Red Canary
EDR-agnostic MDR powered by expert threat detection engineering
- Service
- MDR
- Response
- Contain threats
Best for
Companies with 200-5,000 employeesUsually replaces
In-house alert triage of your EDRCheck first
No on-premise deployment option; fully cloud-deliveredCoverage
Covers
- EDR-agnostic MDR across CrowdStrike, SentinelOne, Microsoft Defender, and more
- Proprietary threat detection engineering with continuously tuned detection analytics
- Automated response playbooks with vendor-native remediation actions
Pros and limits
Works well
- Works with your existing EDR investment rather than requiring vendor lock-in
- Exceptional threat detection engineering reduces false positives and surfaces real threats
- Transparent reporting and community contributions through the annual Threat Detection Report
Watch out for
- Limited ability for customers to create custom detection rules
- Zscaler acquisition (completed 2025) introduces uncertainty for standalone SMB customers
- Less suited for organizations seeking a full SIEM replacement out of the box
Pricing
- Starting price
- ~$100-120/endpoint/year
- Billing model
- Per-endpoint, Per-user, Per-asset, Tiered
- Minimum contract
- 12 months
- Proof of concept
- Available
- Onboarding
- 7-14 days
Core, Complete, and Enterprise tiers; pricing scales based on endpoints, users, and cloud resources
Connects with
- SIEM
- Microsoft Sentinel (co-managed), Red Canary Security Data Lake (proprietary)
- EDR / Endpoint
- CrowdStrike Falcon, SentinelOne Singularity, Microsoft Defender for Endpoint, VMware Carbon Black, Palo Alto Cortex XDR
- Cloud
- AWS, Azure, GCP
- Other
- Microsoft Defender XDR, Microsoft Entra ID, Palo Alto Cortex XSIAM, Okta, Cisco, Proofpoint
Detailed notes
- Market position
- Red Canary is best read as an MDR layer over a buyer's existing security stack. It is strongest when the customer already has an endpoint platform in place and wants independent detection engineering, analyst review, and response orchestration without standardizing on a new EDR vendor.
- Where it fits
- The service fits teams that have security tooling but not enough 24/7 analyst capacity to separate real threats from alert noise. It is less about replacing every SOC system and more about making existing EDR, identity, cloud, and telemetry sources operationally useful.
- Evidence signal
- Red Canary publishes one of the more practical public threat reports in the MDR market, based on confirmed threat activity from its customer base. That matters because it gives buyers a clearer view into the detection logic and adversary patterns behind the service, instead of only relying on sales claims.
- What to verify
- Buyers should confirm which telemetry sources are included in the quoted tier, which response actions Red Canary can take without approval, how custom detection requests are handled, and how the Zscaler acquisition affects roadmap, support model, and commercial terms.
Questions
How much does Red Canary cost?
Red Canary pricing starts at approximately $100-120 per endpoint per year for the Core plan, with per-user ($100/year) and per-cloud-resource ($250/year) pricing also available. The Complete and Enterprise tiers add identity and cloud coverage at higher price points. Final pricing depends on environment size and selected services.
Does Red Canary work with my existing EDR?
Yes, Red Canary is EDR-agnostic and integrates with all major endpoint detection platforms including CrowdStrike Falcon, SentinelOne Singularity, Microsoft Defender for Endpoint, VMware Carbon Black, and Palo Alto Cortex XDR. This allows organizations to keep their current EDR investment while adding expert-managed detection and response.
What is the Red Canary Threat Detection Report?
The Threat Detection Report is an annual publication from Red Canary that analyzes tens of thousands of confirmed threats detected across its customer base. It maps adversary techniques to the MITRE ATT&CK framework and provides practical guidance on detection, testing, and mitigation. It is widely regarded as one of the most actionable threat intelligence resources in the industry.