Threat Exposure Management
Reduce Your Risk of a BreachManage your risk by identifying where you are vulnerable to an attack. Systematically reduce your exposure, based on threats and priorities to your organization.
Incident Detection & Response
Find the Attacks You’re MissingFrom the endpoint to the cloud, quickly find intruders, trace their tracks, and stop the breach before the damage is done.
Security Advisory Services
Accelerate Security ImprovementIncrease confidence in your security with access to trusted security expertise, data-driven analysis and industry knowledge. Let us help you build a roadmap for your IT security needs.
Streamline and automate your compliance requirements and improve your security posture with Rapid7 security compliance solutions.
Learn more about the security challenges in your industry and how Rapid7's information security solutions can help.
- Threat Exposure Management
Software & Services
Perform effective vulnerability management to combat today's threats.
Test your defenses more efficiently with Metasploit.
Detect compromised credentials and investigate incidents to stop attacks — fast.
Rapid7 has skilled resources ready to help you whether you need deployment and training for Rapid7 products or security assessment services, such as penetration testing.
Product Training & Certification
Get the most out of your Rapid7 products and services.
- Community & Blog
Get started with our free security tools today, see where you are at risk.
- Videos & Media
- Papers & Guides
Search all of our resources.
Meet our Executive Leadership Team and Board of Directors.
Our partners are an important part of our network. They extend the value of our solutions and gain a strategic advantage in their own businesses. Together, we work to ensure customer success.
We're proud to have gained the confidence and backing of market-leading venture capital firms.
Rapid7’s mission is to develop simple, innovative solutions for security’s complex challenges. We understand the attacker better than anyone and build that insight into our security software and services.
Community is important to us. Whether it's the security, open source or local community, we want to help make it stronger. Here are some of the ways that we get involved, support and give back.
What’s happening now — from press and news to industry awards.
We look forward to discussing information security with you face-to-face. Meet us at an event to learn more about Rapid7 and our solutions.
In the News
Brighter outlook for Mass. businesses in 2013
Global Scans Reveal Internet's Insecurities in 2012
Americans Hacked Don't Know Commerce Chamber Left Them All Alone
13 hot Boston tech firms I'm watching in 2013 (slideshow)
Free Browser Scan Service Debuts
Tor network used to command Skynet botnet
Go Phishing: Rapid7 Lets Companies Test Their Own Networks
Are you afraid of the mobile monster? [infographic]
Boston-area tech sector is scrambling to fill jobs
Experts Downplay MySQL Database Zero-Days
Rapid7's new boss, Corey Thomas, talks cybersecurity
BII MOBILE INSIGHTS: Mobile App Sales To Exceed $30B This Year
New Rapid7 CEO: IPO still planned
5 Ways Small Businesses Can Improve Mobile Device Security
Hacking tool kits, available free online, fuel growing cyberspace arms race
MJM as Personified Evil Says Spyware Saves Lives Not Kills Them
Twitter compels more than necessary to change passwords
Update: Adobe Working to Confirm New Reader Zero-Day Sandbox-Bypass Exploit
Top Places to Work: Medium Companies
Federal agencies don't do enough to protect your data
FBI warns commercial spyware has made jump to Android
BYOD: Filling The Holes In Your Security Policy
Days Before Closing Its $5M Series B, Mobile Security Startup Mobilisafe Acquired By Rapid7
Security Firm Rapid7 Acquires Seattle's Mobilisafe
Rapid7 acquires Seattle BYOD security startup
7 Ways that Security Firm Rapid7 Is Bucking IT-Business Trends
94 Million Exposed: The Government's Epic Fail on Privacy
Forget Microsoft's Advice For Avoiding A Critical Internet Explorer Security Bug--Just Use A Different Browser
Security experts warn of bug in Microsoft's Web browser
Internet Explorer Could Have a Huge Security Hole
Critical zero-day bug in Internet Explorer under active attack
Microsoft pushes two patches and new cert requirement
Government Breaches Exposed 94 Million Records Over Three Years
Hackers Claim to Have 12 Million Apple Device Records
Oracle Quietly Releases Fix For Serious Java Security Bug--Months After It Was Reported
Java zero-day exploit goes mainstream, 100+ sites serve malware
Spyware Matching FinFisher Can Take Over IPhone and BlackBerry
Second Java zero-day found: Time to disable it, say experts
