Rapid7 Insight ThreatCommand
Threat Command is an advanced external threat intelligence tool that finds and mitigates threats directly targeting your organization, employees, and customers, Threat Command enables you to make informed decisions and rapidly respond to protect your business. In addition, Threat Command enables advanced automated response to many threat alerts.
Features
- Digital Risk Protection
- Threat Protection Expertise
- Rapid Remediation & Takedown
- Advanced Investigation and Threat Mapping
- Clear, Deep, & Dark Web Protection
- IOC Management & Enrichment
- Seamless Automation
- Expansive Threat Library
Benefits
- Accelerate Response
- Turn intelligence into action with faster detection and automated alerts
- Possible through plug-and-play integrations with your existing technologies
- Simplify Workflows
- Simplify your SecOps workflows through advanced investigation and mapping
- Highly contextualized alerts with low signal-to-noise ratio.
- Unlimited 24x7x365 access to our expert analysts
- Immediate Value
- Accelerated onboarding and an intuitive dashboard
- Rapid ROI with digital tailored risk protection
Pricing
£18.65 a device
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
4 7 6 8 9 6 3 0 6 6 8 2 6 0 7
Contact
CYBERLAB CONSULTING LTD
Ryan Bradbury
Telephone: 0333 050 8120
Email: ryan.bradbury@cyberlab.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
- Available upon request
- System requirements
- Cloud based solution - requirements detailed https://www.rapid7.com/products/threat-command/
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
"We have established the following Service Level Objectives (SLOs) that govern our response and communication processes. The following time frames are relative to your time zone.
Severity-1 “Critical”: < 2 Hours initial response, 4 Business Hours update cadence
Severity-2 “High”: < 4 Business Hours initial response, 3 Business Days update cadence
Severity-3 “Medium”: < 12 Business Hours initial response, 5 Business Days update cadence" - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
"https://www.rapid7.com/globalassets/_pdfs/whitepaperguide/rapid7-customer-support-guidebook.pdf/
Describes how R7 support works, we have a technical Account Management team and the details can be found here.
https://www.rapid7.com/contentassets/27cecc8df3274f698972f0c2a69e6b40/rapid7-technical-account-management-support-brief.pdf/" - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Rapid7 offers online help, free webinars, and formalized, curriculum-based training for Rapid7 products including hands-on technical lab exercises. Rapid7 offers a flexible training model available in virtual open enrollment, virtual dedicated and on-site classroom formats. Custom training is also an option for your organization. We build a class or entire curriculum suited to your specific training objectives. Courses can include introductory or advanced product topics and can cover one or more products. The Alert profiler enables the user to easily control noise and false positives and together with a policy, automatically close down any unreleated alerts thereby streamlining their security efforts
- Service documentation
- Yes
- Documentation formats
-
- HTML
- Other
- Other documentation formats
- CSV
- End-of-contract data extraction
- If you opt to end your engagement with Rapid7, you have the opportunity to collect and transfer any data that is possible to export.
- End-of-contract process
- At the end of a contract, you will have the opportunity to collect and transfer any data possible to export. If you request that Rapid7 delete all of your data, the request will be processed within 14 days. No additional fees apply.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Application to install
- Yes
- Compatible operating systems
-
- Linux or Unix
- Windows
- Other
- Designed for use on mobile devices
- No
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- Users can perform all actions through the web interface, including administration, reporting, and more. Further details available on request.
- Accessibility standards
- None or don’t know
- Description of accessibility
- Details available on request
- Accessibility testing
- Details available on request
- API
- Yes
- What users can and can't do using the API
- The API is a Restful JSON interface. A user is able to push and pull data values into and out of the Threat Command database. For example, the addition of new assets could be automated via an API call. Equally threat details and statistics can be extracted from the API to help populate extrernal report applications
- API documentation
- Yes
- API documentation formats
- Open API (also known as Swagger)
- API sandbox or test environment
- No
- Customisation available
- Yes
- Description of customisation
- Threat Command provides a feature called Alert Profile. This feature allows a user to define a "scenario" for each threat type they are interested in. A scenario is a series of conditions coupled together with logic that tells Threat Command what threat type the user wants to be alerted on and what severity to attach to that scenario.
