Welcome to #LaunchWeek. We’re rolling out a full week of product updates, feature drops, and workflow improvements ahead of Black Hat 2025. We’re kicking things off with one of the most important shifts we’ve made to how RAD operates.
RADBots are here.
Each RADBot is a focused digital worker designed to handle a specific security job. One monitors your cloud environment for risky behavior and alert-worthy events. One keeps track of vulnerabilities, exposures, and posture drift across your software and infrastructure. One helps you explore the “what ifs” and “wait, whats” with answers you can act on.
They can run workflows on your schedule, deliver structured updates, and report in on their discoveries.
If you're already a RAD customer, you'll see more RADBots showing up in your environment over time. Today, we’re introducing the first three and giving them a chance to explain what they do—in their own words.
CloudBot
Hey. I’m CloudBot.
I watch what’s happening across your cloud environment so you don’t have to. That means runtime signals, identity activity, drift, and risky behavior—across containers, services, and identities.
I surface what matters, skip what doesn’t, and give you a clean feed of high-fidelity alerts, not a wall of noise.
You’ll see me weigh in on things like:
- Suspicious role assumptions
- Containers talking to places they shouldn’t
- Lateral movement across clusters
- Indicators that something’s not quite right
Basically, I make sure you know what’s really happening in production and help you decide what needs action. Think of me as a way to stop over-broad detection and response findings from taking over your life.
Vuln Reporter
Hi, I’m VulnBot.
I track your vulnerabilities and exposures—across workloads, infrastructure, and software—and help you prioritize what’s risky in context.
I care about what’s exploitable, reachable, and actually matters in your environment—not just what’s in the CVE database.
You’ll see me flag:
- Your most vulnerable images across your entire environment
- New exploitable CVEs in packages you actually run
- Drifting posture that increases exposure
- Workloads that fail your hardening baselines
I help you spend less time chasing noise and more time reducing real risk. If you’ve ever stared at a vuln list wondering what to do next, I’m here to make that decision clearer and faster.
Ask RADBot
Hi there. I’m Ask RADBot.
I’m your always-on teammate for “no dumb questions,” ready to take on all your “what if?” and “wait, what?” musings.
Wondering why an alert fired? Want to know what VulnBot has seen lately? Curious about all containers running with root in production? Just ask.
I’ll pull from everything I know—your detections, exposures, configuration data, cloud provider logs, and more—and give you answers in plain English.
You’ll find me in the RAD UI and in Slack, ready to help with:
- Fast explanations
- Deep context
- What-if scenarios
- Investigations that don’t require pivoting through six tools
Think of me as your security sidekick—the one who remembers everything, explains clearly, and helps you move faster without losing clarity.
What’s Next
This is just the beginning of #LaunchWeek. Each day, we’ll be sharing another piece of the RAD platform and showing how they work together to drive real outcomes for security teams.
If you’re heading to Black Hat, come see the RADBots in action. They’ll be live in the booth, and we’d be happy to walk you through some of the ways they can make security work easier.
In the weeks and months ahead, we’ll be releasing RADBots for a wide range of use cases. Have a cool idea for a RADBot that could save your team time or money? Let us know.