Rapid7 Insight ThreatCommand
Rapid7 Threat Command is an advanced external threat intelligence tool that finds and mitigates threats directly targeting your organization, employees, and customers. By proactively monitoring thousands of sources across the clear, deep, and dark web, Threat Command enables you to make informed decisions and rapidly respond to protect your business.
Features
- Digital Risk Protection
- Threat Protection Expertise
- Rapid Remediation & Takedown
- Advanced Investigation and Threat Mapping
- Clear, Deep, & Dark Web Protection
- IOC Management & Enrichment
- Seamless Automation
- Expansive Threat Library
Benefits
- Turn intelligence into action with detection/automated alert-responses
- plug-and-play integrations with your existing technologies
- Simplify SecOps workflows through investigation and mapping capabilities
- Unlimited 24x7x365 access to analysts shortens investigation times
- accelerated onboarding and intuitive dashboards
- achieve rapid ROI with digital risk protection
Pricing
£85,160.98 a licence
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
6 6 3 7 3 5 7 2 3 2 3 3 1 6 1
Contact
INTEGRITY360 LIMITED
Paul Momirovski
Telephone: +44 20 3397 3414
Email: bidreviewboard@integrity360.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
- Cloud based solution - requirements detailed https://www.rapid7.com/products/threat-command/
- System requirements
- Cloud based solution - requirements detailed https://www.rapid7.com/products/threat-command/
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
We have established the following Service Level Objectives (SLOs) that govern our response and communication processes. The following time frames are relative to your time zone.
Severity-1 “Critical”: < 2 Hours initial response, 4 Business Hours update cadence
Severity-2 “High”: < 4 Business Hours initial response, 3 Business Days update cadence
Severity-3 “Medium”: < 12 Business Hours initial response, 5 Business Days update cadence - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
https://www.rapid7.com/globalassets/_pdfs/whitepaperguide/rapid7-customer-support-guidebook.pdf/
Describes how R7 support works, we have a technical Account Management team and the details can be found here.
https://www.rapid7.com/contentassets/27cecc8df3274f698972f0c2a69e6b40/rapid7-technical-account-management-support-brief.pdf/ - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- All onboarding activity is carried out by our UK team. This team will ensure you have the correct product keys and know where to find resources such as the Rapid7 support portal, knowledge base, "how to" documents, best practices, etc. They will then hand you over to your dedicated CSM who will work with you and Caretower to ensure you are set up for success against clearly defined outcomes. The CSM and Caretower will also run joint onsite CBRs to ensure long term success. Offboarding is handled is similar way. The CSM team will hand you over the offboarding team who will ensure you are correctly de-activated and capture the reason behind why we (Rapid7) did not help you achieve your desired outcomes.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- Other
- Other documentation formats
- CSV
- End-of-contract data extraction
- If you opt to end your engagement with Rapid7, you have the opportunity to collect and transfer any data that is possible to export.
- End-of-contract process
- At the end of a contract, you will have the opportunity to collect and transfer any data possible to export. If you request that Rapid7 delete all of your data, the request will be processed within 14 days. No additional fees apply.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Application to install
- Yes
- Compatible operating systems
- Other
- Designed for use on mobile devices
- No
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- Accessible via web browser
- Accessibility standards
- None or don’t know
- Description of accessibility
- Details available on request
- Accessibility testing
- Details available on request
- API
- Yes
- What users can and can't do using the API
-
The InsightIDR API supports the Representation State Transfer (REST) design pattern. Unless noted otherwise, this API accepts and produces the application/json media type. This API uses Hypermedia as the Engine of Application State (HATEOAS) and is hypermedia friendly. All API connections must be made to the security console using HTTPS.
Documentation available on request. - API documentation
- Yes
- API documentation formats
- Open API (also known as Swagger)
- API sandbox or test environment
- No
- Customisation available
- Yes
- Description of customisation
- Threat Command provides a feature called Alert Profile. This feature allows a user to define a "scenario" for each threat type they are interested in. A scenario is a series of conditions coupled together with logic that tells Threat Command what threat type the user wants to be alerted on and what severity to attach to that scenario.
