Rapid7 is on a mission to drive the SecOps movement into the future, and we take that to heart with our holistic approach to security. Rapid7 has policies and procedures in place to keep our data, platform, and products secure, so that we can continue creating tools and services that keep our customers secure.


Our world class security program is driven by a blend of published standards and industry best practices:

Rest assured: Rapid7’s approach to security is established on four core pillars essential to trust.


Rapid7’s platform and products are designed to fit securely into your environment and adhere to security best practices.


You have access to your data when you need it and our operational status is always up to date.


Ensuring your data is used only in a manner consistent with your expectations is a responsibility we take very seriously.


You have full visibility into where your data lives, who has access to it, and how it is used.

Have questions? We have answers.

Trust FAQ

Read What’s New on the Rapid7 Blog

Windows CryptoAPI Spoofing Vulnerability (CVE-2020-0601): What You Need to Know
What is the CryptoAPI Spoofing Vulnerability? Who is impacted? A flaw (CVE-2020-0601) has recently been found in the way the Microsoft Windows CryptoAPI performs certificate validation, allowing attackers to spoof X.509 vulnerabilities. This is core cryptographic functionality used by a number of different...
Jan 16, 2020
Read More
Patch Tuesday - January 2020
The first Patch Tuesday of 2020 has been hotly anticipated due to a rumour that Microsoft would be fixing a severe vulnerability in a fundamental cryptographic library. It turns out that the issue in question is indeed serious, and was reported to Microsoft by the NSA: CVE-2020-0601 is a flaw in the...
Greg Wiseman
Jan 14, 2020
Read More
Simplify Your Data Search with Query Builder in InsightVM
Security professionals responsible for vulnerability risk management are required to perform data querying and analysis on a regular basis to gain insights on the status of risk in their environments. The process of gathering the right data, digesting it, and deriving actionable insights from it is often...
Tori Sitcawich
Jan 13, 2020
Read More

Kurz und knackig

Fortune 100 Unternehmen
Überwachte Assets
Petabyte verarbeitet
Überwachte Ports
Gescannte IPs