cookie settings at any time, however disabling cookies may prevent you from using parts of our website. More about Rapid7's Privacy & Cookies Policy.
Learn how to make faster, smarter security decisions with our security management resources
These security management resources share best practices, guide you through successful implementations and help you understand the power of truly knowing your threat and risk posture.
5 Tips to Protect Your Small Business from Cyber Attacks
Small businesses don-t have a big budget for security tools. They often don-t even have the staff or in-house skills to run the security program they need to protect their network. For small businesses, most security tools are either too expensive or require too much manual work on the part of the administrator. But, these businesses are still vulnerable to attacks. Regardless of the industry, it-s merely a matter of time before an attacker targets any given company, whether the organization is aware of it or not. So, even small businesses like yours need to worry about security and possible attacks that will impact them. Watch this webcast to learn the 5 key steps your small business should take to protect against cyber-attacks.
Why a Layered Security Approach is the Key to Successful Security Programs
Watch this video to learn what it means to have a layered approach to security and how it can help you achieve your company's security goals. Bill discusses the types of tools that you should consider when building a layered security program.
Penetration testing can give you a clear view of the vulnerabilities that can easily be exploited within your environment; however, organizations need to be able to understand and test their users' behavior without anti-virus programs stopping these tests in their tracks. A great way to explore that user behavior is by deploying social engineering programs during a pen test. In this guide, penetration testers will learn how to evade anti-virus detection on target machines.
This paper explains how Rapid7 Nexpose uses an expert system to achieve better results in vulnerability scanning compared to traditional procedural methods. After a brief discussion of the product objectives and implementation, this paper explores the use of expert systems to achieve accurate and detailed vulnerability results.
For the 4th Consecutive year, Rapid7 rates "Strong positive" - the highest possible rating. Find out how Vulnerability Assessment solutions can benefit you and why Gartner gives Rapid7 Nexpose top marks.
Negative media coverage, a loss of customer confidence, and the resulting loss in sales can cripple a business. As a result, all entities that handle credit cardholder information are being challenged to adopt more effective data protection measures. The Payment Card Industry (PCI) Data Security Standard (DSS) was created to confront the rising threat to credit cardholder personal information. This compliance guide will provide readers with an overview of the requirements as well as suggested steps in achieving PCI compliance.
When private medical records are breached, healthcare service providers suffer damage to their brand, reputation, loss of trust from their patients, and severe financial repercussions. The Health Insurance Portability and Accountability Act of 1996 (HIPAA) mandates that appropriate administrative, technical, and physical safeguards be used to protect the privacy and security of sensitive health information. This compliance guide will provide readers with an overview of the requirements as well as suggested steps in achieving HIPAA compliance.
Justin Kennedy, Principal Security Consultant at Integralis, explains why Integralis chose Rapid7's Nexpose and Metasploit for their security needs. Integralis has been a Rapid7 customer since 2009, and they made the choice to use Rapid7 thanks to outstanding customer support and engagement, as well as robust product features that help him do his job more easily and efficiently. For example, Justin cites Metasploit's social engineering capabilities as a feature that puts Rapid7 ahead of the pack.
Ghouls and goblins abound in the security landscape, and organizations still fall victim to the same old tricks. Rapid7 investigated this spooky phenomenon, highlighting a number of threats that continue to get worse, not better.
In this product brief learn how Mobilisafe's key features and approach make it the ideal mobile security solution for BYOD. Detailed descriptions of Mobilisafe's key features and design architecture are included.
This data sheet provides a general overview of Rapid7 Nexpose. It describes the product's core functionality and explores how Rapid7 customers leverage Nexpose to conduct unified vunerability management.
Read this review of Rapid7 Nexpose to understand why Peter Stephenson of SC Magazine said the product "is a feature-packed vulnerability assessment and risk analysis tool that always goes beyond expectations.
West Coast Labs engineers set up a test network with multiple operating systems running at different patch levels,with each of these machines having many security flaws and vulnerabilities in order to replicate the heterogeneous nature of many corporate networks. Read their report to understand how Rapid7 Nexpose was tested and how it succeeded in achieving the Check Mark Certification.
Aggregated views across an organization help quickly assess the number of mobile users, devices, operating systems and their configurations. In this video, see how this information is presented via the Mobilisafe dashboard.