Skip to content
Get a Demo

    Environments

    Cado Security delivers broad support across multi-cloud, container, serverless, SaaS, and on-premises environments, eliminating blind spots that have previously made investigations challenging or impossible.

    cloud-design

    Supported Environments

    Cado Security delivers broad support across multi-cloud, container, serverless, SaaS, and on-premises environments.

    • Amazon Web Services (AWS)

      Amazon Web Services (AWS)

      Cado Security empowers security experts to understand the impact of incidents in AWS, the most widely-adopted cloud platform. The Cado platform enables investigations of EC2 instances (including EC2 AMIs and EBS snapshots), AWS S3 buckets, AWS ECS, Amazon’s managed Kubernetes Service (AmazonEKS), AWS Lightsail, and cloud logs including Guard Duty, CloudTrail, and AWS SSM. Cado also supports processing numerous file systems including Amazon’s Linux XFS.

      Icon-rapidly-deploy-1
      Rapidly Deploy

      You choose: Deploy in AWS, GovCloud, Azure, or GCP in minutes. All data resides in your cloud environment.

      Icon-Cross-Cloud Investigations
      Better Understand Risk

      Cado Security offers the speed, adaptability, and depth required to appropriately manage risk.

      Icon-Reduce-MTTR
      Reduce MTTR

      Automation is applied to the end-to-end investigation process, accelerating path to root cause and remediation.

    • AWS GovCloud

      AWS GovCloud

      Cado Security supports native deployment in AWS GovCloud (US). AWS GovCloud (US) is the set of Amazon's Regions designed to host sensitive data, regulated workloads, and address the most stringent U.S. government security and compliance requirements. This means that Cado customers can now perform investigations on workloads running in GovCloud in the same way as they would be able to for workloads in AWS Standard Regions.

      Icon-rapidly-deploy-1
      Rapidly Deploy

      You choose: Deploy in AWS, GovCloud, Azure, or GCP in minutes. All data resides in your cloud environment.

      Icon-better-understand-cloud-risk-1
      Better Understand Risk

      Cado Security offers the speed, adaptability, and depth required to appropriately manage risk.

      Icon-Reduce-MTTR
      Reduce MTTR

      Automation is applied to the end-to-end investigation process, accelerating path to root cause and remediation.

    • Microsoft Azure

      Microsoft Azure

      Cado Security delivers the visibility that’s required to identify and eliminate risk across Azure environments, regardless of its size and complexity. The Cado platform enables investigations of virtual machines, disks from Azure Compute, Azure Kubernetes Service (AKS), and cloud logs such as Azure activity logs. Cado also supports importing objects from Azure Blob Storage and numerous file formats including Azure’s native VHD and VHDX.

      Icon-rapidly-deploy
      Rapidly Deploy

      You choose: Deploy in AWS, GovCloud, Azure, or GCP in minutes. All data resides in your cloud environment.

      Icon-better-understand-cloud-risk
      Better Understand Risk

      Cado Security offers the speed, adaptability, and depth required to appropriately manage risk.

      Icon-Reduce-MTTR
      Reduce MTTR

      Automation is applied to the end-to-end investigation process, accelerating path to root cause and remediation.

    • Google Cloud Platform (GCP)

      Google Cloud Platform (GCP)

      Cado Security enables cloud incident response in Google Cloud Platform (GCP) environments. The Cado platform supports investigations of resources such as Google Compute Engine and Google Cloud Kubernetes Engine (GKE), including key logs and artifacts. Cado also supports the ability to acquire data from GCP Storage Buckets, which is common in the event an analyst wants to analyze disk images or zip files that have been uploaded to the bucket or to investigate its contents.
      Icon-rapidly-deploy-1
      Rapidly Deploy

      You choose: Deploy in AWS, GovCloud, Azure, or GCP in minutes. All data resides in your cloud environment.

      Icon-better-understand-cloud-risk
      Better Understand Risk

      Cado Security offers the speed, adaptability, and depth required to appropriately manage risk.

      Icon-Reduce-MTTR
      Reduce MTTR

      Automation is applied to the end-to-end investigation process, accelerating path to root cause and remediation.

