Rapid7 is on a mission to drive the SecOps movement into the future, and we take that to heart with our holistic approach to security. Rapid7 has policies and procedures in place to keep our data, platform, and products secure, so that we can continue creating tools and services that keep our customers secure.


Our world class security program is driven by a blend of published standards and industry best practices:

Rest assured: Rapid7’s approach to security is established on four core pillars essential to trust.


Rapid7’s platform and products are designed to fit securely into your environment and adhere to security best practices.


You have access to your data when you need it and our operational status is always up to date.


Ensuring your data is used only in a manner consistent with your expectations is a responsibility we take very seriously.


You have full visibility into where your data lives, who has access to it, and how it is used.

Have questions? We have answers.

Trust FAQ

Read What’s New on the Rapid7 Blog

Patch Tuesday - October 2019
This month's Patch Tuesday is mainly notable in that there isn't a whole lot to note, which is a change of pace. No 0-days, no vulnerabilities that had been publicly disclosed already, and nothing that could allow worms to proliferate. And nothing from Adobe. Of course, that doesn't mean there's nothing...
Greg Wiseman
Okt 08, 2019
Read More
Exim Vulnerability (CVE-2019-16928): Global Exposure Details and Remediation Advice
This blog post was co-authored by Kwan Lin and Greg Wiseman. What is Exim? Exim is a widely used mail transfer agent (MTA) that was initially implemented for Unix-like systems, but has since been ported to other platforms like Microsoft Windows. It often functions as the backbone to email delivery systems...
Kwan Lin
Okt 01, 2019
Read More
[Podcast] CVE Numbering, Governance, and Advocacy with Katie Trimble and Chris Coffin
On this week’s episode of Security Nation, we had the pleasure of speaking with Katie Trimble of the Department of Homeland Security and Chris Coffin from MITRE. Katie is the deputy branch chief of the Vulnerability Management Coordination Disclosures Branch within the Cyber and Infrastructure Security...
Bri Hand
Sep 30, 2019
Read More

Kurz und knackig

Fortune 100 Unternehmen
Überwachte Assets
Petabyte verarbeitet
Überwachte Ports
Gescannte IPs