Optimizing security operations in the work-from-home era

Your automation playbook

The world of IT and security has changed overnight

Only a few short months ago, only 3.5% of employees worked remotely. Today, that number has jumped to 74%. That is an incredible shift in daily operations, particularly in the way IT and security teams work.

At Rapid7, our job is to help you stay secure. That means helping you adapt to changing environments—ensuring you have the visibility and expert guidance you need to take action.

And that’s where InsightConnect—our security orchestration and automation solution—comes into play.

How automation helps

New phishing threats; increased friction in collaborating and communicating remotely; less time and more interruptions—these are just a few of the problems our customers are facing daily.

By automating tasks using Slack and Microsoft Teams-driven workflows, security teams can improve collaboration, accelerate decision-making, and increase efficiency when investigating, responding to, and remediating incidents. Without the need to switch between user interfaces, you will save valuable time without sacrificing visibility.

What we’re offering

Free access to InsightConnect

Explore our security orchestration and automation solution for 90 days at no cost.

Ready-to-use workflow templates

Get instant time-to-value through our Work-from-Home Automation Playbooks designed to tackle new phishing threats and remote work challenges.

Expert guidance on automation

Access getting started videos and documentation for rapid deployment.

Access to our community forum

Join fellow security peers and Rapid7 experts to discuss and collaborate on challenges you're facing.

Get Access

Check out the workflows in our Phishing Tackle Box

Indicator Enrichment

Indicators of compromise (IOCs) are crucial in positively identifying phishing attempts. These workflows extract and enrich IOCs to help you confidently respond to reported phishes.

Ready-to-use workflows include:

  • Instant Indicator Enrichment Commands
  • URL Enrichment
  • IP Enrichment: Perform GeoIp or reputation lookups
  • Hash Enrichment
  • Unshorten URLs
Learn More

Phishing Alerts

Email is dead. Long live email. Forward alerts and key data points from reported phishing emails to Slack or Microsoft Teams.

Ready-to-use workflows include:

  • ChatOps Phishing Alerts
Learn More

Email Remediation

One phish, two phish, red phish, true phish. Use these workflows to delete phishing emails, find who else may have been targeted, and block the sender.

Ready-to-use workflows include:

  • Find and Delete Emails
  • Purge Emails
  • Block Senders and Domains
Learn More

User Containment

Compromised user credentials are a common thread through security incidents and breaches across organizations and threat actors. These workflows help you disrupt the attacker’s kill chain by preventing them from using compromised user credentials for infiltration and lateral movement.

Ready-to-use workflows include:

  • Disable Domain User Account
  • Reset Domain User Account Password
Learn More

Improve your team’s efficiency today

Try InsightConnect

Try InsightConnect

No credit card required. All fields are mandatory.

    Sorry your request cannot be completed at this time. Please reach out to sales at +1-866-7RAPID7 or at sales@rapid7.com.

    Learn from our experts and stay updated

    Our experts all around Rapid7 are eager to help you manage — and we’re putting their tips, tricks, and guidance into blogs and other assets for you. Stay tuned here as we’ll continue to add more along the way.

    Assessing Our New Security Landscape: Business Continuity Amid Shifting Priorities
    May 29, 2020
    Read More
    Supporting Our Medical Professionals in the Age of COVID-19: Cybersecurity in the Healthcare Sector
    Michael Cole
    May 26, 2020
    Read More
    Integrity Is Indispensable: Assessing Partnerships and Performance Metrics in a Crisis Response
    May 19, 2020
    Read More
    Optimizing Security in the Work-From-Home Era
    boB Rudis
    May 11, 2020
    Read More
    Staying Healthy and Secure: How to Promote a Culture of Productivity While Keeping Your Security Posture Intact
    Apr 30, 2020
    Read More
    The Healthcare Security Pro's Guide to Ransomware Attacks
    Jeremiah Dewey
    Apr 27, 2020
    Read More
    Stuck Inside? Top Books We Recommend Security Pros Read During Quarantine
    Bri Hand
    Apr 22, 2020
    Read More
    Resources on the Main Street Lending Program to Support Small and Mid-Sized Businesses
    Harley Geiger
    Apr 20, 2020
    Read More
    Remote Work Readiness: How to Keep a Security Mindset
    Bri Hand
    Apr 13, 2020
    Read More