Rapid7 is on a mission to drive the SecOps movement into the future, and we take that to heart with our holistic approach to security. Rapid7 has policies and procedures in place to keep our data, platform, and products secure, so that we can continue creating tools and services that keep our customers secure.


Our world class security program is driven by a blend of published standards and industry best practices:

Rest assured: Rapid7’s approach to security is established on four core pillars essential to trust.


Rapid7’s platform and products are designed to fit securely into your environment and adhere to security best practices.


You have access to your data when you need it and our operational status is always up to date.


Ensuring your data is used only in a manner consistent with your expectations is a responsibility we take very seriously.


You have full visibility into where your data lives, who has access to it, and how it is used.

Have questions? We have answers.

Trust FAQ

Read What’s New on the Rapid7 Blog

5 Steps to Go from Patch Management to Vulnerability Management
The terms “patch management” and “vulnerability management” are sometimes used interchangeably, but it is important to understand the difference. Though both strategies aim to mitigate risk, patch management (the process of managing software updates) is limited in scope. To gain a deeper understanding...
Tori Sitcawich
Oct 22, 2019
Read More
InsightVM vs. Managed Vulnerability Management: How to Choose Which Rapid7 Offering Is Right for You
What is a vulnerability management tool? We’ve all been there—spending hours upon hours helping our organizations avoid breaches and defend against attackers. But despite all the time and energy security professionals pour into this effort, attackers still find their way into complex environments and...
Maggie Rodriguez
Oct 17, 2019
Read More
Patch Tuesday - October 2019
This month's Patch Tuesday is mainly notable in that there isn't a whole lot to note, which is a change of pace. No 0-days, no vulnerabilities that had been publicly disclosed already, and nothing that could allow worms to proliferate. And nothing from Adobe. Of course, that doesn't mean there's nothing...
Greg Wiseman
Oct 08, 2019
Read More

Rapid7 By The Numbers

Advancing Security Since
Valued Customers
Fortune 100 Friends
Assets Monitored
Petabytes of Data Processed
Ports Monitored Per IP
IPs Scanned