Security Advisory Services
Training & Certification
Request a Proposal
User Behavior Analytics
By Compliance Requirement
Find a Partner
Become a Partner
News & Press Releases
Events & Webcasts
Below are some recommended resources on Metasploit. For a full list of Metasploit resources, click here.
Knowing the adversary’s moves helps you better prepare your defenses. Metasploit, backed by a community of 200,000 users and contributors, gives you that insight. It’s the most impactful penetration testing solution on the planet. With it, uncover weaknesses in your defenses, focus on the highest risks, and improve your security outcomes.
A penetration test is often a key requirement for compliance with key regulations. But while many organizations know they need penetration testing, it can be hard to know how to fit them in to a larger security program, or even how to get started.
Our white paper, "What Is Penetration Testing? An Introduction for IT Managers," is a clear and succinct introduction to the core principles and best practices of penetration testing.
As one of more than 5,000 employees, Steve’s role includes the management of Wiltshire residents’ personal information. He says, “In my role I have a duty to protect this information as well as providing support, maintenance, and strategic advice to more than 350 diverse services. It is vital therefore that the IT service provided is both efficient and effective.” Using Rapid7 Nexpose and Metasploit helps him deliver what’s needed.
New to the concept of penetration testing? Check out this simple infographic to learn why it's important, what's typically involved, and best practices to set yourself up for success.
It seems like we’ve been hearing a lot about phishing in the news in recent years, and this threat hasn’t abated yet. Why are attacks via phishing –and social engineering in general —so prevalent and so effective? This white paper examines the many different methods employed in phishing attacks and social engineering campaigns, and offers a solution-based approach to mitigating risk from these attack vectors.