Best Software for 2025 is now live!
Product Avatar Image

Red Canary

Show rating breakdown
98 reviews
  • 1 profiles
  • 1 categories
Average star rating
4.7
Serving customers since
2013
Profile Type
Category

All Profiles

Profile Filters
Profile Type
Category

Profile Name

Star Rating

81
15
2
0
0

Red Canary Reviews

Review Filters
Profile Name
Star Rating
81
15
2
0
0
RT
Ramon T.
01/15/2025
Validated Reviewer
Review source: Organic

Amazing Expereince

The white glove treatment i receive from the support team when reaching out about issues a little beyond the scope. They are always willing to help and point me in the right direciton.
Randy L.
RL
Randy L.
Cybersecurity Lead
01/15/2025
Validated Reviewer
Verified Current User
Review source: Seller invite
Incentivized Review

professional, transparent, cost effective

Easy to integrate with my environment. The partnership. Accurate, very minimum false positives.
KS
Kim S.
01/15/2025
Validated Reviewer
Verified Current User
Review source: Seller invite
Incentivized Review

Red Canary Saves the Day

Red Canary's playbooks automate immediate actions to protect us. I appreciate the timely alerts, Red Canary always sends us alert before any other monitoring system we employ. The knowledge of the analysts is impeccable and unmatched in the field. Understanding, investigating and teaching our on-prem team is so valuable and has saved us several times and allowed us to shutdown attacks as they begin to happen. Awesome team and reporting systems!

About

Contact

HQ Location:
Denver, Colorado

Social

@redcanary

What is Red Canary?

Red Canary stops cyber threats no one else does, so organizations can fearlessly pursue their missions. Security leaders all share one goal: ‘Don’t get breached.’ Since day one at Red Canary, enterprises have relied on us to find and stop threats before they can cause harm. The most sophisticated security teams trust us for our intelligence-led Security Operations platform run by world-class security experts.  We manage, detect and respond to prevalent threats across cloud, identity and endpoint so you can have more time to focus on business-specific specific security needs and requirements.  We got you.

Details

Year Founded
2013