Skip to main content

Help us improve the Digital Marketplace - send your feedback

CYBERLAB CONSULTING LTD

Rapid7 Insight ThreatCommand

Threat Command is an advanced external threat intelligence tool that finds and mitigates threats directly targeting your organization, employees, and customers, Threat Command enables you to make informed decisions and rapidly respond to protect your business. In addition, Threat Command enables advanced automated response to many threat alerts.

Features

  • Digital Risk Protection
  • Threat Protection Expertise
  • Rapid Remediation & Takedown
  • Advanced Investigation and Threat Mapping
  • Clear, Deep, & Dark Web Protection
  • IOC Management & Enrichment
  • Seamless Automation
  • Expansive Threat Library

Benefits

  • Accelerate Response
  • Turn intelligence into action with faster detection and automated alerts
  • Possible through plug-and-play integrations with your existing technologies
  • Simplify Workflows
  • Simplify your SecOps workflows through advanced investigation and mapping
  • Highly contextualized alerts with low signal-to-noise ratio.
  • Unlimited 24x7x365 access to our expert analysts
  • Immediate Value
  • Accelerated onboarding and an intuitive dashboard
  • Rapid ROI with digital tailored risk protection

Pricing

£18.65 a device

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at ryan.bradbury@cyberlab.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

4 7 6 8 9 6 3 0 6 6 8 2 6 0 7

Contact

CYBERLAB CONSULTING LTD Ryan Bradbury
Telephone: 0333 050 8120
Email: ryan.bradbury@cyberlab.co.uk

Service scope

Software add-on or extension
No
Cloud deployment model
Public cloud
Service constraints
Available upon request
System requirements
Cloud based solution - requirements detailed https://www.rapid7.com/products/threat-command/

User support

Email or online ticketing support
Email or online ticketing
Support response times
"We have established the following Service Level Objectives (SLOs) that govern our response and communication processes. The following time frames are relative to your time zone.
Severity-1 “Critical”: < 2 Hours initial response, 4 Business Hours update cadence
Severity-2 “High”: < 4 Business Hours initial response, 3 Business Days update cadence
Severity-3 “Medium”: < 12 Business Hours initial response, 5 Business Days update cadence"
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
"https://www.rapid7.com/globalassets/_pdfs/whitepaperguide/rapid7-customer-support-guidebook.pdf/
Describes how R7 support works, we have a technical Account Management team and the details can be found here.
https://www.rapid7.com/contentassets/27cecc8df3274f698972f0c2a69e6b40/rapid7-technical-account-management-support-brief.pdf/"
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Rapid7 offers online help, free webinars, and formalized, curriculum-based training for Rapid7 products including hands-on technical lab exercises. Rapid7 offers a flexible training model available in virtual open enrollment, virtual dedicated and on-site classroom formats. Custom training is also an option for your organization. We build a class or entire curriculum suited to your specific training objectives. Courses can include introductory or advanced product topics and can cover one or more products. The Alert profiler enables the user to easily control noise and false positives and together with a policy, automatically close down any unreleated alerts thereby streamlining their security efforts
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
  • Other
Other documentation formats
CSV
End-of-contract data extraction
If you opt to end your engagement with Rapid7, you have the opportunity to collect and transfer any data that is possible to export.
End-of-contract process
At the end of a contract, you will have the opportunity to collect and transfer any data possible to export. If you request that Rapid7 delete all of your data, the request will be processed within 14 days. No additional fees apply.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
Application to install
Yes
Compatible operating systems
  • Linux or Unix
  • Windows
  • Other
Designed for use on mobile devices
No
Service interface
Yes
User support accessibility
None or don’t know
Description of service interface
Users can perform all actions through the web interface, including administration, reporting, and more. Further details available on request.
Accessibility standards
None or don’t know
Description of accessibility
Details available on request
Accessibility testing
Details available on request
API
Yes
What users can and can't do using the API
The API is a Restful JSON interface. A user is able to push and pull data values into and out of the Threat Command database. For example, the addition of new assets could be automated via an API call. Equally threat details and statistics can be extracted from the API to help populate extrernal report applications
API documentation
Yes
API documentation formats
Open API (also known as Swagger)
API sandbox or test environment
No
Customisation available
Yes
Description of customisation
Threat Command provides a feature called Alert Profile. This feature allows a user to define a "scenario" for each threat type they are interested in. A scenario is a series of conditions coupled together with logic that tells Threat Command what threat type the user wants to be alerted on and what severity to attach to that scenario.