Scaling
- Independence of resources
- Cloud components are hosted in AWS. Rapid increases in CPU, memory, storage, and networking capacity are performed on demand to meet the scaling and performance needs of enterprise customers.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Platform availability is provided at https://status.rapid7.com
- Reporting types
- Real-time dashboards
Resellers
- Supplier type
- Reseller (no extras)
- Organisation whose services are being resold
- Rapid 7
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
- Other
- Other data at rest protection approach
-
All of the data processed and stored is encrypted at rest using various file or disk level encryption mechanisms. Data is encrypted using industry standard AES-256 encryption with keys managed through AWS’s Key Management Service (KMS). Where possible, Rapid7 utilizes AWS’s services to manage encryption at rest (e.g. S3, EBS, RDS, etc.). When not possible, Rapid7 utilizes block level encryption provided by LUKS.
Block level encryption is used for ElasticSearch (only used to index some asset metadata). For all other persistence technologies/layers, AWS KMS is used." - Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- At the end of a contract, you will have the opportunity to collect and transfer any data possible to export. If you request that Rapid7 delete all of your data, the request will be processed within 14 days. No additional fees apply.
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- RTF
- Text
- HTML
- XML
- Data import formats
-
- CSV
- Other
- Other data import formats
- Various
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- During the term of Customer’s subscription, the Service will perform in accordance with and subject to the Service Level Agreement (“SLA”) documented at https://www.rapid7.com/legal/sla/. Rapid7’s target is 100% System Availability. If the System Availability during a given month is less than 99.95%, Customer may be eligible for a credit as detailed below (“Service Credit”), which is the sole and exclusive remedy for any failure to meet the SLA.
- Approach to resilience
-
"Rapid7 maintains a Business Continuity Plan for the Insight platform. The primary goal of this plan is to ensure organizational stability, as well as coordinate recovery of critical business functions in managing and supporting business recovery in the event of disruption or disaster. Thus, the plan accomplishes the following:
Ensures critical functions can continue during and after a disaster with minimal interruption;
Identifies and decreases potential threats and exposures; and
Promotes awareness of critical interdependencies.
We can share a high-level overview of our Business Continuity Plan for the Insight platform upon request." - Outage reporting
- Service status is available at status. Rapid7.com. Users may elect to subscribe to notifications from this site.
Identity and authentication
- User authentication needed
- Yes
- User authentication
- 2-factor authentication
- Access restrictions in management interfaces and support channels
-
"InsightVM provides comprehensive role-based access controls (RBACs) that govern functionality such as scanning capabilities, scan configuration creation/modification, asset grouping, reporting, administrative functions, and other settings. Along with functional access controls, RBAC extends to visibility of scan target assets. Users can only view scan or report data on those devices or collections of devices to which they have access. InsightVM includes pre-defined user roles addressing core permission sets that can be customized as needed. Additional custom roles can be created and assigned to users, allowing for efficient access management.
For additional information regarding roles and permissions, please refer to: https://insightvm.help.rapid7.com/docs/managing-users-and-authentication.
" - Access restriction testing frequency
- At least once a year
- Management access authentication
- 2-factor authentication
Audit information for users
- Access to user activity audit information
- You control when users can access audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
-
- SOC2 type2
- https://www.rapid7.com/trust/compliance/
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- The Information Security team is broken into the Governance and Operations functions. The Governance team's functions include GRC (governance, risk and compliance) activities and overall security program management. The Operations team's functions include vulnerability management, application security, security engineering, and various other operational roles and responsibilities. The Information Security team reports into the Products organization. We work with the Products team to build security into our platform, products and services. We engage external third party auditors to validate the security controls are operating effectively, building and maintaining customer trust and confidence.
