Skip to content
Get a Demo
    cloud design cloud design cloud design
    Use Case

    Container & K8s Investigations

    Perform container investigations in Kubernetes environments, including EKS, AKS, and GKE.

    Ephemeral Means Data Disappears

    Containers have seen increased adoption in cloud environments over recent years given their lightweight, easy to deploy, and resource-efficient nature. However, the ephemeral nature of container-based and serverless resources can make it impossible to investigate potential threats.

    Leave No Stone Left Unturned

    Data Collection from AWS ECS containers and Kubernetes

    Full Range Support.

    The Cado Platform supports data collection from AWS ECS containers deployed via fargate and Kubernetes container environments in AWS, GCP, and Azure, including the ability to capture distroless / no shell containers. Cado also supports on-prem Kubernetes and OpenShift with Cado Host.
    Distroless Containers

    Distroless Containers? No Problem.

    Distroless containers are designed for efficiency and security, stripped of standard OS components like shell utilities and package managers, which makes investigating containers highly challenging. Cado has the world's first solution to perform forensic investigations in distroless container environments.
    Book a Demo
    Filesystem Exploration

    Filesystem Exploration

    Cado automatically collects key data sources, including running processes, network connections, as well as key system and log files, which can be explored using Cado's browse disk capability. Cado also uses their previously open-sourced "varc" tool-set to collect memory from individual processes for forensic analysis.

    Browse Other Use Cases

    Explore other ways security teams are using the Cado Security platform to advance their mission.

    Icon-Cross-Cloud Investigations
    Cross Cloud Investigations

    Investigate incidents identified in AWS, Azure, and GCP in a single pane of glass.

    Icon-Endpoint-Triage-big
    SOC Triage

    Automate triage acquisition of endpoint resources to gain immediate event insights and facilitate quick escalation.

    Icon-BEC-Compromise-big
    SaaS Investigations

    Analyze SaaS logs alongside other critical sources to investigate compromises, such as Business Email Compromise (BEC).

    Icon-Incident-Containment
    Cloud Detection & Response (CDR)

    Marry threat detection with automated forensic collection and investigation to expedite response to cloud threats. 

    Icon-Evidence-Preservation
    Evidence Preservation

    Ensure evidence residing in ephemeral environments is immediately captured and preserved before it disappears. 

    cloud image

    The Cado Advantage

    Cado Security is helping organizations around the world achieve results.

    6 x
    Faster When compared to traditional forensics tools
    48 +
    Hours Saved on event triage
    66 %
    Cost Reduction Associated with investigations
    cloud image
    cloud image

    Ready for more?

    Use the Cado Security platform to investigate any system. Anywhere. Anytime.

    Get a Demo
    cloud image