cookie settings at any time, however disabling cookies may prevent you from using parts of our website. More about Rapid7's Privacy & Cookies Policy.
Learn how to make faster, smarter security decisions with our security management resources
These security management resources share best practices, guide you through successful implementations and help you understand the power of truly knowing your threat and risk posture.
Become an SAP Pwn Star: Using Metasploit for ERP Security Assessments
In this technical webinar for penetration testers, Metasploit developers and security researchers Tod Beardsley and Juan Vazquez from the Metasploit team, give an introduction to SAP for penetration testers. The webcast introduces viewers to the most important components of SAP and gives an overview of Metasploit modules for SAP provided by community contributors. This webinar includes a demo.
This paper explains how Rapid7 Nexpose uses an expert system to achieve better results in vulnerability scanning compared to traditional procedural methods. After a brief discussion of the product objectives and implementation, this paper explores the use of expert systems to achieve accurate and detailed vulnerability results.
There is a security risk in your organization that can render all of your security controls worthless with a single click. It is dynamic and changes in real-time. It is the weakest link in your infrastructure, and no singular security appliance or software exists that can lock it down. What's more, you have not one but hundreds-perhaps thousands-of these risks, each sitting behind a desk in your organization. While users represent the single largest security risk to organizations, there are measures you can put in place to mitigate the risk they can introduce to your organization. This eBook explores the different kinds of user-based risks in today's corporate environment, including mobile devices and cloud services, and gives actionable guidance on how to mitigate these risks.
For the 4th Consecutive year, Rapid7 rates "Strong positive" - the highest possible rating. Find out how Vulnerability Assessment solutions can benefit you and why Gartner gives Rapid7 Nexpose top marks.
Negative media coverage, a loss of customer confidence, and the resulting loss in sales can cripple a business. As a result, all entities that handle credit cardholder information are being challenged to adopt more effective data protection measures. The Payment Card Industry (PCI) Data Security Standard (DSS) was created to confront the rising threat to credit cardholder personal information. This compliance guide will provide readers with an overview of the requirements as well as suggested steps in achieving PCI compliance.
When private medical records are breached, healthcare service providers suffer damage to their brand, reputation, loss of trust from their patients, and severe financial repercussions. The Health Insurance Portability and Accountability Act of 1996 (HIPAA) mandates that appropriate administrative, technical, and physical safeguards be used to protect the privacy and security of sensitive health information. This compliance guide will provide readers with an overview of the requirements as well as suggested steps in achieving HIPAA compliance.
Justin Kennedy, Principal Security Consultant at Integralis, explains why Integralis chose Rapid7's Nexpose and Metasploit for their security needs. Integralis has been a Rapid7 customer since 2009, and they made the choice to use Rapid7 thanks to outstanding customer support and engagement, as well as robust product features that help him do his job more easily and efficiently. For example, Justin cites Metasploit's social engineering capabilities as a feature that puts Rapid7 ahead of the pack.
Ghouls and goblins abound in the security landscape, and organizations still fall victim to the same old tricks. Rapid7 investigated this spooky phenomenon, highlighting a number of threats that continue to get worse, not better.
In this product brief learn how Mobilisafe's key features and approach make it the ideal mobile security solution for BYOD. Detailed descriptions of Mobilisafe's key features and design architecture are included.
This data sheet provides a general overview of Rapid7 Nexpose. It describes the product's core functionality and explores how Rapid7 customers leverage Nexpose to conduct unified vunerability management.
Read this review of Rapid7 Nexpose to understand why Peter Stephenson of SC Magazine said the product "is a feature-packed vulnerability assessment and risk analysis tool that always goes beyond expectations.
West Coast Labs engineers set up a test network with multiple operating systems running at different patch levels,with each of these machines having many security flaws and vulnerabilities in order to replicate the heterogeneous nature of many corporate networks. Read their report to understand how Rapid7 Nexpose was tested and how it succeeded in achieving the Check Mark Certification.
Aggregated views across an organization help quickly assess the number of mobile users, devices, operating systems and their configurations. In this video, see how this information is presented via the Mobilisafe dashboard.