Scaling

Independence of resources
Cloud components are hosted in AWS. Rapid increases in CPU, memory, storage, and networking capacity are performed on demand to meet the scaling and performance needs of enterprise customers.

Analytics

Service usage metrics
Yes
Metrics types
Platform availability is provided at https://status.rapid7.com
Reporting types
Real-time dashboards

Resellers

Supplier type
Reseller (no extras)
Organisation whose services are being resold
Rapid 7

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
None

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
Other locations
User control over data storage and processing locations
Yes
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
In-house
Protecting data at rest
Other
Other data at rest protection approach
All of the data processed and stored is encrypted at rest using various file or disk level encryption mechanisms. Data is encrypted using industry standard AES-256 encryption with keys managed through AWS’s Key Management Service (KMS). Where possible, Rapid7 utilizes AWS’s services to manage encryption at rest (e.g. S3, EBS, RDS, etc.). When not possible, Rapid7 utilizes block level encryption provided by LUKS.

Block level encryption is used for ElasticSearch (only used to index some asset metadata). For all other persistence technologies/layers, AWS KMS is used."
Data sanitisation process
Yes
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
At the end of a contract, you will have the opportunity to collect and transfer any data possible to export. If you request that Rapid7 delete all of your data, the request will be processed within 14 days. No additional fees apply.
Data export formats
  • CSV
  • Other
Other data export formats
  • PDF
  • RTF
  • Text
  • HTML
  • XML
Data import formats
  • CSV
  • Other
Other data import formats
Various

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
During the term of Customer’s subscription, the Service will perform in accordance with and subject to the Service Level Agreement (“SLA”) documented at https://www.rapid7.com/legal/sla/. Rapid7’s target is 100% System Availability. If the System Availability during a given month is less than 99.95%, Customer may be eligible for a credit as detailed below (“Service Credit”), which is the sole and exclusive remedy for any failure to meet the SLA.
Approach to resilience
"Rapid7 maintains a Business Continuity Plan for the Insight platform. The primary goal of this plan is to ensure organizational stability, as well as coordinate recovery of critical business functions in managing and supporting business recovery in the event of disruption or disaster. Thus, the plan accomplishes the following:
Ensures critical functions can continue during and after a disaster with minimal interruption;
Identifies and decreases potential threats and exposures; and
Promotes awareness of critical interdependencies.
We can share a high-level overview of our Business Continuity Plan for the Insight platform upon request."
Outage reporting
Service status is available at status. Rapid7.com. Users may elect to subscribe to notifications from this site.

Identity and authentication

User authentication needed
Yes
User authentication
2-factor authentication
Access restrictions in management interfaces and support channels
"InsightVM provides comprehensive role-based access controls (RBACs) that govern functionality such as scanning capabilities, scan configuration creation/modification, asset grouping, reporting, administrative functions, and other settings. Along with functional access controls, RBAC extends to visibility of scan target assets. Users can only view scan or report data on those devices or collections of devices to which they have access. InsightVM includes pre-defined user roles addressing core permission sets that can be customized as needed. Additional custom roles can be created and assigned to users, allowing for efficient access management.
For additional information regarding roles and permissions, please refer to: https://insightvm.help.rapid7.com/docs/managing-users-and-authentication.
"
Access restriction testing frequency
At least once a year
Management access authentication
2-factor authentication

Audit information for users

Access to user activity audit information
You control when users can access audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
Yes
Any other security certifications
  • SOC2 type2
  • https://www.rapid7.com/trust/compliance/

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
The Information Security team is broken into the Governance and Operations functions. The Governance team's functions include GRC (governance, risk and compliance) activities and overall security program management. The Operations team's functions include vulnerability management, application security, security engineering, and various other operational roles and responsibilities. The Information Security team reports into the Products organization. We work with the Products team to build security into our platform, products and services. We engage external third party auditors to validate the security controls are operating effectively, building and maintaining customer trust and confidence.
Information security policies and processes
"The Information Security and Information Technology groups are responsible for monitoring compliance with data security policies and procedures. Users found in violation of information security policies may be subject to disciplinary action, up to and including 1) removal from any access to company or customer assets, data, or systems, 2) termination of employment, and/or 3) legal action. When required, Information Security will work with Legal and People Strategy to address any instance of non-compliance.

