Head of Information Security and Privacy at Ovative Group
Real User
Top 20
Mar 25, 2026
My main use case for Red Canary is to ensure I can sleep at night by getting 24/7 coverage by a capable team to investigate any alerts for the systems that we have in place to ensure we don't have any security or suspicious activity. I can give you a specific example of a situation where Red Canary helped me out and made a difference: we've had more than a few instances where a user clicked on a phishing link, invoking connections to hostile sites. Through alerts in Defender, the Red Canary team identified, confirmed, and investigated the threat before they reset the user's credentials and contacted us to work with the user to resolve the situation. I have at least one other instance where Red Canary investigated an alert and continued doing additional investigations of logging and activity from that user and their systems around that proximity to confirm that there was no further suspicious activity.
We use Red Canary ( /products/red-canary-reviews ) to monitor incoming and outgoing traffic. For example, when we receive an alert that data from our internal IP address to an external IP address has been transferred, we investigate using a Palo Alto firewall.
Consultant at a financial services firm with 11-50 employees
Real User
Mar 28, 2022
We mainly used Red Canary MDR for detecting and containing suspicious or malicious behavior on an endpoint, whether it's a suspicious act that a hacker might be conducting or actual malware. We are using Red Canary MDR with Carbon Black. Carbon Black supports different EDRs.
Find out what your peers are saying about Red Canary, a Zscaler company, Microsoft, Fortinet and others in Advanced Threat Protection (ATP). Updated: May 2026.
Advanced Threat Protection offers comprehensive tools designed to safeguard against sophisticated cyber threats. It provides proactive security measures, including threat detection and prevention, to ensure network and data integrity.These solutions utilize advanced analytics and machine learning to detect and neutralize potential threats in real-time, focusing on early identification of threats to minimize breaches. Its sophisticated capabilities are aligned with the evolving complexity of...
My main use case for Red Canary is to ensure I can sleep at night by getting 24/7 coverage by a capable team to investigate any alerts for the systems that we have in place to ensure we don't have any security or suspicious activity. I can give you a specific example of a situation where Red Canary helped me out and made a difference: we've had more than a few instances where a user clicked on a phishing link, invoking connections to hostile sites. Through alerts in Defender, the Red Canary team identified, confirmed, and investigated the threat before they reset the user's credentials and contacted us to work with the user to resolve the situation. I have at least one other instance where Red Canary investigated an alert and continued doing additional investigations of logging and activity from that user and their systems around that proximity to confirm that there was no further suspicious activity.
We use Red Canary ( /products/red-canary-reviews ) to monitor incoming and outgoing traffic. For example, when we receive an alert that data from our internal IP address to an external IP address has been transferred, we investigate using a Palo Alto firewall.
My company uses Red Canary MDR to simulate MITRE ATT&CK, like spearphishing and updating domain names.
We use the solution's MDR service to monitor our Microsoft 365 environment, including Defender Endpoint.
We use Red Canary MDR for threat protection.
We mainly used Red Canary MDR for detecting and containing suspicious or malicious behavior on an endpoint, whether it's a suspicious act that a hacker might be conducting or actual malware. We are using Red Canary MDR with Carbon Black. Carbon Black supports different EDRs.
We started using Red Canary MDR because we had malware issues within our company.