Skip to main content

Help us improve the Digital Marketplace - send your feedback

INTEGRITY360 LIMITED

Rapid7 InsightIDR

Your cloud SIEM for modern threat detection and response. InsightIDR provides immediate and accurate threat detection and drastically reduces the time to respond to attacks by combining behavioural analytics, threat intelligence, and automation in a scalable, easy to love solution that boasts the fastest deployment times in the industry.

Features

  • User Behaviour Analytics: expose compromised accounts & lateral movement
  • Attacker Behaviour Analytics: find known bad micro-behaviours that cause breach
  • Endpoint Detection and Visibility: includes remote & travelling workers
  • Centralized Log Management: simple, cloud-based performant search
  • Visual Investigation Timeline: investigate incidents 20x faster
  • Deception Technology: add new monitoring capabilities for malicious behavior
  • File Integrity Monitoring (FIM): meet multiple compliance requirements w/InsightIDR
  • Network Traffic Analysis: helps detect intrusions/security events
  • Meet compliance without deploying a third party solution.

Benefits

  • Search and Visualize Your Security Data
  • Detect Compromised Users and Lateral Movement
  • Identify Evolving Attacker Behaviour
  • 20x Faster Investigations and Incident Response
  • Automatically Contain Compromised Users and Assets
  • Solve Multiple Compliance Regulations
  • Streamlined Case Management

Pricing

£18.65 a device a year

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at bidreviewboard@integrity360.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

5 0 5 5 7 5 3 0 5 8 7 5 9 9 7

Contact

INTEGRITY360 LIMITED Paul Momirovski
Telephone: +44 20 3397 3414
Email: bidreviewboard@integrity360.com

Service scope

Service constraints
In order to deliver our user and asset attribution based detections, organisations will need support ingestion of logs and events from the following four foundational sources: DHCP, LDAP, AD, DNS. The solution also requires an agent deployment for endpoint interagation and response, in order to provide the best value for organisations we recommend that deployment is in excess of 80% of all Windows/Linux/Mac endpoints and servers.
System requirements
  • Collector requirements: 2 GHz+ processor,
  • 8 GB RAM recommended,
  • 60 GB+ available disk space
  • Configured with a Fully Qualified Domain Name (FQDN)

User support

Email or online ticketing support
Email or online ticketing
Support response times
RESPONSE TIME TARGET AND UPDATE CADENCE
Severity-1 “Critical” < 2 Hours 4 Business Hours
Severity-2 “High” < 4 Business Hours 3 Business Days
Severity-3 “Medium” < 12 Business Hours 5 Business Days
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
https://www.rapid7.com/globalassets/_pdfs/whitepaperguide/rapid7-customer-support-guidebook.pdf/

Describes how R7 support works, we have a technical Account Management team and the details can be found here.
https://www.rapid7.com/contentassets/27cecc8df3274f698972f0c2a69e6b40/rapid7-technical-account-management-support-brief.pdf/"
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Rapid7 products are easy to install and use, and our team can provide expert guidance to take your usage of the product much further. The Quick Start Services for InsightIDR help you through deployment and ensure that you get the most value out of your investment.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
If you opt to end your engagement with Rapid7, you have the opportunity to collect and transfer any data that is possible to export.
End-of-contract process
At the end of a contract, you will have the opportunity to collect and transfer any data possible to export. If you request that Rapid7 delete all of your data, the request will be processed within 14 days. No additional fees apply.

Using the service

Web browser interface
Yes
Using the web interface
Users can perform all actions through the web interface, including administration, reporting, and more. Further details available on request.
Web interface accessibility standard
None or don’t know
How the web interface is accessible
Further details available on request
Web interface accessibility testing
Further details available on request
API
Yes
What users can and can't do using the API
The InsightIDR API supports the Representation State Transfer (REST) design pattern. Unless noted otherwise, this API accepts and produces the application/json media type. This API uses Hypermedia as the Engine of Application State (HATEOAS) and is hypermedia friendly. All API connections must be made to the security console using HTTPS.
Documentation available on request.
API automation tools
Other
Other API automation tools
REST API: threat intelligence management and incident investigations
API documentation
Yes
API documentation formats
Open API (also known as Swagger)
Command line interface
No

Scaling

Scaling available
Yes
Scaling type
Automatic
Independence of resources
Cloud components are hosted in AWS. Rapid increases in CPU, memory, storage, and networking capacity are performed on demand to meet the scaling and performance needs of enterprise customers.
Usage notifications
Yes
Usage reporting
  • API
  • Email

Analytics

Infrastructure or application metrics
Yes
Metrics types
Other
Other metrics
Platform availability is provided at https://status.rapid7.com
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Reseller providing extra support
Organisation whose services are being resold
Rapid 7

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
Yes
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least every 6 months
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Other
Other data at rest protection approach
All of the data processed and stored is encrypted at rest using various file or disk level encryption mechanisms. Data is encrypted using industry standard AES-256 encryption with keys managed through AWS’s Key Management Service (KMS). Where possible, Rapid7 utilizes AWS’s services to manage encryption at rest (e.g. S3, EBS, RDS, etc.). When not possible, Rapid7 utilizes block level encryption provided by LUKS.