We use a SaaS product to manage and control relevant Information Security policies, which includes version control editors and full audit history. Rapid7 employment policies are documented in an internal employee handbook."

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Rapid7 applies a systematic approach to managing change so that changes to services impacting Rapid7 and our customers are reviewed, tested, approved, and well communicated. Separate change management processes are in place for corporate IT systems and Insight platform systems to ensure changes are tailored to the specifics of each environment. The goal of Rapid7’s change management process is to prevent unintended service disruptions and to maintain the integrity of services provided to customers. All changes deployed to production undergo a review, testing, and approval process.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
The Information Security team is continuously monitoring the Rapid7 network and our product environments in accordance with formally documented vulnerability management processes and procedures. Information Security conducts vulnerability scans on a continuous basis, at least weekly. Rapid7 begins immediate action following the identification of critical vulnerabilities and generally completes the process in well under 48 hours.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
"We use InsightIDR to monitor for suspicious and malicious behavior across our user endpoints, networks, servers, and cloud services. Our InsightIDR configuration uses a combination of user behavior analytics, attacker behavior analytics in the form of curated threat intelligence, and custom alerts.

We only monitor systems that Rapid7 has implemented in our hosting environments and platform, not systems that customers deploy themselves within their environment."
Incident management type
Supplier-defined controls
Incident management approach
"There is a formal Incident Management process in place and we can provide our Incident Response policy. Incidents are handled by the Information Security team and are escalated to Rapid7's in-house Incident Response team when necessary.

Rapid7 uses InsightIDR to monitor on-premises and cloud environments for security incidents. Information Security partners with the MDR and Incident Response services teams to supplement Rapid7’s incident response program. InsightIDR alerts are regularly reviewed by analysts and escalated via a paging system when indications of potentially malicious activity are detected."

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Covid-19 recovery
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

"We have an environmental statement and are working to improve our ESG governance generally. Wwe formulated a plan to become net zero by 2030 which is available on our website.
What we are doing to reduce our emissions
-Our People – we launched a WIKI within Teams containing advice on how to minimise your environmental impact.
-Our Suppliers – 95% of our environmental impact comes from suppliers. We have reviewed our supplier onboarding process to score their environmental impact and are in discussion with Key suppliers so we understand what they are doing to limit Carbon emissions and how we can work with them to make this happen.
-Our Customers – our sales efforts focus on transitioning customers to cloud services and low energy products such as FTTP. These are more efficient and will reduce emissions over time.
95% of our emissions are from our supply chain/customer usage of our products and we are working on our supplier strategy to fully understand their plans and as well as proactively transitioning our customers onto more environmentally responsible products and services (e.g. Broadband -> FTTP) to help them hit their targets.
5%- us We have moved to 96% home working, reduced our office footprint from 6 to 1 and have seen a substantial reduction in our emissions and utilities usage (reported annually). This equates to over 350 people no longer commuting.
Our People come together if they need to at head office or in a network of small hubs, for example all teams meet at least once per quarter and some choose to more frequently.
This cuts carbon emissions significantly as
-over 350 people no longer need to commute every day,
-over 90% of internal, supplier and customer meetings take place over Teams
-We reduced our office footprint from 6 to 1.

Covid-19 recovery

Cyberlab have in place a robust and tested Business Continuity Plan, recovery for pandemics would be included within this BCP.

