Trust

Rapid7 is on a mission to drive the SecOps movement into the future, and we take that to heart with our holistic approach to security. Rapid7 has policies and procedures in place to keep our data, platform, and products secure, so that we can continue creating tools and services that keep our customers secure.

Compliance

Our world class security program is driven by a blend of published standards and industry best practices:

Rest assured: Rapid7’s approach to security is established on four core pillars essential to trust.

Security


Rapid7’s platform and products are designed to fit securely into your environment and adhere to security best practices.

Availability


You have access to your data when you need it and our operational status is always up to date.

Privacy


Ensuring your data is used only in a manner consistent with your expectations is a responsibility we take very seriously.


Transparency


You have full visibility into where your data lives, who has access to it, and how it is used.



Have questions? We have answers.

Trust FAQ

Read What’s New on the Rapid7 Blog

Decentralize Remediation Efforts to Gain More Efficiency with InsightVM
Let’s talk about the reality of the remediation process today. We know it is often a cumbersome and time-consuming process, and it can be challenging for a Security team to work with IT Operations and Development teams, servicing many assets and owners. There isn’t a vulnerability management team on...
Tori Sitcawich
9 17, 2020
Read More
CVE-2020-1472 "Zerologon" Critical Privilege Escalation: What You Need To Know
Updates September 16, 2020 Samba domain controllers before 4.8 have been confirmed to be vulnerable to CVE-2020-1472. There are now multiple public PoC exploits available, most if not all of which are modifications to Secura’s original PoC built on Impacket. There are reports of the vulnerability's being...
Caitlin Condon
9 14, 2020
Read More
Vulnerability Remediation vs. Mitigation: What’s the Difference?
Vulnerability management programs look different depending on the available resources and specific risks your organization faces. While both identifying and evaluating possible threats are important steps, the most time-consuming step is actually treating the vulnerability. Here’s where remediation and...
Tori Sitcawich
9 14, 2020
Read More
141を超える国と地域で
9,000社が厚い信頼を寄せるRapid7
すべてのお客様を表示