data centers that store your company’s information and records will protect you on their own, even though they offer a high level of security.
My company uses Red Canary MDR to simulate MITRE ATT&CK, like spearphishing and updating domain names.
We use the solution's MDR service to monitor our Microsoft 365 environment, including Defender Endpoint.
We use Red Canary MDR for threat protection.
We mainly used Red Canary MDR for detecting and containing suspicious or malicious behavior on an endpoint, whether it's a suspicious act that a hacker might be conducting or actual malware. We are using Red Canary MDR with Carbon Black. Carbon Black supports different EDRs.
We started using Red Canary MDR because we had malware issues within our company.