Scaling
- Independence of resources
- Cloud components are hosted in AWS. Rapid increases in CPU, memory, storage, and networking capacity are performed on demand to meet the scaling and performance needs of enterprise customers.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Platform availability is provided at https://status.rapid7.com
- Reporting types
- Real-time dashboards
Resellers
- Supplier type
- Reseller providing extra support
- Organisation whose services are being resold
- Rapid7
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Other
- Other data at rest protection approach
-
All of the data processed and stored is encrypted at rest using various file or disk level encryption mechanisms. Data is encrypted using industry standard AES-256 encryption with keys managed through AWS’s Key Management Service (KMS). Where possible, Rapid7 utilizes AWS’s services to manage encryption at rest (e.g. S3, EBS, RDS, etc.). When not possible, Rapid7 utilizes block level encryption provided by LUKS.
Block level encryption is used for ElasticSearch (only used to index some asset metadata). For all other persistence technologies/layers, AWS KMS is used. - Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Further details available on request
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- PDF, RTF, Text, HTML, and XML,
- Parseable formats including CSV export, a variety of XML exports
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- Other
- Other protection between networks
- Data sent to and from the Insight platform, including data collected by collectors, agents, and engines; data ingested via APIs and plugins; and interaction with the user interface is encrypted with TLS (HTTPS). Collectors, agents, engines, and plugins are configured to verify and require a valid TLS certificate issued by a trusted certificate authority.
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- Other
- Other protection within supplier network
- Data sent to and from the Insight platform, including data collected by collectors, agents, and engines; data ingested via APIs and plugins; and interaction with the user interface is encrypted with TLS (HTTPS). Collectors, agents, engines, and plugins are configured to verify and require a valid TLS certificate issued by a trusted certificate authority.
Availability and resilience
- Guaranteed availability
- During the term of Customer’s subscription, the Service will perform in accordance with and subject to the Service Level Agreement (“SLA”) documented at https://www.rapid7.com/legal/sla/. Rapid7’s target is 100% System Availability. If the System Availability during a given month is less than 99.95%, Customer may be eligible for a credit as detailed below (“Service Credit”), which is the sole and exclusive remedy for any failure to meet the SLA.
- Approach to resilience
-
Rapid7 maintains a Business Continuity Plan for the Insight platform. The primary goal of this plan is to ensure organizational stability, as well as coordinate recovery of critical business functions in managing and supporting business recovery in the event of disruption or disaster. Thus, the plan accomplishes the following:
Ensures critical functions can continue during and after a disaster with minimal interruption;
Identifies and decreases potential threats and exposures; and
Promotes awareness of critical interdependencies.
We can share a high-level overview of our Business Continuity Plan for the Insight platform upon request. - Outage reporting
- Service status is available at status.rapid7.com. Users may elect to subscribe to notifications from this site.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Other
- Other user authentication
-
The Rapid7 Insight cloud comes with role-based access control and support for multi-factor authentication.
Members of the team using InsightIDR can be made Administrator (full access), Investigator (Incident-only access), or Read Only. These roles will limit the functional access of the user, but will not restrict the data that is accessible in InsightIDR. Creating this three-level structure allows interested members outside of the security team to gain insight into the network and view incident alerts without disrupting the workflow of others. - Access restrictions in management interfaces and support channels
- Data is compressed and encrypted before being forwarded to the Platform. Raw log data received by Collectors and uploaded to S3 is encrypted. InsightIDR employs public key cryptography and challenge-response handshakes to secure the data you entrust to the platform, where it's secured with the encryption and security controls within AWS S3. Much of the data processed and stored is encrypted using file or disk level encryption. Data is encrypted using AES-256 encryption with keys managed through AWS’s Key Management Service. Where possible, Rapid7 utilizes AWS’s services to manage encryption at rest. When not possible, Rapid7 utilizes block level encryption.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Username or password
- Other
- Description of management access authentication
- We back our privacy guidelines with layers of security to safeguard your data. Please visit https://www.rapid7.com/privacy-policy/ to view our privacy policy. We strive to ensure that the fewest people possible have access to your data, and only on an as-needed basis. Support, Software Developers, and Operations Engineers have access to data to support application development and troubleshooting. Rapid7 collects Usability Data to help us improve our solutions and services and Security System Data to deliver the platform. Sales and Solution Engineers only have access to your Security System Data if you choose to use a production environment for a proof-of-concept.
