With the latest version of the Cado platform, customers can now import Tanium Live Response collections to expedite incident response investigations of on-premises systems. The Cado platform harnesses the power of the cloud to automate manual and time-consuming tasks traditionally associated with forensic investigations. Cado’s unique approach empowers customers to:
How it works
Tanium Live Response collects forensic artifacts and formatted output of evidence such as running processes and active connections. The solution then sends collected data to a network location or S3 bucket.
Tanium Live Response collections can then be imported into the Cado platform for processing and analysis. Cado supports parsing of the artifacts themselves (e.g. Windows Event logs) and also the text formatted data dumps from Tanium itself:
Once processed, Cado presents collected data in a way that allows analysts to seamlessly dive deep - determine root cause and incident scope – and efficiently respond. The Cado solution empowers security teams to drastically reduce investigation and response time by automating some of the common investigative techniques a human analyst would take. The solution’s Automated Investigation feature surfaces key details related to the incident to provide analysts with pivot-points that help guide the rest of the investigation. The Cado solution automatically flags key malicious activity, determines root cause and incident scope (including all compromised roles and assets) and presents a complete timeline of events.
If you’re currently using Tanium or a similar solution for forensic data capture across your on premises environments and are interested in seeing how Cado can further augment your incident response approach — check out our 14-day free trial or request a personalized demo today.