Skip to main content
The RAD Security platform consists of six core components that work together to provide comprehensive security coverage and intelligent automation.

Core Platform Components

RADBot

Your AI security assistant for expert guidance, task automation, and intelligent analysis

AI Workers

Deploy specialized AI agents for threat hunting, incident response, and security automation

Evidence Room

Centralized repository where RAD correlates and collects raw security findings

Knowledge Base

Centralized repository of security knowledge, best practices, and learning resources

System Settings

Configure platform settings, integrations, and security policies

Data Sources

Connect to 100+ security tools and data sources for unified visibility

How Components Work Together

RADBot and AI Workers work together to provide intelligent analysis and automated response. RADBot handles user queries and guidance, while AI Workers execute specialized security tasks.
The Knowledge Base (BETA) serves as the foundation for both RADBot and AI Workers, providing them with up-to-date security information, best practices, and contextual knowledge.
The Evidence Room serves as the central repository where all security findings are collected, correlated, and analyzed. It provides the raw data that powers AI analysis and decision-making.
Data Sources provide the comprehensive security telemetry and threat intelligence that feeds into the Evidence Room and powers all AI components.
System Settings enable you to configure how all components interact, set security policies, and customize the platform to your organization’s needs.

Ready to Optimize Your Security Operations?

Schedule Platform Review

Get expert guidance on optimizing your RAD Security deployment

Join Community

Connect with other security professionals using RAD Security

Next Steps

Quickstart Guide

Get up and running with RAD Security in minutes

How RAD Works

Learn about RAD’s AI-powered approach to cybersecurity

Connect Data Sources

Integrate your security tools and infrastructure

Deploy AI Workers

Configure specialized AI agents for security automation