Setup Process
1. Connect Data Sources
Connect your security tools and infrastructure to enable AI analysis:- Cloud Platforms - AWS, Azure, GCP, Linode
- Security Tools - SIEM, EDR, vulnerability scanners
- Identity Systems - Active Directory, Okta, Google Workspace
- Infrastructure - Kubernetes clusters, containers, serverless functions
No immediate access? Skip this step and complete during initial configuration.
Cloud Providers
Connect to AWS, Azure, GCP, and other cloud platforms
Security Tools
Integrate with SIEM, EDR, and vulnerability scanners
2. Deploy AI Workers
Configure specialized AI agents to automate security tasks:- Vulnerability Worker - Automated CVE scanning and remediation tracking
- Cloud Security Worker - Infrastructure misconfiguration detection
- GRC Worker - Compliance monitoring and audit preparation
- Runtime Triage Worker - Real-time threat detection and response
Start with Vulnerability Worker for immediate security value, then expand to other workers.
Ask RADBot
Get expert security guidance with our AI chat assistant
AI Workers
Deploy specialized AI agents for automated security tasks
3. Monitor Security Findings
Review automated security analysis in the Evidence Room:- CVEs - Container and software vulnerabilities with severity ratings
- Cloud Misconfigs - Infrastructure compliance violations
- Runtime Threats - Real-time threat detection and alerts
- Kubernetes Misconfigs - Kubernetes cluster security issues
Security Dashboard
Monitor your security posture with real-time dashboards
Incident Response
Respond to security incidents with automated workflows