Posts tagged Detection and Response

6 min Managed Detection and Response

MDR Vendor Must-Haves, Part 9: Assigned Analyst Pods and Security Program Advisors

This blog post is part of an ongoing series about evaluating Managed Detection and Response (MDR) providers. For more insights, check out our guide, “10 Things Your MDR Service Must Do.”

5 min Managed Detection and Response

MDR Vendor Must-Haves, Part 8: Rapid7 Incident Response (Breach) Support

Having the best threat detection methodologies, a streamlined and efficient process for validating threats, and a rock-solid reporting standard may still leave you open to unexpected costs.

4 min Phishing

How to Turbocharge Your Phishing Response Plan

A quick reaction to a phishing threat can mean the difference between a massive breach or a fast fix.

5 min

MDR Vendor Must-Haves, Part 7: Managed Response Actions

Security teams face unprecedented challenges as the threat landscape expands in scope and complexity. Protecting the organization in today’s environment has led to analyst fatigue, with many organizations struggling to respond to both user and host threats in a timely manner.

2 min MDR

MDR Must-Haves, Part 6: Threat Validation and Detailed Reporting

Engaging a managed security service provider—either a traditional MSSP or MDR provider—should never involve wasting your time.

4 min MDR

MDR Vendor Must-Haves, Part 5: Multiple Threat Detection Methodologies, Including Deep Attacker Behavior Analysis

The best Managed Detection and Response (MDR) providers use a combination of threat intelligence, User Behavior Analytics (UBA), Attacker Behavior Analytics (ABA), and human threat hunts to provide detection for threats and attackers.

3 min InsightIDR

What’s New in InsightIDR: Q1 2021 in Review

Back at the start of the year, we reflected on some of our 2020 InsightIDR product investments and took a look at what was ahead in 2021. As the first quarter of the year comes to a close, we wanted to offer a closer look at some of the recent updates and releases in InsightIDR.

2 min Managed Detection and Response

MDR Vendor Must-Haves, Part 4: Ingestion of Authentication Data Across Local, Domain, and Cloud Sources

There isn’t a single threat or breach that doesn’t involve attackers using legitimate credentials to cause harm.

4 min Detection and Response

InsightIDR’s Log Search: Recent Enhancements and Upcoming Investments

We recently (virtually) sat down with Mirela Smlatic, a Senior Product Manager for Detection and Response at Rapid7, to hear about enhancements and upcoming investments into InsightIDR’s Log Search capabilities.

2 min Managed Detection and Response

MDR Vendor Must-Haves, Part 3: Ingestion of Other Technology Investments

By the time you’re ready to invest in a Managed Detection and Response (MDR) service, you’ve likely already invested in a number of different security tools aimed at preventing threats and detecting breaches. MDR is a continued investment in this technology, not always a pure replacement.

3 min Managed Detection and Response

MDR Vendor Must-Haves, Part 2: Ingestion of Network Device Data

One area that can offer incredible benefits in a Managed Detection and Response provider is the ingestion of network device data.

4 min Detection and Response

Attack vs. Data: What You Need to Know About Threat Hunting

While the definition of threat hunting may be straightforward—proactively hunting for threats—the reality of implementing a threat-hunting program is a bit more complicated, as there are different threat-hunting methodologies to choose from.

5 min Managed Detection and Response

Rapid7 Recognized as a Strong Performer in the Inaugural Forrester Wave™ for MDR, Q1 2021

Rapid7 has been included among the top vendors in the inaugural Forrester Wave™: Managed Detection and Response, Q1 2021 and recognized as a Strong Performer.

3 min Managed Detection and Response

MDR Vendor Must-Haves, Part 1: Deep Observation of Real-Time Endpoint Data

Assessing Managed Detection and Response (MDR) vendors is no easy task. However, evaluating each based on predetermined tactical prescriptions for what a provider can offer your business can help ensure you are hiring the right fit for you and your team.

18 min Zero-day

Defending Against the Zero Day: Analyzing Attacker Behavior Post-Exploitation of Microsoft Exchange

In recent weeks, there has been quite a lot of reporting on the exploitation of the latest disclosed vulnerabilities in Microsoft’s Exchange Server by an attacker referred to as HAFNIUM.