
Red Canary
Founded Year
2013Stage
Option/Warrant | AliveTotal Raised
$129.92MLast Raised
$4.93M | 6 mos agoAbout Red Canary
Red Canary provides a multi-dimensional endpoint threat detection system that combines technology with human analysts to assess thousands of potentially malicious events per day.
Red Canary Headquarter Location
1601 19th Street Suite 900
Denver, Colorado, 80202,
United States
855-977-0686
ESPs containing Red Canary
The ESP matrix leverages data and analyst insight to identify and rank leading companies in a given technology landscape.
Companies in this market are outsourced security providers that typically rely on log monitoring, behavioral analysis, security analytics, threat detection, forensics, and incident response solutions to monitor and protect their retail clients’ IT environments.
Red Canary named as Outperformer among 9 other companies, including BlueVoyant, Arctic Wolf Networks, and Expel.
Companies in this market are outsourced security providers that typically rely on log monitoring, behavioral analysis, security analytics, threat detection, forensics, and incident response solutions to monitor and protect their healthcare clients’ IT environments.
Red Canary named as Outperformer among 8 other companies, including BlueVoyant, Arctic Wolf Networks, and Expel.
Research containing Red Canary
Get data-driven expert analysis from the CB Insights Intelligence Unit.
CB Insights Intelligence Analysts have mentioned Red Canary in 4 CB Insights research briefs, most recently on Mar 7, 2022.
Expert Collections containing Red Canary
Expert Collections are analyst-curated lists that highlight the companies you need to know in the most important technology spaces.
Red Canary is included in 1 Expert Collection, including Cybersecurity.
Cybersecurity
5,058 items
Latest Red Canary News
May 9, 2022
'Raspberry Robin' targets businesses with a new worm that establishes itself with standard Windows tools It's not clear what the malware operators goals are May 9, 2022, 12:14 In brief: Researchers have discovered a relatively new worm that infects Windows PCs through a compromised external hard drive. Although they have been staying it for several months and know how it works, they are unsure of its end game. Aside from the insidious nature of its operation, its late-stage tasks are still unknown. Red Canary analysts have disclosed a cluster of malware activity that uses a worm spread via external USB drives. The malware employs the "QNAP worm," which cyber-intelligence firm Sekoia described back in November 2021. However, Red Canary detected it in some of its technology and manufacturing customers' networks and tracked it since September under the codename Raspberry Robin. Raspberry Robin spreads when users connect an infected USB drive to their computer. The worm, disguised as an LNK file, then uses Windows cmd.exe to launch a malicious file. It then uses Microsoft Standard Installer (msiexec.exe) to connect to command-and-control (C2) servers — usually vulnerable QNAP devices. It then uses TOR exit nodes to cover its tracks. Red Canary suspects that Raspberry Robin establishes persistence by installing a malicious DLL file from the C2 servers. The malware then launches the DLL using two utilities included in Windows: fodhelper (a Windows setting manager) and obdcconf (an ODBC driver configuration tool). The former bypasses User Account Control, and the latter executes and configures the DLL. However, the researchers admit this is just a working hypothesis. They don't precisely know what the DLLs do, nor have they figured out how it spreads to USB drives. "First and foremost, we don't know how or where Raspberry Robin infects external drives to perpetuate its activity, though it's likely this occurs offline or otherwise outside of our visibility," said Red Canary. "We also don't know why Raspberry Robin installs a malicious DLL." It is also unclear what the QNAP worm's ultimate purpose is. Other than how it works, the researchers have not seen any "late-stage activity" that would benefit the operators.
Red Canary Web Traffic
Red Canary Rank
When was Red Canary founded?
Red Canary was founded in 2013.
Where is Red Canary's headquarters?
Red Canary's headquarters is located at 1601 19th Street, Denver.
What is Red Canary's latest funding round?
Red Canary's latest funding round is Option/Warrant.
How much did Red Canary raise?
Red Canary raised a total of $129.92M.
Who are the investors of Red Canary?
Investors of Red Canary include Noro-Moseley Partners, Access Venture Partners, Summit Partners, Kyrus Tech and Service Provider Capital.
Who are Red Canary's competitors?
Competitors of Red Canary include BlueVoyant and 3 more.
You May Also Like

Cybereason develops software that aims to better track the actions of would-be cyber attackers. The Cybereason automated platform collects subtle clues by learning to discern anomalies and distinguish between the benign and pernicious. This data is then analyzed using Big data algorithms and proprietary knowledge enriched with external intelligence.

Zimperium provides enterprise mobile threat defense. The Zimperium Mobile Threat Defense system delivers enterprise-class protection for Android and iOS devices against the next generation of advanced mobile threats. Developed for mobile devices, Zimperium uses patented, behavior-based analytics that continuously runs on the device to protect mobile devices against WiFi, cellular, and host-based threats wherever business takes them.

eSentire specializes in advanced threat solutions for the hedge fund industry based on core IP upon which their business succeeds. eSentire delivers real-time threat detection and mitigation on a 24x7x365 basis now known as Continuous Monitoring as a Service (CMAAS).
CloudCover is a full-spectrum network detection cyber security platform that utilizes AI-based machine learning to provide real-time automated security risk insured protection. The company's platform employs network analytics including risk score that enables the underwriting of incremental cybersecurity network insurance on-demand. It was founded in 2009 and is based in Saint Paul, Minnesota.

Veracode is an AppSec partner for creating secure software, reducing the risk of security breach, and increasing security and development teams’ productivity. As a result, companies using Veracode can move their business, and the world forward. With its combination of process automation, integrations, speed, and responsiveness, Veracode helps companies get accurate and reliable results to focus their efforts on fixing, not just finding, potential vulnerabilities.

Pondurance delivers managed detection and response services to industries facing more pressing and dynamic cybersecurity challenges including ransomware, increasingly complex compliance requirements and digital transformation accelerated by a distributed workforce.
Discover the right solution for your team
The CB Insights tech market intelligence platform analyzes millions of data points on vendors, products, partnerships, and patents to help your team find their next technology solution.