How Cado Fits Into Your SOC Architecture
Collect From Anywhere
Achieve forensic-level visibility across your entire estate, whether it's a multi-cloud, container-based, serverless, SaaS, or on-premises set up. Automatically capture hundreds of data sources across cloud-provider logs, disk, memory, and more. No agent required means zero impact to production systems.
AI-Powered Investigations
Leverage Cado’s AI Investigator to further streamline the investigation and response process. Powered by Cado's local Large Language Model (LLM), AI Investigator empowers analysts to jump into a new investigation and get high-level context, fast. All with the security you demand - rest assured, no data is ever sent out of your environment.
Cloud Native
Cado deploys natively within your cloud environment to ensure your unique data privacy requirements are met. You choose: deploy in AWS, GovCloud, Azure, or GCP in minutes. Cado Security’s patented cloud-based architecture delivers automated data collection and parallel data processing, decreasing time to investigation and eliminating Egress costs.
Powerful Analytics
Elevate your skill set and reclaim precious focus time. Collected data is enriched using third-party and proprietary threat intelligence. Key incident details such as root cause, compromised roles and assets, and a complete timeline of events are automatically surfaced. With Cado Security, analysts of all levels can perform complex investigations.
The Cado Platform
Cado Security delivers broad support across multi-cloud, container, serverless, SaaS, and on-premises environments, eliminating blind spots that have previously made incident response challenging or impossible.
-
Amazon Web Services (AWS)
Amazon Web Services (AWS)
Cado Security empowers security experts to understand the impact of incidents in AWS.The Cado platform enables investigations of:
- EC2 instances (including EC2 AMIs and EBS snapshots)
- AWS S3 buckets
- AWS ECS
- Amazon’s managed Kubernetes Service (AmazonEKS)
- AWS Lightsail
- Cloud logs, including Guard Duty, CloudTrail, and AWS SSM.
Cado also supports processing numerous file systems including Amazon’s Linux XFS.
-
AWS GovCloud
AWS GovCloud
Cado Security supports native deployment in AWS GovCloud (US), empowering US government agencies to better understand risks identified across their sensitive workloads.
AWS GovCloud (US) is the set of Amazon's Regions designed to host sensitive data, regulated workloads, and address the most stringent U.S. government security and compliance requirements.
Cado supports investigations on workloads running in GovCloud in the same way as they would be able to for workloads in AWS Standard Regions.
-
Microsoft Azure
Microsoft Azure
Cado Security delivers the visibility that’s required to identify and eliminate risk across Azure environments, regardless of its size and complexity.
The Cado platform enables investigations of virtual machines, disks from Azure Compute, Azure Kubernetes Service (AKS), and cloud logs such as Azure activity logs.
Cado also supports importing objects from Azure Blob Storage and numerous file formats including Azure’s native VHD and VHDX.
-
Google Cloud Platform (GCP)
Google Cloud Platform
Cado Security enables cloud incident response in Google Cloud Platform (GCP) environments.
The Cado platform supports investigations of resources such as Google Compute Engine and Google Cloud Kubernetes Engine (GKE), including key logs and artifacts.
Cado also supports the ability to acquire data from GCP Storage Buckets, which is common in the event an analyst wants to analyze disk images or zip files that have been uploaded to the bucket or to investigate its contents.
-
Containers
Containers
The dynamic and ephemeral nature of container-based technologies can make it nearly impossible to investigate a potential compromise.
The Cado platform enables security teams to automate the acquisition of forensically-sound data of containers to ensure critical information is not lost.
Cado Security ensures security teams can quickly investigate compromises in ephemeral environments by delivering support for AWS, Azure, and GCP containerized environments.
Cado also parses logs from Docker and Kubernetes.
-
Serverless
Serverless
The Cado Security platform delivers extended visibility of AWS ECS Fargate and Lambda.
Cado enables security teams to capture, process, and analyze critical evidence including key files and folders from AWS Fargate – a serverless compute engine for containers that works with both Amazon Elastic Container Service (ECS) and Amazon Elastic Kubernetes (EKS).
The platform also empowers security teams to investigate the execution of AWS Lambda serverless functions alongside other valuable data sources in a single timeline to deliver enhanced context to incident investigations.
-
SaaS
SaaS
Organizations heavily rely on email for transfer-of-fund requests, making BEC one of the most common and expensive threats.
