Rapid7 Unveils Two Innovative Solutions to Deliver Visibility, Insight and Progress Trending for Information Security Professionals
Community Open Data Initiative Launched During DerbyCon Keynote to Foster Greater Security Understanding and Collaboration
Boston, MA – August 20, 2013 - Rapid7 showcased two new IT security insight solutions today at UNITED 2013, Rapid7's security summit. Lee Weiner, senior vice president of products and engineering at Rapid7, highlighted both the vision and benefits of Rapid7 ControlsInsight and Rapid7 UserInsight.
"Our ambition is to make it easy for defenders to get insight into their increasingly complex environment, so they can act effectively to manage and reduce security risk. We call this 'insight driving action,'" explained Lee. "It's difficult for security professionals to sift through the noise that's bombarding them and identify relevant threats so they can communicate the current state of their organization's security. It's even harder to gauge what's working and what's not, and where further investment or action is needed. We aim to give them this insight, and help them achieve progress in reducing risk."
ControlsInsight and UserInsight focus on two core areas: the effectiveness of security controls in place, and the risk associated with the users across an organization. This is a logical advancement of Rapid7's risk analytics and management portfolio, which includes leading vulnerability management software, Nexpose, the world's most popular penetration testing tool, Metasploit, and mobile risk management solution, Mobilisafe. Built on Rapid7's fast, comprehensive data collection and contextual threat awareness, these solutions provide unmatched visibility for risk management across assets, users, networks, and services whether on-premise, mobile, or cloud-based.
According to industry analyst firm, Gartner, worldwide security software revenue totaled $19.2 billion in 20121. The vast majority of this spend is focused on controls to protect assets, data, and users. Many organizations now have thousands, or even tens of thousands, of controls in place to protect themselves, and few have a true gauge of how effectively these controls are deployed, how well they are configured, and how well they protect against the real and current threats the organization faces.
Rapid7 ControlsInsight addresses this by providing visibility into these security controls. With the first version of ControlsInsight, security professionals and business leaders can see how well their endpoint security controls are performing, whether the right investments are being made and fully utilized, and where further investment is needed. Users can also track progress in reducing risk over time. These capabilities are based on a unique threat model that is built on Rapid7's deep understanding of the threat landscape, combined with risk management best practices from the Company's broad customer base.
Future editions of ControlsInsight will focus on the controls deployed for other areas of an organization's information security program.
"Corporate endpoints remain one of our largest security concerns and are the source of many of today's security breaches," said Chad Currier, IT infrastructure director, Cardinal Innovations Healthcare Solutions. "Not knowing the state of our endpoints is a risk that our organization cannot afford to take. Rapid7 ControlsInsight has provided our organization with visibility and insight that we cannot get anywhere else. It makes managing our endpoints easier, and that is appreciated by those of us with smaller security teams."
Evolving IT usage models, such as the adoption of employee-owned smart phones and proliferation of cloud services, have resulted in an organization’s employees representing considerable risk. For example, according to the 2013 Verizon Data Breach report, 76% of network intrusions reported in 2012 exploited weak or stolen credentials2.
Whether it is a user having their credentials compromised, unintentionally opening a malicious attachment, clicking on a dangerous link, losing a smart phone connected to the corporate network, or using an insecure cloud service without the knowledge of the IT team, security professionals need to be aware of the risks associated with end-users in their organizations. Protecting the organization by securing the perimeter has become considerably more complex as every user is now a point on the perimeter. IT professionals must now consider how they protect assets that they don’t directly manage, such as mobile devices and cloud services.
Rapid7 UserInsight uniquely addresses this need by monitoring user activity across on-premise, cloud, and mobile environments to provide comprehensive visibility, more effective incident response, and detection of compromised credentials. Through native integration, security teams can see beyond the corporate network to activity with key cloud services, such as SalesForce and Box. Access to these cloud-based business services from personal devices is monitored as effectively as access from within the firewall. With comprehensive insight into user activity, security professionals can greatly reduce the time required to identify compromised users and investigate risks to the network.
"Monitoring user activity across on-premise, cloud and mobile environments helps to secure our environment today and into the future," said Robert Jones, information security manager, City of Corpus Christi. "We've been involved with Rapid7 UserInsight since the beginning and were able to use the beta version of the product to detect new things in our network."
Rapid7 security analytics software and services reduce threat exposure and detect compromise for 3,000 organizations across 78 countries, including over 250 of the Fortune 1000. We understand the attacker better than anyone and build that insight into our solutions to improve risk management and stop threats faster. We offer advanced capabilities for vulnerability management, penetration testing, controls assessment, incident detection and investigation across your assets and users for virtual, mobile, private and public cloud networks. To learn more about Rapid7 or get involved in our threat research, visit www.rapid7.com.