Latest Java software opens PCs to hackers - experts
U.S. looks into claims of security flaw in Siemens gear
Elusive FinSpy Spyware Pops Up in 10 Countries
Major companies still vulnerable to online data theft, report warns
FinFisher Spyware C&C server detected in US
FinFisher Spyware Reach Found on Five Continents: Report
Cuckoo Sandbox keeps open source malware analysis moving
The 9 most endangered species in the IT workforce
Rapid7 Metasploit Pro Increases Vulnerability Management Effieciency by Leveraging Penetration Testing Intelligence to Validate Security Risks
Syria Crisis: Wikileaks Reveals Syrian Security Got Communications Equipment from West
Attack on Yahoo email may spawn more phishing scams
Yahoo breach puts users of other sites at risk
4 Signs That Apple's Sharpening Its Security Game
14 Tips to Help New College Grads Land a (Good) IT Job
The 50 Most Powerful People In Enterprise Tech
Hackers exploit Windows XML Core Services flaw
Honeynet Project tackles USB-carried malware like Flame
MySQL Vulnerability Allows Attackers to Bypass Password Verification
Unbelievable: Top Ten Hacked LinkedIn Passwords
The 30 Most Popular Passwords Stolen from LinkedIn (INFOGRAPHIC)
LinkedIn Password Leak: The Top 30 Passwords Cracked (INFOGRAPHIC)
What do Jesus, dragons have in common? They're LinkedIn passwords
Some LinkedIn, eHarmony Passwords Leaked Online
A LinkedIn leak lesson: top 30 dumb passwords people still use
eHarmony Passwords Leaked Online As LinkedIn Community Reels From Similar Attack
If LinkedIn Hasn't Fixed Its Massive Security Breach, A New Password May Not Be Enough
Security experts say LinkedIn suffered data breach
UPDATE: LinkedIn Confirms Security Breach
When Venture Capitalists Become IT Consultants
Crimeware packs are the "Threat of the Month"
A Brief History of Tech Execs 'Doubling Down' On Things
Rapid growth fuels passionate team at Rapid7
Was Flame virus written by cyberwarriors or gamers?
Rapid 7 Outlines the Most Popular Metasploit Modules
UPDATE 3-UN agency plans major warning on Flame virus risk
High Tech Worker Shortage: Has Anything Changed?
Seven Questions About Security for Rapid7 CEO Mike Tuchen
Popular Surveillance Cameras Open to Hackers, Researcher Says
It's Not IF Your Data Will Be Hacked, It's WHEN. Here's How to Prepare
Rapid7 on track for $47M in revenue this year
10 Symptoms Of Check-Box Compliance
Microsoft's Patch Tuesday to Fix 23 Security Bugs
Microsoft names source of RDP code leak
Meet Boston's five fastest-growing private companies
9 more tech IPO candidates in Boston
Rapid7 scaling up rapidly in security market
BBJ announces Boston's Best Places to Work, 2012
Should You Disable Java on Your Computer?
Latest Mac Malware Attack Is a Wake-Up Call for OS X Users
Rapid7 taps former RSA director to lead new innovation center
Start-ups squeezed out of Kendall Square
Open Network Podcast With The First Two of the
Open Network Podcast With The First Two of the
Seeking to add 100 jobs, Rapid7 recruiting gets cinematic
Researchers Show How Easy a New Stuxnet-Like Attack Can Be
Mozilla moves to block Firefox from loading unpatched Java plugins
Rapid7 Announces First Two Winners Of Its Magnificent 7 Awards
Verizon report: Vast majority of cyberattacks in 2011 were avoidable
Apple Safari Patch Shows Products Not Hacker Proof
A Week of Critical Patches
Apple fixes 83 vulnerabilities in Safari
March's Microsoft Patch Tuesday Fixes 6 Vulnerabilities
Hacker Group Unveils Critical Attacks, Accused of Drawing a 'Road Map for the Bad Guys'
State of the Recruitment Union
Metasploit identifies IPv6 security risks
Rapid7 Teams with Modulo to Identify and Manage Business Impacts
Startups have potential to revolutionize their fields
BBJ honors your picks for 2012's 'Most Admired' executives, brands and companies (slide show)
Hackers Attack Video Conferences to Steal Secrets
Metasploit Updated to Address Risks Within IPv6
Making a Killer Pitch to VCs
Behind closed doors
Rapid7's Mike Tuchen on Cyber Espionage and Startup Lessons
Hackers listen as FBI talks to Scotland Yard
Rapid7 Nexpose Enterprise Edition
Corporate Video Conferencing Systems Fail Secure Implementation
Video conferencing mistakes make espionage easy, say researchers
New Year, New Jobs: Reinvigorating Your Employee Search
BBJ names Boston's Most Admired Cos., CEOs and Brands
Video Conferencing: An Easy Hack
Teleconferencing vendors defend security
Videoconference systems pose big security issue
I Spy Your Company's Boardroom
Most Video Conferencing Systems Are Vulnerable to Hackers [VIDEO]
Making sure your resume gets to the top of the pile
Rapid7's Metasploit to get SCADA Exploits
Five Companies Making Noise: ByteLight, HeyWire, Rapid7, Tap Lab, & Vivox