Block level encryption is used for ElasticSearch (only used to index some asset metadata). For all other persistence technologies/layers, AWS KMS is used.
Data sanitisation process
Yes
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
A third-party destruction service

Backup and recovery

Backup and recovery
Yes
What’s backed up
Log Data
Backup controls
Any data fed into InsightIDR for security analytics can also be forked into an Amazon Web Services S3 bucket controlled by the customer. Therefore, customers can store, search, and visualize data in InsightIDR with customizable retention periods, and also have a back up for long-term storage / custom use-cases on their own cloud infrastructure.
Datacentre setup
Multiple datacentres with disaster recovery
Scheduling backups
Supplier controls the whole backup schedule
Backup recovery
Users can recover backups themselves, for example through a web interface

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • Other
Other protection between networks
Data sent to and from the Insight platform, including data collected by collectors, agents, and engines; data ingested via APIs and plugins; and interaction with the user interface is encrypted with TLS (HTTPS). Collectors, agents, engines, and plugins are configured to verify and require a valid TLS certificate issued by a trusted certificate authority.
Data protection within supplier network
  • TLS (version 1.2 or above)
  • Other
Other protection within supplier network
Data sent to and from the Insight platform, including data collected by collectors, agents, and engines; data ingested via APIs and plugins; and interaction with the user interface is encrypted with TLS (HTTPS). Collectors, agents, engines, and plugins are configured to verify and require a valid TLS certificate issued by a trusted certificate authority.

Availability and resilience

Guaranteed availability
During the term of Customer’s subscription, the Service will perform in accordance with and subject to this Service Level Agreement (“SLA”). Rapid7’s target is 100% System Availability. If the System Availability during a given month is less than 99.95%, Customer may be eligible for a credit (“Service Credit”), which is the sole and exclusive remedy for any failure to meet the SLA.
Approach to resilience
Rapid7 maintains a Business Continuity Plan for the Insight platform. The primary goal of this plan is to ensure organizational stability, as well as coordinate recovery of critical business functions in managing and supporting business recovery in the event of disruption or disaster.

Thus, the plan accomplishes the following:
• Ensures critical functions can continue during and after a disaster with minimal interruption;
• Identifies and decreases potential threats and exposures; and
• Promotes awareness of critical interdependencies.

We can share a high-level overview of our Business Continuity Plan for the Insight platform upon request.
Outage reporting
Service status is available at status.rapid7.com. Users may elect to subscribe to notifications from this site.

Identity and authentication

User authentication
  • 2-factor authentication
  • Username or password
  • Other
Other user authentication
The Rapid7 Insight cloud comes with role-based access control and support for multi-factor authentication.

Members of the team using InsightIDR can be made Administrator (full access), Investigator (Incident-only access), or Read Only. These roles will limit the functional access of the user, but will not restrict the data that is accessible in InsightIDR. Creating this three-level structure allows interested members outside of the security team to gain insight into the network and view incident alerts without disrupting the workflow of others.
Access restrictions in management interfaces and support channels
Data is compressed and encrypted before being forwarded to the Platform. Raw log data received by Collectors and uploaded to S3 is encrypted. InsightIDR employs public key cryptography and challenge-response handshakes to secure the data you entrust to the platform, where it's secured with the encryption and security controls within AWS S3.

Much of the data processed and stored is encrypted using file or disk level encryption. Data is encrypted using AES-256 encryption with keys managed through AWS’s Key Management Service. Where possible, Rapid7 utilizes AWS’s services to manage encryption at rest. When not possible, Rapid7 utilizes block level encryption.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Username or password
  • Other
Description of management access authentication
We back our privacy guidelines with layers of security to safeguard your data. Please visit https://www.rapid7.com/privacy-policy/ to view our privacy policy.

We strive to ensure that the fewest people possible have access to your data, and only on an as-needed basis.

Support, Software Developers, and Operations Engineers have access to data to support application development and troubleshooting. Rapid7 collects Usability Data to help us improve our solutions and services and Security System Data to deliver the platform.
Sales and Solution Engineers only have access to your Security System Data if you choose to use a production environment for a proof-of-concept.
Devices users manage the service through
Directly from any device which may also be used for normal business (for example web browsing or viewing external email)

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
Yes
Any other security certifications
SOC 2 Type II

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
The Information Security team is broken into the Governance and Operations functions. The Governance team's functions include GRC (governance, risk and compliance) activities and overall security program management. The Operations team's functions include vulnerability management, application security, security engineering, and various other operational roles and responsibilities. The Information Security team reports into the Products organization. We work with the Products team to build security into our platform, products and services. We engage external third party auditors to validate the security controls are operating effectively, building and maintaining customer trust and confidence.
Information security policies and processes
The Information Security and Information Technology groups are responsible for monitoring compliance with data security policies and procedures. Users found in violation of information security policies may be subject to disciplinary action, up to and including 1) removal from any access to company or customer assets, data, or systems, 2) termination of employment, and/or 3) legal action. When required, Information Security will work with Legal and People Strategy to address any instance of non-compliance.