- Information security policies and processes
-
"The Information Security and Information Technology groups are responsible for monitoring compliance with data security policies and procedures. Users found in violation of information security policies may be subject to disciplinary action, up to and including 1) removal from any access to company or customer assets, data, or systems, 2) termination of employment, and/or 3) legal action. When required, Information Security will work with Legal and People Strategy to address any instance of non-compliance.
We use a SaaS product to manage and control relevant Information Security policies, which includes version control editors and full audit history. Rapid7 employment policies are documented in an internal employee handbook."
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Rapid7 applies a systematic approach to managing change so that changes to services impacting Rapid7 and our customers are reviewed, tested, approved, and well communicated. Separate change management processes are in place for corporate IT systems and Insight platform systems to ensure changes are tailored to the specifics of each environment. The goal of Rapid7’s change management process is to prevent unintended service disruptions and to maintain the integrity of services provided to customers. All changes deployed to production undergo a review, testing, and approval process.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- The Information Security team is continuously monitoring the Rapid7 network and our product environments in accordance with formally documented vulnerability management processes and procedures. Information Security conducts vulnerability scans on a continuous basis, at least weekly. Rapid7 begins immediate action following the identification of critical vulnerabilities and generally completes the process in well under 48 hours.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
"We use InsightIDR to monitor for suspicious and malicious behavior across our user endpoints, networks, servers, and cloud services. Our InsightIDR configuration uses a combination of user behavior analytics, attacker behavior analytics in the form of curated threat intelligence, and custom alerts.
We only monitor systems that Rapid7 has implemented in our hosting environments and platform, not systems that customers deploy themselves within their environment." - Incident management type
- Supplier-defined controls
- Incident management approach
-
"There is a formal Incident Management process in place and we can provide our Incident Response policy. Incidents are handled by the Information Security team and are escalated to Rapid7's in-house Incident Response team when necessary.
Rapid7 uses InsightIDR to monitor on-premises and cloud environments for security incidents. Information Security partners with the MDR and Incident Response services teams to supplement Rapid7’s incident response program. InsightIDR alerts are regularly reviewed by analysts and escalated via a paging system when indications of potentially malicious activity are detected."
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
"We have an environmental statement and are working to improve our ESG governance generally. Wwe formulated a plan to become net zero by 2030 which is available on our website.
What we are doing to reduce our emissions
-Our People – we launched a WIKI within Teams containing advice on how to minimise your environmental impact.
-Our Suppliers – 95% of our environmental impact comes from suppliers. We have reviewed our supplier onboarding process to score their environmental impact and are in discussion with Key suppliers so we understand what they are doing to limit Carbon emissions and how we can work with them to make this happen.
-Our Customers – our sales efforts focus on transitioning customers to cloud services and low energy products such as FTTP. These are more efficient and will reduce emissions over time.
95% of our emissions are from our supply chain/customer usage of our products and we are working on our supplier strategy to fully understand their plans and as well as proactively transitioning our customers onto more environmentally responsible products and services (e.g. Broadband -> FTTP) to help them hit their targets.
5%- us We have moved to 96% home working, reduced our office footprint from 6 to 1 and have seen a substantial reduction in our emissions and utilities usage (reported annually). This equates to over 350 people no longer commuting.
Our People come together if they need to at head office or in a network of small hubs, for example all teams meet at least once per quarter and some choose to more frequently.
This cuts carbon emissions significantly as
-over 350 people no longer need to commute every day,
-over 90% of internal, supplier and customer meetings take place over Teams
-We reduced our office footprint from 6 to 1.Covid-19 recovery
Cyberlab have in place a robust and tested Business Continuity Plan, recovery for pandemics would be included within this BCP.Tackling economic inequality
"Our UK sites sponsor twelve charities a year. One of the main philanthropic successes we have seen in recent years is the launch of our Engage platform. Successfully linking Culture and Charity by introducing a fun and quick way to provide companywide recognition and praise for all to see. All our people are encouraged to recognise when their colleagues have performed well by giving them ‘Praise’, The best thing about this – every time someone is praised, they get to donate £1 to one of the 12 Charities. In 2023, we raised £9,000 through Praise recognition, which was part of the £45,000 total we donated.
