RAD Security Description

RAD Security creates behavioral signatures of your unique, good behavior across the cloud-native infrastructure, workloads and identities. This allows us to detect zero-day threats and improve inputs for shift-left management and posture management. Right-size malicious cloud native identities to the least privilege. The risk score is based on runtime activity, permissions, usage, (or unused) identities, presence in threat vectors and more. Prioritize the risk by combining RBACs, misconfigs and image CVEs with threat vectors. From the most risky identities, you can dive straight into the detailed audit logs, connections to other roles and service accounts, role-bindings, and workloads. Access IQ and AI queries on Kubernetes API logs can be used to understand the actual usages of valid identities. Zero-trust Kubernetes RBAC policies can be used to streamline least privilege access.

Integrations

API:
Yes, RAD Security has an API

Reviews

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Company Details

Company:
RAD Security
Year Founded:
2021
Headquarters:
United States
Website:
rad.security/product

Media

RAD Security Screenshot 1
Recommended Products
Red Hat Enterprise Linux on Microsoft Azure Icon
Red Hat Enterprise Linux on Microsoft Azure

Deploy Red Hat Enterprise Linux on Microsoft Azure for a secure, reliable, and scalable cloud environment, fully integrated with Microsoft services.

Red Hat Enterprise Linux (RHEL) on Microsoft Azure provides a secure, reliable, and flexible foundation for your cloud infrastructure. Red Hat Enterprise Linux on Microsoft Azure is ideal for enterprises seeking to enhance their cloud environment with seamless integration, consistent performance, and comprehensive support.
Learn More

Product Details

Platforms
SaaS
Type of Training
Documentation
Live Online
In Person
Customer Support
Phone Support
Online

RAD Security Features and Options

Cloud Security Software

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

RAD Security Lists

RAD Security User Reviews

Write a Review
  • Previous
  • Next