We use a SaaS product to manage and control relevant Information Security policies, which includes version control editors and full audit history. Rapid7 employment policies are documented in an internal employee handbook."

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Rapid7 applies a systematic approach to managing change so that changes to services impacting Rapid7 and our customers are reviewed, tested, approved, and well communicated. Separate change management processes are in place for corporate IT systems and Insight platform systems to ensure changes are tailored to the specifics of each environment. The goal of Rapid7’s change management process is to prevent unintended service disruptions and to maintain the integrity of services provided to customers. All changes deployed to production undergo a review, testing, and approval process.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
The Information Security team is continuously monitoring the Rapid7 network and our product environments in accordance with formally documented vulnerability management processes and procedures. Information Security conducts vulnerability scans on a continuous basis, at least weekly. Rapid7 begins immediate action following the identification of critical vulnerabilities and generally completes the process in well under 48 hours.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
We use InsightIDR to monitor for suspicious and malicious behavior across our user endpoints, networks, servers, and cloud services. Our InsightIDR configuration uses a combination of user behavior analytics, attacker behavior analytics in the form of curated threat intelligence, and custom alerts.

We only monitor systems that Rapid7 has implemented in our hosting environments and platform, not systems that customers deploy themselves within their environment.
Incident management type
Supplier-defined controls
Incident management approach
There is a formal Incident Management process in place and we can provide our Incident Response policy. Incidents are handled by the Information Security team and are escalated to Rapid7's in-house Incident Response team when necessary.

Rapid7 uses InsightIDR to monitor on-premises and cloud environments for security incidents. Information Security partners with the MDR and Incident Response services teams to supplement Rapid7’s incident response program. InsightIDR alerts are regularly reviewed by analysts and escalated via a paging system when indications of potentially malicious activity are detected.

Secure development

Approach to secure software development best practice
Supplier-defined process

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart
Yes
Who implements virtualisation
Supplier
Virtualisation technologies used
Other
Other virtualisation technology used
Virtualization is not used in the separation between users. The Insight cloud is designed as a secure multi-tenant application and is hosted on Amazon Web Services.
How shared infrastructure is kept separate
InsightIDR is designed as a secure multi-tenant application. Each customer's user data is isolated in its own individual database in AWS, preventing other customers from accessing your user data. As an additional safeguard, each customer's log data is tokenized using a unique UUID that walls the data off from other customers, isolating your company's data.

For additional information on our cloud security, please refer to: https://www.rapid7.com/globalassets/_pdfs/whitepaperguide/rapid7-platform-cloud-security-overview.pdf/.

Energy efficiency

Energy-efficient datacentres
Yes
Description of energy efficient datacentres
As per AWS Services

Social Value

Social Value

Social Value

  • Fighting climate change
  • Equal opportunity

Fighting climate change

Rapid7 works to minimize waste in a variety of ways, including double-sided printing when possible, electronic internal memos, recycling, composting, reusable dishes and flatware, green cleaning products, and more. For energy efficiency, Rapid7 offices utilize photo-sensor switches and LED lightbulbs for lighting. Because Rapid7's headquarters is located in a major city (Boston, MA), many employees utilize public transportation to commute and are incentivized through a pre-tax purchase program for public transport passes. We are also part of Cyclescheme, which is a UK Government tax exemption initiative introduced in the Finance Act 1999 to promote healthier journeys to work and to reduce environmental pollution.In addition, we have an annual 'Rapid7 Gives Back' day where every Rapid7 office across the globe closes so our employees can participate in service projects within their local communities. This includes a wide range of projects such as fall cleanups, painting, donation drives, charity fundraisers, supporting open source communities, volunteering at animal shelters, and providing meals. We do amazing things when we partner together, and this event allows our teams to share that energy and give back to our communities across the globe.

Equal opportunity

We refer to our people at Rapid7 as Moose, a word that remains unchanged in both its singular and plural forms. It’s one of the many ways we work to build an internal sense of camaraderie and community. We’re one Moose and proud of the diverse perspectives that strengthen our herd. Here are some notable initiatives helping to make Rapid7 a more diverse, equitable, and inclusive home for every Moose: Moose Pride: Our space for LGBTQ+ employees and allies to connect, discuss, and share ideas on creating a welcoming environment Moose Vets: A group working to promote inclusion, aid in recruitment, and drive outreach to the veteran community at Rapid7 Vibranium: A group where our Black and LatinX team members can share thoughts and ideas, drawing support from one another Women in Security: A group providing support, mentorship, and community for our global team of women engineers

Pricing

Price
£18.65 a device a year
Discount for educational organisations
No
Free trial available
Yes
Description of free trial
InsightIDR is available as a full-featured 30-day free trial.

• Add in security data across their network, cloud services & infrastructure, and endpoints
• Detect common and targeted threats, or simulate attacks to validate pre-built detections
• Investigate incidents & try automation and containment integrations
Link to free trial
https://www.rapid7.com/try/insightidr/

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at bidreviewboard@integrity360.com. Tell them what format you need. It will help if you say what assistive technology you use.