Skip to main content
Integrate RAD Security with your Security Information and Event Management (SIEM) platform to centralize security monitoring and correlation.

Benefits

Centralized Monitoring

Consolidate RAD Security events with other security data sources

Advanced Correlation

Correlate runtime security events with network, endpoint, and cloud logs

Compliance Reporting

Aggregate logs for compliance requirements and audit trails

Long-term Retention

Store security events in your SIEM for extended retention periods

Supported Integrations

Status: AvailableView Setup Guide →Forward RAD Security events to Splunk Enterprise for advanced analytics and correlation.Key Features:
  • HTTP Event Collector (HEC) integration
  • Bi-directional data flow
  • Query API support
  • Advanced correlation
Status: AvailableView Setup Guide →Stream security events to CrowdStrike Falcon NextGen SIEM for unified threat analysis.Key Features:
  • Bi-directional data flow
  • OAuth2 authentication
  • HEC data ingestion
  • Advanced threat correlation
Status: AvailableView Setup Guide →Connect with Rapid7 InsightIDR for user behavior analytics and incident detection.Key Features:
  • User behavior analytics
  • Attacker behavior detection
  • Automated investigation
  • Incident response

Event Types

RAD Security can forward the following event types to your SIEM:
  • Process executions
  • Network connections
  • File system access
  • Container activities
  • Kubernetes events
  • Anomaly detections
  • Policy violations
  • AI agent activities
  • Suspicious behaviors
  • Attack indicators
  • User activities
  • Configuration changes
  • Integration status
  • System health

Getting Started

1

Configure SIEM Endpoint

Set up a data ingestion endpoint in your SIEM platform
2

Add Integration

Configure the SIEM integration in RAD Security’s Data Sources
3

Select Event Types

Choose which event types to forward to your SIEM
4

Test Connection

Verify events are being received and parsed correctly

Next Steps