When things happen in the world that we've not planned for, people will turn to their leaders to see how we will support them, recently, we sent medical and food supplies to the Romania – Ukraine border and donated to the Red Cross Ukraine Crisis Appeal.
Recent Regional and National Charity initiatives
Bare Necessities
Bare Necessities is a toiletry bank based in South Manchester, founded by two friends, determined to do something to help local people have equal access to personal hygiene products. We have set up toiletry drop off points at each of our hubs and will regularly be delivering these to be put into hygiene kits.
Mission Christmas Toys for Kids Appeal
Our people can gift £5 per month to go towards the Mission Christmas Toy Appeal that runs across the UK.
Wrap Up Campaign
Wrap Up is a project run by various Rotary Clubs working in partnership across the UK to provide coats directly to people across the UK. Each hub became a drop off point and our people donated over 50 of their old coats which were then circulated to the collection points across the UK."Equal opportunity
"Our People have told us that they want to work flexibly and so the ability to work from different locations utilising all of the new technology we have embraced during the pandemic has become our new normal in terms of our working practices. This opens up an exciting opportunity to widen our recruitment activities to include groups of people who previously were not open to us because of the geographic and physical barriers that working in a fixed location bring. Removing these barriers and proactively searching out new ways to attract and recruit people from all areas of society will enable us to grow a much more diverse workforce with all of the cultural, social and financial benefits that this brings.
we have always considered that we drive a culture that promotes inclusion and diversity. We have always celebrated all our people's successes, but complacency is dangerous and there is always more we can do. We pay close attention to what other organisations are doing, we listen to our people, and our goal is to drive hard in this area, providing the opportunity for all who wish to take it.
Economic – employment, training and work-experience opportunities
We support localisation in the delivery of services through:
a)Local employment
We proactively look at ‘local’ employment, training and work-experience opportunities for individual where this is appropriate and deliverable.
b) Apprenticeships
Graduate and Apprentice Schemes - We employ 5no apprentices across the business including IT and people support.
c) Employability Training
We offer young people employability training via interview practice, CV assistance and familiarisation with an office environment. We have previously offered work experience and apprenticeships to young people we have been introduced to via this scheme."Wellbeing
"Communication and collaboration are vital to maintaining energy and focus especially with most employees choosing to work from home.
Staff are encouraged to meet with their teams at one of the local hubs in a network spread across the UK. And there are two annual conferences to celebrate success and bring people together.
All teams have daily Teams 'huddles' to set the focus for the day and share any issues, as well as monthly 121s. Employees get monthly updates from the Chairman and Board of Directors to keep them up to speed on business performance, with daily 'need to knows' posted on internal channels. Additionally, the chairman hosts monthly lunches, allowing employees to express any concerns directly.
Working together in a positive environment
Every day, we encourage, motivate, and support each other to maintain a friendly positive atmosphere where everyone feels valued and cared for. We have created a culture that is inclusive and diverse where everyone is encouraged to bring innovative new ideas to the table and work together to achieve our organisational goals. It’s a place where hard work and success is rewarded. All our people set Goals and Responsibilities tied to our Blueprint which are reviewed regularly throughout the year, as well as a Personal Development Plan outlining their short and long term career objectives – both within and outside
• We are advocates of diversity and inclusion, and our culture is open to everyone.
• Looking after our employees - Future Fit wellbeing -
• Early career apprenticeship and graduate programmes
• Passionate about encouraging and supporting women in tech, with above average industry standards for women in tech and females in leadership roles - International Women’s Day -
• Flexible working options for every employee where possible "
Pricing
- Price
- £18.65 a device
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- "InsightIDR is available as a full-featured 30-day free trial.
- Link to free trial
- https://www.rapid7.com/try/insightidr/