    • Containers

      Containers

      Container-based technology has come a long way and delivers great benefits for enterprises. However, the dynamic and ephemeral nature of these resources can make it nearly impossible to investigate a potential compromise. The Cado platform enables security teams to automate the acquisition of forensically-sound data of containers to ensure critical information is not lost. Cado Security ensures security teams can quickly investigate compromises in ephemeral environments by delivering support for AWS, Azure, and GCP containerized environments. Cado also parses logs from Docker and Kubernetes.
      Icon-rapidly-deploy-1
      Rapidly Deploy

      You choose: Deploy in AWS, GovCloud, Azure, or GCP in minutes. All data resides in your cloud environment.

      Icon-better-understand-cloud-risk-1
      Better Understand Risk

      Cado Security offers the speed, adaptability, and depth required to appropriately manage risk.

      Icon-Reduce-MTTR
      Reduce MTTR

      Automation is applied to the end-to-end investigation process, accelerating path to root cause and remediation.

    • Serverless

      Serverless

      The Cado Security platform delivers extended visibility of AWS ECS Fargate and Lambda. Cado enables security teams to capture, process, and analyze critical evidence including key files and folders from AWS Fargate – a serverless compute engine for containers that works with both Amazon Elastic Container Service (ECS) and Amazon Elastic Kubernetes (EKS). The platform also empowers security teams to investigate the execution of AWS Lambda serverless functions alongside other valuable data sources in a single timeline to deliver enhanced context to incident investigations.
      Icon-rapidly-deploy-1
      Rapidly Deploy

      You choose: Deploy in AWS, GovCloud, Azure, or GCP in minutes. All data resides in your cloud environment.

      Icon-better-understand-cloud-risk
      Better Understand Risk

      Cado Security offers the speed, adaptability, and depth required to appropriately manage risk.

      Icon-Reduce-MTTR
      Reduce MTTR

      Automation is applied to the end-to-end investigation process, accelerating path to root cause and remediation.

    • SaaS

      SaaS

      Organizations heavily rely on email for transfer-of-fund requests, making BEC one of the most common and expensive threats. The Cado Security platform enables security teams to acquire Microsoft 365 Unified Audit Log (UAL) to investigate and respond to Microsoft 365 compromises, such as Business Email Compromise (BEC), Account Takeover (ATO), and insider threats. With Cado, security teams can seamlessly analyze key SaaS logs alongside other critical sources captured across on-premises and cloud environments.
      Icon-rapidly-deploy-1
      Rapidly Deploy

      You choose: Deploy in AWS, GovCloud, Azure, or GCP in minutes. All data resides in your cloud environment.

      Icon-better-understand-cloud-risk-1
      Better Understand Risk

      Cado Security offers the speed, adaptability, and depth required to appropriately manage risk.

      Icon-Reduce-MTTR
      Reduce MTTR

      Automation is applied to the end-to-end investigation process, accelerating path to root cause and remediation.

    • On Premises

      On Premises

      Cado Security supports investigations of data captured from on-premises environments. By uploading on-premises data to an Amazon S3 bucket, Azure Blob, or a GCP Storage Bucket and importing it into the Cado platform, security teams can take advantage of Cado’s scalable architecture and processing engine, while benefiting from added context when analyzed alongside other valuable data sources.
      Icon-rapidly-deploy-1
      Rapidly Deploy

      You choose: Deploy in AWS, GovCloud, Azure, or GCP in minutes. All data resides in your cloud environment.

      Icon-better-understand-cloud-risk-1
      Better Understand Risk

      Cado Security offers the speed, adaptability, and depth required to appropriately manage risk.

      Icon-Reduce-MTTR
      Reduce MTTR

      Automation is applied to the end-to-end investigation process, accelerating path to root cause and remediation.

    Amazon Web Services (AWS)

    Cado Security empowers security experts to understand the impact of incidents in AWS, the most widely-adopted cloud platform. The Cado platform enables investigations of EC2 instances (including EC2 AMIs and EBS snapshots), AWS S3 buckets, AWS ECS, Amazon’s managed Kubernetes Service (AmazonEKS), AWS Lightsail, and cloud logs including Guard Duty, CloudTrail, and AWS SSM. Cado also supports processing numerous file systems including Amazon’s Linux XFS.

    Icon-rapidly-deploy-1
    Rapidly Deploy

    You choose: Deploy in AWS, GovCloud, Azure, or GCP in minutes. All data resides in your cloud environment.

