In the last quarter, the Cado Security team has been working hard to release a number of new features and enhancements to its platform. We’re excited to tell you what we’ve been up to. Here’s an overview of the top product features we released in Q4:
Cado AI Investigator is a new feature leveraging Cado’s local LLM to further streamline the investigation process. Cado AI Investigator empowers analysts of all levels as well as more senior non-technical stakeholders to gain a high-level understanding of an incident, fast. For example, Cado AI investigator generates a summary of an incident and also has the ability to analyze potentially malicious files. The feature speeds up incident investigations and uplevels security teams to do their best work. Further, because it's built using a local LLM, organizations can rest assured that no data ever leaves their environment.
Cado AI Investigator's Summary of an Investigation
When responding to high-severity incidents in the cloud, having the ability to confirm forensic findings with multiple tools is important. To this end, users can now convert a disk image from DD/Raw format to E01 format (Expert Witness Format). E01 is an industry standard for storing forensic images. This feature can be enabled in Settings within the Cado platform. Users can select “Convert DD to E01” upon evidence capture or fully automate the conversion via API. The E01 format file will be stored in S3 storage. You can also now centrally preserve all forensic collections from all clouds and formats into a central S3 bucket.
Converting DD to E01
Cado’s new Project Overview Dashboard allows security teams to get an at-a-glance view of open projects. The dashboard displays a timeline of investigation and response actions, including project milestones such as open date and data acquisitions. The dashboard also summarizes key project findings by displaying the top MITRE categories, count of malicious and suspicious activities, and number of compromised assets and roles.
Cado's Project Overview Dashboard
Cado now supports the ability to specify the URL for the proxy at deployment. This allows the Cado platform to function in environments where proxies are used for outbound communication.
Cado’s Evidence Overview tab has undergone a refresh this quarter to deliver an improved user experience. From card layout to a tabular view, security teams can more easily understand the source of the data and filter and sort to gain additional context, such as number of key events per data source and more.
Cado's Evidence Overview Tab
Azure support has now been added to the Cado platform's triage capture capability. Cado’s triage capture capability is a faster alternative to full disk capture, trading depth for speed. This feature is often used by security teams when they need to quickly validate the scope of an investigation. In this case, security teams can perform a triage capture across a larger number of machines to validate whether or not there are signs of malicious activity before performing a full disk capture. This feature helps security teams speed up investigations and reduce MTTR in Azure environments. Cado Security's Azure triage capture package of forensic evidence includes:
In October last year, Cado launched its Incident Readiness Dashboard to enable security teams to take a more proactive approach to incident response in the cloud. The Incident Readiness Dashboard delivers the ability to proactively run readiness checks, see readiness trends over time, and identify and mitigate any issues that could prevent an organization from rapidly responding to active threats. Since its initial release, we’ve made a number of user interface improvements to further enhance the experience of interacting with the readiness feature set.
Cados Incident Readiness Dashboard
With a large percentage of organizations adopting a multi-cloud strategy, having the ability to seamlessly capture and investigate forensic evidence across multiple Cloud Service Providers (CSPs) is key to a robust incident response strategy. Cado Security has extended its cross-cloud support even further this quarter, with the ability to now natively deploy the Cado platform in GCP with the ability to collect and analyze data from AWS and Azure. This rounds out Cado’s overall offering with greater support across the top three CSPs. To recap, Cado customers can now choose from the following multi-cloud set ups:
Adding Cross-Cloud Accounts in the Cado Platform
Cado’s in-product automation rules empower security teams to automatically perform collection and remediation actions based on various triggers. Automation rules empower security teams by eliminating the lag time between incident detection and investigation, thus significantly reducing response times. Most recently, Cado has added two new trigger options, the ability to trigger automated acquisition based on GuardDuty rule Severity, and the ability to trigger automated acquisition based on GuardDuty rule ThreatPurpose. These enhancements aim to give security teams more control over their automated incident response process. Further, the ThreatPurpose trigger also allows for alignment with the MITRE framework.
Creating Automation Rules in the Cado Platform
We look forward to hearing from our customers, free trial, and community users -- let us know what you think about these new capabilities! As we move into the next quarter, we remain fully committed to developing features that will empower our customers to do their best work. Stay tuned for more exciting updates soon!
If you are interested in getting a more detailed look into what Cado has been up to, contact our team to see a demo.