Product Brief

The Forrester Wave: Vulnerability Risk Management, Q4 2019

Rapid7 named a leader, receiving highest score possible in nine criteria.

Read more

InsightVM – Live vulnerability management and endpoint analytics.

  • Collect

    Automatically collect, monitor, and analyze vulnerabilities on your network.

  • Prioritize

    View real-time risks and leverage custom views tailored to your users.

  • Remediate

    Cloud-powered analytics and end-to-end remediation workflow tracks the progress of each fix.

Nexpose – Your on-prem vulnerability scanner.

  • Collect

    Know your risk at any given moment with real-time coverage of your entire network.

  • Prioritize

    See which vulnerabilities to focus on first with more meaningful risk scores.

  • Remediate

    Provide IT with the information they need to fix issues quickly and efficiently.

Metasploit – Penetration testing software for offensive security teams.

  • Collect

    Gather together the collective knowledge of a global security community to test your network and find your holes.

  • Prioritize

    Determine the most impactful vulnerabilities and focus on what matters most.

  • Verify

    Verify likelihood and impact with real-world attacks, fix top exposures and check that they are patched.

Appspider – Leave no app untested and no risk unknown.

  • Keep Pace

    Collect the info needed to test today’s ever-evolving apps.

  • Reduce Risk

    Reduce risk with every build and remediate earlier in the SDLC.

  • Play Nice

    Hand deliver the right insight the right way to DevOps.

InsightAppSec – Cloud-powered application security testing.

  • Scan

    Identify application risks quickly and painlessly.

  • Analyze

    Manage your app portfolio at a glance.

  • Fix

    Share actionable insights resulting in the right fix.

InsightIDR – Detect intruders earlier in the attack chain. Get up and running in hours.

  • Unify SIEM, UBA, and EDR

    Augment reach across your entire ecosystem to find intruders early and get more from existing investments.

  • Detect Attacks Earlier

    Detect intruders earlier in the attack chain so you can respond before critical data is compromised.

  • Prioritize Your Search

    Uncover insight hidden in user activity, logs, and endpoints, to make investigations 20x faster.

Click here for more information