Red Canary AI agents cut security investigation times by 90%
Red Canary launches AI agents that reduce security investigation times by 90%, automating tier 2 tasks with expert-level speed and accuracy.
Red Canary has unveiled a suite of AI agents designed to perform Tier 2 security investigations with the speed and precision of seasoned analysts. These agents have already conducted over 2.5 million investigations, slashing average investigation times by 90%. Trained on a decade of operational data, the agents excel at contextual gathering, alert enrichment, and recommending actions for identified threats, aiming to reduce alert noise and help security teams manage evolving risks without added complexity.
Automating Manual Security Tasks
The AI agents specialize in every phase of detection, investigation, and response, covering roles such as:
- SOC analyst
- Detection engineering
- Threat intelligence
- User analysis
They automate both Tier 1 and Tier 2 tasks across environments like cloud, identity, SIEM, and endpoint systems, enabling faster root cause analysis and remediation. A dedicated threat intelligence agent compares threats against known profiles, identifying new trends and enhancing intelligence operations.
Efficiency and Impact
Red Canary reports that customers have reduced investigation times from over 20 minutes to under three minutes on average, with a 99.6% customer-validated true positive rate. The system is enterprise-grade, trained on 10 years of real-world data, and continuously overseen by security operators to ensure reliability.
"Several years ago, we introduced automation to replace repetitive Tier 1 work," said Brian Beyer, CEO and Co-founder of Red Canary. "Now, by combining the best of agentic AI with AI agents equipped with years of frontline experience, we're accelerating Tier 2 investigations with the speed of automation and the judgment of experienced analysts. This allows our detection engineers to focus on Tier 3-level analysis, delivering deeper insights for customers."
Practical Use Cases
-
Anomalous Login Detection: A user behavior analysis agent flagged a suspicious Salesforce login missed by other tools. A reputation analysis agent added context by linking the login to a high-risk IP. Red Canary validated the threat, enabling the customer to .
Related News
AWS extends Bedrock AgentCore Gateway to unify MCP servers for AI agents
AWS announces expanded Amazon Bedrock AgentCore Gateway support for MCP servers, enabling centralized management of AI agent tools across organizations.
CEOs Must Prioritize AI Investment Amid Rapid Change
Forward-thinking CEOs are focusing on AI investment, agile operations, and strategic growth to navigate disruption and lead competitively.
About the Author

Dr. Lisa Kim
AI Ethics Researcher
Leading expert in AI ethics and responsible AI development with 13 years of research experience. Former member of Microsoft AI Ethics Committee, now provides consulting for multiple international AI governance organizations. Regularly contributes AI ethics articles to top-tier journals like Nature and Science.