Skip to main content
Getting started with RAD Security is as easy as 1-2-3. First, we’ll connect your existing data sources so that RAD FusionAI can analyze your entire security stack. Then we’ll deploy your autonomous AI workers. After that, you’ll be able to see findings, monitor your environment, and take action with unprecedented context and control.

Setup Process

1. Connect Data Sources

Connect your security tools and infrastructure to enable AI analysis:
  • Cloud Platforms - AWS, Azure, GCP, Linode
  • Security Tools - SIEM, EDR, vulnerability scanners
  • Identity Systems - Active Directory, Okta, Google Workspace
  • Infrastructure - Kubernetes clusters, containers, serverless functions
You can connect data sources at RAD Security -> Data Sources -> Integrations.
No immediate access? Skip this step and complete during initial configuration.

Data Sources

Connect to cloud platforms, security tools, and infrastructure

Kubernetes Setup

Deploy RAD sensors on your Kubernetes clusters

2. Deploy AI Workers

Configure specialized AI agents to automate security tasks:
  • Vulnerability Worker - Automated CVE scanning and remediation tracking
  • Cloud Security Worker - Infrastructure misconfiguration detection
  • GRC Worker - Compliance monitoring and audit preparation
  • Runtime Triage Worker - Real-time threat detection and response
You can access AI workers on the left-hand nav bar under AI Workers.
Start with Vulnerability Worker for immediate security value, then expand to other workers.

Ask RADBot

Get expert security guidance with our AI chat assistant

AI Workers

Deploy specialized AI agents for automated security tasks

3. Monitor Security Findings

Review automated security analysis in the Evidence Room:
  • CVEs - Container and software vulnerabilities with severity ratings
  • Cloud Misconfigs - Infrastructure compliance violations
  • Runtime Threats - Real-time threat detection and alerts
  • Kubernetes Misconfigs - Kubernetes cluster security issues

Security Dashboard

Monitor your security posture with real-time dashboards

Incident Response

Respond to security incidents with automated workflows

What’s Next?

Learn How RAD Works

Understand RAD Security’s AI-powered approach