• slide
  • slide
  • slide


Rapid7 (NASDAQ:RPD) powers the practice of SecOps by delivering shared visibility, analytics, and automation so that security, IT, and Development teams can work together more effectively. The Rapid7 Insight platform empowers these teams to jointly manage and reduce risk, detect and contain attackers, and analyze and optimize operations. Rapid7 technology, services, and research drive vulnerability management, application security, incident detection and response (SIEM), orchestration and automation, and log management for more than 7,200 organizations across more than 120 countries, including 54% of the Fortune 100. To learn more about Rapid7 or join our threat research, visit www.rapid7.com.


  • Insight VM

    Vulnerability assessment for the modern environment

    • Collect data across your ecosystem to identify and assess risk in cloud, virtual, remote, local, and containerized infrastructure.
    • Prioritize vulnerabilities more precisely with unparalleled attacker analytics and a Real Risk score that goes beyond just CVSS.
    • Break down silos between IT, security and development to streamline and automate remediation efforts.
  • InsightIDR

    Detect stealthy behavior behind breaches

    • Unify your security data across all events and logs, no data expertise, hardware or parses required.
    • Detect attacker behaviors like stolen credentials, malware, and phishing earlier, before things get critical.
    • Prioritize your search with User and Attacker Behavior Analytics to accelerate incident investigation by 20x.
  • InsightAppSec

    Detect stealthy behavior behind breaches

    • Automatically assess modern web apps and APIs with fewer false positives and missed vulnerabilities.
    • Collaborate with speed through rich reporting and integrations that help inform compliance and development stakeholders.
    • Scale and effectively manage the security assessment of your application portfolio, regardless of its size.
  • InsightConnect

    Orchestration and automation to accelerate your teams and tools

    • Connect your teams and tools for clear communication and complete integrations across your tech stack.
    • Automate your manual, repetitive tasks with connect-and-go workflows - no code necessary.
    • Accelerate operations with automation that creates efficiency without sacrificing control.
  • InsightOps

    A simple approach to infrastructure monitoring and troubleshooting

    • Collect and centralize data from any source, in any format.
    • Search and analyze logs using simple keywords or analytic functions to find answers.
    • Monitor metrics like CPU, memory, and disk usage, receive real-time alerts, and review live dashboards and scheduled reports.
    • Troubleshoot by asking natural-language questions to monitor software usage, audit user logins, identify network misconfigurations, and more.
  • InsightPhishing

    Phishing identification, analysis and simulation

    • Cast simulated phishing attacks to train employees, quantify risk, and harden workforce resiliency.
    • Catch potential attackers by empowering employees to report suspected phishing attempts directly from their email clients.
    • Classify and respond to attacks with analysis powered by key indicators of Phishing (IOPs).
  • Metasploit

    Penetration testing software for offensive security teams

    • Gather together the collective knowledge of a global security community to test your network and find your holes.
    • Determine the most impactful vulnerabilities and focus on what matters most.
    • Verify the likelihood and impact with real-world attacks, fix top exposures, and check that they are patched.


Election Security: What You Need to Know

Today, I want to talk about pretty much the opposite of that, and put together an explainer on one of the most written-about information security challenges we have today, covering everything from the weaknesses of individual voting machines, to the information ecosystem they participate in, through the human factors exploited by phishing and election day anxiety. Click Here to Read More...


Archived Events



Detecting active compromise inside IT environments as part of an incident detection and response program is critical. Rapid7 experts have identified the seven best practices for an effective cybersecurity program by applying defense to detection and response. Download the guide to access the bes...

Product Brief

Protecting your business from vulnerability and compromise. Optimizing your operations for success. Your daily responsibilities don’t have to be so daunting: The solution is SecOps, an organizational practice that breaks down the silos between Security, IT, and Development. Learn more about ho...


Today’s security and IT teams are understaffed and overloaded with tools, techniques, languages, processes… the list goes on. And with the talent shortage growing by the day, it can feel like keeping up is nothing but a pipe dream. But have no fear, security orchestration and automation (SOA...

Launched in 2017, “Under the Hoodie” aims to demystify the practice of penetration testing by surveying those in the field on what they see during client engagements—all to determine countermeasures you can take to best detect and prevent the truly sinister folks from breaching your network. W...

Solutions Brief

In this solution guide, we highlight how Rapid7 is helping our customers evolve their vulnerability management programs to meet today’s challenges. We focus on four areas: Enhancing network vulnerability assessment, addressing web application vulnerabilities, protecting employees and mitigatin...


In this buyer’s guide, get an overview of today’s SIEM market, insight into what SIEM vendors can (and should) offer, and practical advice for choosing your first (or next) SIEM.