    Icon-Cross-Cloud Investigations
    Better Understand Risk

    Cado Security offers the speed, adaptability, and depth required to appropriately manage risk.

    Icon-Reduce-MTTR
    Reduce MTTR

    Automation is applied to the end-to-end investigation process, accelerating path to root cause and remediation.

    AWS GovCloud

    Cado Security supports native deployment in AWS GovCloud (US). AWS GovCloud (US) is the set of Amazon's Regions designed to host sensitive data, regulated workloads, and address the most stringent U.S. government security and compliance requirements. This means that Cado customers can now perform investigations on workloads running in GovCloud in the same way as they would be able to for workloads in AWS Standard Regions.

    Icon-rapidly-deploy-1
    Rapidly Deploy

    You choose: Deploy in AWS, GovCloud, Azure, or GCP in minutes. All data resides in your cloud environment.

    Icon-better-understand-cloud-risk-1
    Better Understand Risk

    Cado Security offers the speed, adaptability, and depth required to appropriately manage risk.

    Icon-Reduce-MTTR
    Reduce MTTR

    Automation is applied to the end-to-end investigation process, accelerating path to root cause and remediation.

    Microsoft Azure

    Cado Security delivers the visibility that’s required to identify and eliminate risk across Azure environments, regardless of its size and complexity. The Cado platform enables investigations of virtual machines, disks from Azure Compute, Azure Kubernetes Service (AKS), and cloud logs such as Azure activity logs. Cado also supports importing objects from Azure Blob Storage and numerous file formats including Azure’s native VHD and VHDX.

    Icon-rapidly-deploy
    Rapidly Deploy

    You choose: Deploy in AWS, GovCloud, Azure, or GCP in minutes. All data resides in your cloud environment.

    Icon-better-understand-cloud-risk
    Better Understand Risk

    Cado Security offers the speed, adaptability, and depth required to appropriately manage risk.

    Icon-Reduce-MTTR
    Reduce MTTR

    Automation is applied to the end-to-end investigation process, accelerating path to root cause and remediation.

    Google Cloud Platform (GCP)

    Cado Security enables cloud incident response in Google Cloud Platform (GCP) environments. The Cado platform supports investigations of resources such as Google Compute Engine and Google Cloud Kubernetes Engine (GKE), including key logs and artifacts. Cado also supports the ability to acquire data from GCP Storage Buckets, which is common in the event an analyst wants to analyze disk images or zip files that have been uploaded to the bucket or to investigate its contents.
    Icon-rapidly-deploy-1
    Rapidly Deploy

    You choose: Deploy in AWS, GovCloud, Azure, or GCP in minutes. All data resides in your cloud environment.

    Icon-better-understand-cloud-risk
    Better Understand Risk

    Cado Security offers the speed, adaptability, and depth required to appropriately manage risk.

    Icon-Reduce-MTTR
    Reduce MTTR

    Automation is applied to the end-to-end investigation process, accelerating path to root cause and remediation.

    Containers

    Container-based technology has come a long way and delivers great benefits for enterprises. However, the dynamic and ephemeral nature of these resources can make it nearly impossible to investigate a potential compromise. The Cado platform enables security teams to automate the acquisition of forensically-sound data of containers to ensure critical information is not lost. Cado Security ensures security teams can quickly investigate compromises in ephemeral environments by delivering support for AWS, Azure, and GCP containerized environments. Cado also parses logs from Docker and Kubernetes.
    Icon-rapidly-deploy-1
    Rapidly Deploy

    You choose: Deploy in AWS, GovCloud, Azure, or GCP in minutes. All data resides in your cloud environment.

    Icon-better-understand-cloud-risk-1
    Better Understand Risk

    Cado Security offers the speed, adaptability, and depth required to appropriately manage risk.

    Icon-Reduce-MTTR
    Reduce MTTR

    Automation is applied to the end-to-end investigation process, accelerating path to root cause and remediation.

    Serverless

    The Cado Security platform delivers extended visibility of AWS ECS Fargate and Lambda. Cado enables security teams to capture, process, and analyze critical evidence including key files and folders from AWS Fargate – a serverless compute engine for containers that works with both Amazon Elastic Container Service (ECS) and Amazon Elastic Kubernetes (EKS). The platform also empowers security teams to investigate the execution of AWS Lambda serverless functions alongside other valuable data sources in a single timeline to deliver enhanced context to incident investigations.
    Icon-rapidly-deploy-1
    Rapidly Deploy

    You choose: Deploy in AWS, GovCloud, Azure, or GCP in minutes. All data resides in your cloud environment.