The Cado Security platform enables security teams to acquire Microsoft 365 Unified Audit Log (UAL) to investigate and respond to Microsoft 365 compromises such as:
- Business Email Compromise (BEC)
- Account Takeover (ATO)
- Insider threats
With Cado, security teams can seamlessly analyze key SaaS logs alongside other critical sources captured across on-premises and cloud environments.
-
On Premises
On Premise
Cado Security supports investigations of data captured from on-premises environments.
By uploading on-premises data to an Amazon S3 bucket, Azure Blob, or a GCP Storage Bucket and importing it into the Cado platform, security teams can take advantage of Cado’s scalable architecture and processing engine, while benefiting from added context when analyzed alongside other valuable data sources.
Amazon Web Services (AWS)
Cado Security empowers security experts to understand the impact of incidents in AWS.The Cado platform enables investigations of:
- EC2 instances (including EC2 AMIs and EBS snapshots)
- AWS S3 buckets
- AWS ECS
- Amazon’s managed Kubernetes Service (AmazonEKS)
- AWS Lightsail
- Cloud logs, including Guard Duty, CloudTrail, and AWS SSM.
Cado also supports processing numerous file systems including Amazon’s Linux XFS.
AWS GovCloud
Cado Security supports native deployment in AWS GovCloud (US), empowering US government agencies to better understand risks identified across their sensitive workloads.
AWS GovCloud (US) is the set of Amazon's Regions designed to host sensitive data, regulated workloads, and address the most stringent U.S. government security and compliance requirements.
Cado supports investigations on workloads running in GovCloud in the same way as they would be able to for workloads in AWS Standard Regions.
Microsoft Azure
Cado Security delivers the visibility that’s required to identify and eliminate risk across Azure environments, regardless of its size and complexity.
The Cado platform enables investigations of virtual machines, disks from Azure Compute, Azure Kubernetes Service (AKS), and cloud logs such as Azure activity logs.
Cado also supports importing objects from Azure Blob Storage and numerous file formats including Azure’s native VHD and VHDX.
Google Cloud Platform
Cado Security enables cloud incident response in Google Cloud Platform (GCP) environments.
The Cado platform supports investigations of resources such as Google Compute Engine and Google Cloud Kubernetes Engine (GKE), including key logs and artifacts.
Cado also supports the ability to acquire data from GCP Storage Buckets, which is common in the event an analyst wants to analyze disk images or zip files that have been uploaded to the bucket or to investigate its contents.
Containers
The dynamic and ephemeral nature of container-based technologies can make it nearly impossible to investigate a potential compromise.
The Cado platform enables security teams to automate the acquisition of forensically-sound data of containers to ensure critical information is not lost.
Cado Security ensures security teams can quickly investigate compromises in ephemeral environments by delivering support for AWS, Azure, and GCP containerized environments.
Cado also parses logs from Docker and Kubernetes.
Serverless
The Cado Security platform delivers extended visibility of AWS ECS Fargate and Lambda.
Cado enables security teams to capture, process, and analyze critical evidence including key files and folders from AWS Fargate – a serverless compute engine for containers that works with both Amazon Elastic Container Service (ECS) and Amazon Elastic Kubernetes (EKS).
The platform also empowers security teams to investigate the execution of AWS Lambda serverless functions alongside other valuable data sources in a single timeline to deliver enhanced context to incident investigations.
SaaS
Organizations heavily rely on email for transfer-of-fund requests, making BEC one of the most common and expensive threats.
The Cado Security platform enables security teams to acquire Microsoft 365 Unified Audit Log (UAL) to investigate and respond to Microsoft 365 compromises such as:
- Business Email Compromise (BEC)
- Account Takeover (ATO)
- Insider threats
With Cado, security teams can seamlessly analyze key SaaS logs alongside other critical sources captured across on-premises and cloud environments.
On Premise
Cado Security supports investigations of data captured from on-premises environments.
By uploading on-premises data to an Amazon S3 bucket, Azure Blob, or a GCP Storage Bucket and importing it into the Cado platform, security teams can take advantage of Cado’s scalable architecture and processing engine, while benefiting from added context when analyzed alongside other valuable data sources.
The Cado Advantage
Cado Security is helping organizations around the world achieve results.
Relevant Blog Posts
The BlogIntroducing Cado API V3 for Automated SOC Workflow
December 16, 2024Augmenting, Not Automating, SOC Analysts with Machine Learning
November 12, 2024Cado's 'Impact' Rating: Prioritizing Alerts to Focus SOC Analyst Attention
November 1, 2024Capture the Flag
Designed to educate security teams how to investigate attacks on cloud-based systems, we're now offering complimentary CTFs for qualifying organizations.