Security Advisory Services
Training & Certification
Request a Proposal
User Behavior Analytics
By Compliance Requirement
Find a Partner
Become a Partner
News & Press Releases
Events & Webcasts
Combining endpoint visibility with log analytics for operational control
Rapid7 transforms data into insight, empowering IT and security professionals to progress and protect their organizations. How? Our solutions are powered by advanced analytics and an unmatched understanding of the attacker mindset. This makes it easy to collect data, transform it into prioritized and actionable insight, and get it to the people who can act on it—all in an instant.
This paper is the product of nearly a year's worth of opportunistic credential scanning data collected from Heisenberg, Rapid7's public-facing network of low-interaction honeypots. Instead of focusing on the passwords that end users typically pick, with this data we can see what opportunistic scanners are using in order to test— and likely compromise— Internet connected point of sale (POS) systems, kiosks, and scamware-compromised desktop PCs which offer the Remote Desktop Protocol (RDP) service for remote management.
We were able to reduce our vulnerability count by two-thirds inside of 12 months.
Excellent features at a great price. Our Best Buy this month.
They actually get it, and then want to make it better for everyone else.
InsightIDR is a great system. It gives you that warm feeling inside by catching any suspicious behavior on the network months before you’d otherwise discover it.
With Nexpose and Metasploit we saw a 70% decrease in vulnerabilities over the course of a year
Try Nexpose for Free