1
Welcome
2
Connect
3
Configure
4
Test

Welcome to RedEye

AI-powered security alert triage that works 24/7

Automated Alert Investigation

RedEye analyzes every security alert, identifies false positives, and escalates real threats—all in under 30 seconds.

Works with Your SIEM

Integrates with Splunk, Microsoft Sentinel, CrowdStrike, and more. No need to replace your existing tools.

Actionable Intelligence

Get MITRE ATT&CK mappings, evidence timelines, IOCs, and recommended response actions for every alert.

// setup takes ~3 minutes

Connect Your SIEM

Select your security platform and provide connection details

S

Splunk

Connect via HTTP Event Collector

M

Microsoft Sentinel

Azure AD authentication

C

CrowdStrike

Falcon API integration

P

Palo Alto

Cortex XDR and Prisma

O

Okta

Identity and access alerts

S

Suricata

Open source IDS/IPS

Configure Alert Ingestion

Choose which alerts to send to RedEye for triage

Severity Thresholds

Select which alert severities you want RedEye to analyze

Alert Sources

Optionally filter by specific alert types

You're All Set!

RedEye is ready to start triaging your security alerts

Test Alert Submission

We'll send a sample alert through your pipeline to verify everything is working

SIEM connection established
Alert ingestion configured
AI triage engine ready