RAD Logo

RAD

0
Commercial
Visit Website

RAD Security is a cloud native security platform that creates behavioral fingerprints of cloud workloads, infrastructure, and identities. The platform utilizes eBPF technology to establish baseline behaviors across software supply chain, cloud infrastructure, and Kubernetes environments. It provides runtime verification capabilities to detect deviations from established behavioral patterns, focusing on identifying potential security incidents in cloud native environments. The solution offers capabilities for: - Kubernetes security posture management - Cloud native identity and access monitoring - Software supply chain verification - Runtime threat detection - Cloud infrastructure security monitoring - Behavioral-based zero-day attack detection

FEATURES

ALTERNATIVES

Stay up-to-date on the latest trends and developments in AWS Cloud Security with this weekly digest newsletter.

Analyzes CloudTrail data of a given AWS account and generates a summary of recently active IAM principals, API calls they made, as well as regions, IP addresses and user agents they used.

A command line tool that counts Amazon resources across regions and displays the results in a friendly format.

Automatically compile AWS SCPs for compliant AWS services based on preferred frameworks.

A tool for discovering company infrastructure and apps on major cloud providers, beneficial for bug bounty hunters and penetration testers.

A tool to find S3 buckets from HTML, JS, and bucket misconfiguration testing

Automate AWS security checks and centralize security alerts.

A tool that determines what AWS API calls are logged by CloudTrail and what they are logged as, and can also be used as an attack simulation framework.