Posts by Katherine A. Hayes

3 min SIEM

Hide and Seek: Three Unseen Costs in Your SIEM Products

As the saying goes, ‘there is no such thing as a free lunch.' In life, including the technology sector, many things are more expensive than they appear. A free game app encourages in-app purchases to enhance the playing experience, while a new phone requires a monthly plan for data, calling, and texting capabilities. In the security industry, one technology that stands out for its hidden costs is Security Information and Event Management (SIEM) tools [https://www.rapid7.com/solutions/siem.jsp].

1 min InsightIDR

451 Research Reviews Rapid7 InsightIDR: "Blazing New Trails for Corporate Security."

451 Research, a global IT technology analyst firm, recently reviewed our Incident Detection & Response [https://www.rapid7.com/solutions/incident-detection/] solution, InsightIDR. The report praises the User Behavior Analytics [https://www.rapid7.com/products/insightuba/user-behavior-analytics-user-activity-monitoring.jsp] (UBA) in the solution, and importantly it also supports our corporate mission: “We believe products such as InsightIDR are blazing new trails for corporate security, to a w

4 min SIEM

When Your SIEM Tools Are Just Not Enough

Security Information and Event Management (SIEM) tools have come a long way since their inception in 1997. The initial vision for SIEM tools [http://www.rapid7.com/resources/videos/5-ways-attackers-evade-a-siem.jsp] was to be a ‘security single pane of glass,' eliminating alert fatigue, both in quantity and quality of alerts. Yet the question still remains: have SIEMs delivered on that promise, and if so, can every security team benefit from one? In this blog we'll dive a bit into the history be

5 min Incident Detection

What is Incident Detection and Response?

Incident detection and response [https://www.rapid7.com/products/insightidr/], also known as attack/threat detection and response, is the process of finding intruders in your infrastructure, retracing their activity, containing the threat, and removing their foothold. By learning how attackers compromise systems and move around your network, you can be better equipped to detect and stop attacks before valuable data is stolen. This blog covers the different components of the attack lifecycle to h