Tackling economic inequality

"Our UK sites sponsor twelve charities a year. One of the main philanthropic successes we have seen in recent years is the launch of our Engage platform. Successfully linking Culture and Charity by introducing a fun and quick way to provide companywide recognition and praise for all to see. All our people are encouraged to recognise when their colleagues have performed well by giving them ‘Praise’, The best thing about this – every time someone is praised, they get to donate £1 to one of the 12 Charities. In 2023, we raised £9,000 through Praise recognition, which was part of the £45,000 total we donated.
When things happen in the world that we've not planned for, people will turn to their leaders to see how we will support them, recently, we sent medical and food supplies to the Romania – Ukraine border and donated to the Red Cross Ukraine Crisis Appeal.
Recent Regional and National Charity initiatives
Bare Necessities
Bare Necessities is a toiletry bank based in South Manchester, founded by two friends, determined to do something to help local people have equal access to personal hygiene products. We have set up toiletry drop off points at each of our hubs and will regularly be delivering these to be put into hygiene kits.

Mission Christmas Toys for Kids Appeal
Our people can gift £5 per month to go towards the Mission Christmas Toy Appeal that runs across the UK.

Wrap Up Campaign
Wrap Up is a project run by various Rotary Clubs working in partnership across the UK to provide coats directly to people across the UK. Each hub became a drop off point and our people donated over 50 of their old coats which were then circulated to the collection points across the UK."

Equal opportunity

"Our People have told us that they want to work flexibly and so the ability to work from different locations utilising all of the new technology we have embraced during the pandemic has become our new normal in terms of our working practices. This opens up an exciting opportunity to widen our recruitment activities to include groups of people who previously were not open to us because of the geographic and physical barriers that working in a fixed location bring. Removing these barriers and proactively searching out new ways to attract and recruit people from all areas of society will enable us to grow a much more diverse workforce with all of the cultural, social and financial benefits that this brings.
we have always considered that we drive a culture that promotes inclusion and diversity. We have always celebrated all our people's successes, but complacency is dangerous and there is always more we can do. We pay close attention to what other organisations are doing, we listen to our people, and our goal is to drive hard in this area, providing the opportunity for all who wish to take it.

Economic – employment, training and work-experience opportunities
We support localisation in the delivery of services through:

a)Local employment
We proactively look at ‘local’ employment, training and work-experience opportunities for individual where this is appropriate and deliverable.

b) Apprenticeships
Graduate and Apprentice Schemes - We employ 5no apprentices across the business including IT and people support.

c) Employability Training
We offer young people employability training via interview practice, CV assistance and familiarisation with an office environment. We have previously offered work experience and apprenticeships to young people we have been introduced to via this scheme."

Wellbeing

"Communication and collaboration are vital to maintaining energy and focus especially with most employees choosing to work from home.

Staff are encouraged to meet with their teams at one of the local hubs in a network spread across the UK. And there are two annual conferences to celebrate success and bring people together.

All teams have daily Teams 'huddles' to set the focus for the day and share any issues, as well as monthly 121s. Employees get monthly updates from the Chairman and Board of Directors to keep them up to speed on business performance, with daily 'need to knows' posted on internal channels. Additionally, the chairman hosts monthly lunches, allowing employees to express any concerns directly.
Working together in a positive environment
Every day, we encourage, motivate, and support each other to maintain a friendly positive atmosphere where everyone feels valued and cared for. We have created a culture that is inclusive and diverse where everyone is encouraged to bring innovative new ideas to the table and work together to achieve our organisational goals. It’s a place where hard work and success is rewarded. All our people set Goals and Responsibilities tied to our Blueprint which are reviewed regularly throughout the year, as well as a Personal Development Plan outlining their short and long term career objectives – both within and outside

• We are advocates of diversity and inclusion, and our culture is open to everyone.
• Looking after our employees - Future Fit wellbeing -
• Early career apprenticeship and graduate programmes
• Passionate about encouraging and supporting women in tech, with above average industry standards for women in tech and females in leadership roles - International Women’s Day -
• Flexible working options for every employee where possible "

Pricing

Price
£18.65 a device
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
"InsightIDR is available as a full-featured 30-day free trial.
Link to free trial
https://www.rapid7.com/try/insightidr/

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at ryan.bradbury@cyberlab.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.