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
-
- SOC 2 type 2
- https://www.rapid7.com/trust/compliance/
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- The Information Security team is broken into the Governance and Operations functions. The Governance team's functions include GRC (governance, risk and compliance) activities and overall security program management. The Operations team's functions include vulnerability management, application security, security engineering, and various other operational roles and responsibilities. The Information Security team reports into the Products organization. We work with the Products team to build security into our platform, products and services. We engage external third party auditors to validate the security controls are operating effectively, building and maintaining customer trust and confidence.
- Information security policies and processes
-
The Information Security and Information Technology groups are responsible for monitoring compliance with data security policies and procedures. Users found in violation of information security policies may be subject to disciplinary action, up to and including 1) removal from any access to company or customer assets, data, or systems, 2) termination of employment, and/or 3) legal action. When required, Information Security will work with Legal and People Strategy to address any instance of non-compliance.
We use a SaaS product to manage and control relevant Information Security policies, which includes version control editors and full audit history. Rapid7 employment policies are documented in an internal employee handbook.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Rapid7 applies a systematic approach to managing change so that changes to services impacting Rapid7 and our customers are reviewed, tested, approved, and well communicated. Separate change management processes are in place for corporate IT systems and Insight platform systems to ensure changes are tailored to the specifics of each environment. The goal of Rapid7’s change management process is to prevent unintended service disruptions and to maintain the integrity of services provided to customers. All changes deployed to production undergo a review, testing, and approval process.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- The Information Security team is continuously monitoring the Rapid7 network and our product environments in accordance with formally documented vulnerability management processes and procedures. Information Security conducts vulnerability scans on a continuous basis, at least weekly. Rapid7 begins immediate action following the identification of critical vulnerabilities and generally completes the process in well under 48 hours.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
We use InsightIDR to monitor for suspicious and malicious behavior across our user endpoints, networks, servers, and cloud services. Our InsightIDR configuration uses a combination of user behavior analytics, attacker behavior analytics in the form of curated threat intelligence, and custom alerts.
We only monitor systems that Rapid7 has implemented in our hosting environments and platform, not systems that customers deploy themselves within their environment. - Incident management type
- Supplier-defined controls
- Incident management approach
-
There is a formal Incident Management process in place and we can provide our Incident Response policy. Incidents are handled by the Information Security team and are escalated to Rapid7's in-house Incident Response team when necessary.
Rapid7 uses InsightIDR to monitor on-premises and cloud environments for security incidents. Information Security partners with the MDR and Incident Response services teams to supplement Rapid7’s incident response program. InsightIDR alerts are regularly reviewed by analysts and escalated via a paging system when indications of potentially malicious activity are detected.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Equal opportunity
Fighting climate change
Rapid7 works to minimize waste in a variety of ways, including double-sided printing when possible, electronic internal memos, recycling, composting, reusable dishes and flatware, green cleaning products, and more. For energy efficiency, Rapid7 offices utilize photo-sensor switches and LED lightbulbs for lighting. Because Rapid7's headquarters is located in a major city (Boston, MA), many employees utilize public transportation to commute and are incentivized through a pre-tax purchase program for public transport passes. We are also part of Cyclescheme, which is a UK Government tax exemption initiative introduced in the Finance Act 1999 to promote healthier journeys to work and to reduce environmental pollution.In addition, we have an annual 'Rapid7 Gives Back' day where every Rapid7 office across the globe closes so our employees can participate in service projects within their local communities. This includes a wide range of projects such as fall cleanups, painting, donation drives, charity fundraisers, supporting open source communities, volunteering at animal shelters, and providing meals. We do amazing things when we partner together, and this event allows our teams to share that energy and give back to our communities across the globe.Equal opportunity
We refer to our people at Rapid7 as Moose, a word that remains unchanged in both its singular and plural forms. It’s one of the many ways we work to build an internal sense of camaraderie and community. We’re one Moose and proud of the diverse perspectives that strengthen our herd. Here are some notable initiatives helping to make Rapid7 a more diverse, equitable, and inclusive home for every Moose: Moose Pride: Our space for LGBTQ+ employees and allies to connect, discuss, and share ideas on creating a welcoming environment Moose Vets: A group working to promote inclusion, aid in recruitment, and drive outreach to the veteran community at Rapid7 Vibranium: A group where our Black and LatinX team members can share thoughts and ideas, drawing support from one another Women in Security: A group providing support, mentorship, and community for our global team of women engineers
Pricing
- Price
- £85,160.98 a licence
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- We can offer this as a free 30 day trial of the product.
- Link to free trial
- https://www.rapid7.com/try/insightidr/