    Icon-better-understand-cloud-risk
    Better Understand Risk

    Cado Security offers the speed, adaptability, and depth required to appropriately manage risk.

    Icon-Reduce-MTTR
    Reduce MTTR

    Automation is applied to the end-to-end investigation process, accelerating path to root cause and remediation.

    SaaS

    Organizations heavily rely on email for transfer-of-fund requests, making BEC one of the most common and expensive threats. The Cado Security platform enables security teams to acquire Microsoft 365 Unified Audit Log (UAL) to investigate and respond to Microsoft 365 compromises, such as Business Email Compromise (BEC), Account Takeover (ATO), and insider threats. With Cado, security teams can seamlessly analyze key SaaS logs alongside other critical sources captured across on-premises and cloud environments.
    Icon-rapidly-deploy-1
    Rapidly Deploy

    You choose: Deploy in AWS, GovCloud, Azure, or GCP in minutes. All data resides in your cloud environment.

    Icon-better-understand-cloud-risk-1
    Better Understand Risk

    Cado Security offers the speed, adaptability, and depth required to appropriately manage risk.

    Icon-Reduce-MTTR
    Reduce MTTR

    Automation is applied to the end-to-end investigation process, accelerating path to root cause and remediation.

    On Premises

    Cado Security supports investigations of data captured from on-premises environments. By uploading on-premises data to an Amazon S3 bucket, Azure Blob, or a GCP Storage Bucket and importing it into the Cado platform, security teams can take advantage of Cado’s scalable architecture and processing engine, while benefiting from added context when analyzed alongside other valuable data sources.
    Icon-rapidly-deploy-1
    Rapidly Deploy

    You choose: Deploy in AWS, GovCloud, Azure, or GCP in minutes. All data resides in your cloud environment.

    Icon-better-understand-cloud-risk-1
    Better Understand Risk

    Cado Security offers the speed, adaptability, and depth required to appropriately manage risk.

    Icon-Reduce-MTTR
    Reduce MTTR

    Automation is applied to the end-to-end investigation process, accelerating path to root cause and remediation.

    cloud image

    The Cado Advantage

    Cado Security is helping organizations around the world achieve results.

    6 x
    Faster When compared to traditional forensics tools
    48 +
    Hours Saved on event triage
    66 %
    Cost Reduction Associated with investigations
    cloud image

    Investigation and Response Automation

    Leverage the power of the cloud to implement a robust and repeatable investigation process.

    Embrace the Hybrid World

    Having trouble performing investigations across a dizzying mess of multi-cloud, container, serverless, SaaS, and on-premises resources? We’ve got you covered.

    Take Advantage of Cloud Speed and Scale

    Perform investigations across your entire estate in minutes, not days. Crack the case now. Why wait?

    Automate. Automate. Automate.

    Automate manual investigative tasks so your team can take on more and get to the bottom of what happened faster. Every time. 
    quotemark image

    We use Cado Security for many investigations. Cado not only speeds up the process of acquisition and analysis, but it helps us by having more information to dig through and go deeper into the investigation.

    Matteo Brunati, CEO

    Agorà Security

    Watch Video
    quotemark image

    I can’t believe I’m now able to process a 500GB disk in just a few hours.

    Security Operations Manager

    Global Gaming Company

    quotemark image

    Cado Security is the only solution I know that supports Kubernetes and cloud. They're changing the way we do forensics.

    DFIR Director

    Top 5 Global Consulting Firm

    Explore More

    Dive deeper into everything Cado Security has to offer.

    Icon-Platform
    Platform

    Meet the first investigation and response automation platform and see how other teams are benefiting.

    Icon-Integrations-1
    Integrations
    Cado Security integrates with a wide-range of tools to streamline the end-to-end investigation process.
    Icon-use-cases-1
    Use Cases

    Cado Security enables a number of use cases to empower global organizations to respond to threats faster.

    cloud image

    Let's Get Started

    Use the Cado Security platform to investigate any system. Anywhere. Anytime.

    Book a Demo
    cloud image