Skip to main content
Getting started with RAD Security is as easy as 1-2-3. First, we’ll connect your existing data sources so that RAD FusionAI can analyze your entire security stack. Then we’ll deploy your autonomous AI workers. After that, you’ll be able to see findings, monitor your environment, and take action with unprecedented context and control.

Setup Process

1. Connect Data Sources

Connect your security tools and infrastructure to enable AI analysis:
  • Cloud Platforms - AWS, Azure, GCP, Linode
  • Security Tools - SIEM, EDR, vulnerability scanners
  • Identity Systems - Active Directory, Okta, Google Workspace
  • Infrastructure - Kubernetes clusters, containers, serverless functions
You can connect data sources at RAD Security -> Data Sources -> Integrations.
No immediate access? Skip this step and complete during initial configuration.

2. Deploy AI Workers

Configure specialized AI agents to automate security tasks:
  • Vulnerability Worker - Automated CVE scanning and remediation tracking
  • Cloud Security Worker - Infrastructure misconfiguration detection
  • GRC Worker - Compliance monitoring and audit preparation
  • Runtime Triage Worker - Real-time threat detection and response
You can access AI workers on the left-hand nav bar under AI Workers.
Start with Vulnerability Worker for immediate security value, then expand to other workers.

3. Monitor Security Findings

Review automated security analysis in the Evidence Room:
  • CVEs - Container and software vulnerabilities with severity ratings
  • Cloud Misconfigs - Infrastructure compliance violations
  • Runtime Threats - Real-time threat detection and alerts
  • Kubernetes Misconfigs - Kubernetes cluster security issues

What’s Next?