Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


09:00 AM
Dark Reading
Dark Reading
Products and Releases

Red Canary Enters Cloud Workload Protection Space

Red Canary Cloud Workload Protection secures cloud environments with a lightweight sensor, proven threat detection platform, and security expertise

DENVER, Oct. 27, 2020 (GLOBE NEWSWIRE) -- 

Red Canary, a leading provider of security operations solutions, announced the launch of Red Canary Cloud Workload Protection, a cloud workload protection (CWP) solution that provides visibility and threat detection for security and DevOps teams. This new solution is purpose-built for cloud Linux workloads, focuses on runtime threat protection and response, and integrates seamlessly into DevOps workflows without sacrificing system performance and reliability.

Key Quote(s):

Joren McReynolds, General Manager for CWP, Red Canary
“Most businesses don’t have an effective solution in place to identify compromises or adversary activity in their cloud environments. Great advances have been made in preventive controls and risk identification, but little traction has been made in threat detection outcomes. The market is ready for a product focused on this core area that will deliver exceptional results.”

Zachary Braun, Senior Manager of Security Operations and NOC, Ionic Security
“Ionic Security has a large, fast moving, and diverse cloud environment that has challenged existing security toolsets. Having used Red Canary’s CWP product for over a year now, we can happily say that CWP supports our diverse configurations with minimal performance impact, and it’s supported by the same passionate and knowledgeable resources behind all of Red Canary’s offerings.”

Explore Red Canary Cloud Workload Protection

Red Canary Cloud Workload Protection Overview:

  • Red Canary Cloud Workload Protection offers continuous collection and analysis of telemetry across physical, virtual, and containerized workloads.
  • The product provides a consolidated view of a customer’s entire cloud ecosystem, identifies potential risks and confirms threats to be actioned.
  • The lightweight, cloud-ready sensor is optimized for Linux with support for nearly all distributions, and can be deployed on all workload types, in AWS, Google Cloud and Azure - with minimal impact on CPU, memory, or stability.
  • Cloud Workload Protection continuously monitors processes, network traffic, and DNS alongside memory and runtime code integrity for all workloads in a single platform.
  • Cloud Workload Protection delivers confirmed threats with rich context, mapped to the latest MITRE ATT&CK® techniques so customers can take informed action.
  • Red Canary Cloud Workload Protection automatically locates unprotected workloads in your environment with workload discovery tools.
  • Red Canary Cloud Workload Protection offers a frictionless, free trial as the gateway to a forever-free telemetry collection solution, an enterprise SaaS product that provides high-fidelity threat alerts, or a fully-managed service delivering detailed, confirmed detections.

Additional Resources

About Red Canary

Red Canary is a security ally enabling every organization to make its greatest impact without fear of cyber-attack. The company provides outcome-focused solutions for security operations teams, who rely on Red Canary to analyze and respond to endpoint telemetry, manage alerts across the network, and provide cloud environment runtime threat detection. With Red Canary, security teams can make a measurable improvement to security operations within minutes. Learn more, visit RedCanary.com.

Social Media: Twitter | LinkedIn | YouTube


Media Contact Information
LeVar Battle
Senior Communications Manager
[email protected]


Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 11/19/2020
New Proposed DNS Security Features Released
Kelly Jackson Higgins, Executive Editor at Dark Reading,  11/19/2020
The Yellow Brick Road to Risk Management
Andrew Lowe, Senior Information Security Consultant, TalaTek,  11/19/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: He hits the gong anytime he sees someone click on an email link.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-11-25
Affected versions of Atlassian Fisheye/Crucible allow remote attackers to achieve Regex Denial of Service via user-supplied regex in EyeQL. The affected versions are before version 4.8.4.
PUBLISHED: 2020-11-25
scan.c in x11vnc 0.9.16 uses IPC_CREAT|0777 in shmget calls, which allows access by actors other than the current user.
PUBLISHED: 2020-11-25
Affected versions of Atlassian Fisheye/Crucible allow remote attackers to impact the application's availability via a Denial of Service (DoS) vulnerability in the MessageBundleResource within Atlassian Gadgets. The affected versions are before version 4.8.4.
PUBLISHED: 2020-11-25
osCommerce has XSS vulnerability via the authenticated user entering the XSS payload into the title section of newsletters.
PUBLISHED: 2020-11-25
GLPI stands for Gestionnaire Libre de Parc Informatique and it is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. In GLPI before version 9.5.3, any authenticated user has read-only permissions to the planning of ever...