Rapid7 InsightVM
InsightVM provides is a fully scalable solution that collects and provides visibility into the vulnerabilities in your IT environment—including local, remote, cloud, containerised, and virtual infrastructure—but also clarity into how those vulnerabilities translate into business risk and which are most likely to be targeted by attackers.
Features
- Adaptive Security. Continuous live monitoring of exposures using Rapid7 Agents
- Risk Scoring. Five risk strategies factoring in likelihood of compromise
- Reporting and Dashboards. Customisable reports, Exposure Analytics, Live Assessment
- Configuration and Compliance Management. SCAP compliant, scan templates, Policy Manager
- InsightVM API. RESTful API supports wide spectrum of integrations
- Automation Workflows. Automate endpoint containment or patch a vulnerability
- Cloud and Virtual Infrastructure Assessment
- Lightweight Endpoint Agent
Benefits
- Integration
- Coverage
- Workflow
- Scalability
- Reporting and Dashboards
- Risk Prioritisation
- Remediation Manager
- Actionable Intelligence
- Lightweight Agent
- Industry Recognition - Gartner, Forrester Wave, Frost & Sullivan
Pricing
£7.38 a device a year
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
6 8 6 4 0 9 5 9 0 9 1 6 6 1 0
Contact
Charterhouse Voice & Data
Liz Holmes
Telephone: 02076137441
Email: publicsector@cvdgroup.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
- Minimum Service Requirements available from https://www.rapid7.com/products/insightvm/system-requirements/
- System requirements
-
- Ports for communication between agent, engines, console, and cloud
- Detailed system requirements at: https://www.rapid7.com/products/insightvm/system-requirements/.
- Recommended hardware sizing
- Supported operating systems
- Supported web browsers
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
"We have established the following Service Level Objectives (SLOs) that govern our response and communication processes. The following time frames are relative to your time zone.
Severity-1 “Critical”: < 2 Hours initial response, 4 Business Hours update cadence
Severity-2 “High”: < 4 Business Hours initial response, 3 Business Days update cadence
Severity-3 “Medium”: < 12 Business Hours initial response, 5 Business Days update cadence" - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Severity-1 “Mission Critical” Initial Response < 2 Hours
Severity-2 “High” Initial Response < 4 Business Hours
Severity-3 “Medium” Initial Response < 12 Business Hours
https://www.rapid7.com/globalassets/_pdfs/whitepaperguide/rapid7-customer-support-guidebook.pdf/
Describes how R7 support works, we have a technical Account Management team and the details can be found here.
https://www.rapid7.com/contentassets/27cecc8df3274f698972f0c2a69e6b40/rapid7-technical-account-management-support-brief.pdf/" - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Rapid7 offers online help, free webinars, and formalized, curriculum-based training for Rapid7 products including hands-on technical lab exercises. Rapid7 offers a flexible training model available in virtual open enrollment, virtual dedicated and on-site classroom formats. Custom training is also an option for your organization. We build a class or entire curriculum suited to your specific training objectives. Courses can include introductory or advanced product topics and can cover one or more products.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- Other
- Other documentation formats
- CSV
- End-of-contract data extraction
- If you opt to end your engagement with Rapid7, you have the opportunity to collect and transfer any data that is possible to export.
- End-of-contract process
- At the end of a contract, you will have the opportunity to collect and transfer any data possible to export. If you request that Rapid7 delete all of your data, the request will be processed within 14 days. No additional fees apply.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Application to install
- Yes
- Compatible operating systems
-
- Linux or Unix
- MacOS
- Windows
- Other
- Designed for use on mobile devices
- No
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
-
"The Home page of the Security Console includes several informational panels reflecting the assessment of risk in your environment along with your existing configurations. The data you accumulate and settings you configure will populate this space. Default items include:
• Risk and Assets Over Time
• Sites
• Current Scans for All Sites
• Asset Groups
• Asset Tags " - Accessibility standards
- None or don’t know
- Description of accessibility
- Details available on request
- Accessibility testing
- Details available on request
- API
- Yes
- What users can and can't do using the API
- "InsightVM offers the InsightVM Application Programming Interface (API) Version 3. This API supports the Representation State Transfer (REST) design pattern. Unless noted otherwise, this API accepts and produces the application/json media type. This API uses Hypermedia as the Engine of Application State (HATEOAS) and is hypermedia friendly. All API connections must be made to the security console using HTTPS.
- API documentation
- Yes
- API documentation formats
- Open API (also known as Swagger)
- API sandbox or test environment
- No
- Customisation available
- Yes
- Description of customisation
- InsightVM is highly configurable to meet specific customer requirements. Users can customise dashboards, reports, scan schedules, scan templates, configuration and compliance policy templates, alerts, sites, asset groups, role based access controls, and more.
Scaling
- Independence of resources
- Cloud components are hosted in AWS. Rapid increases in CPU, memory, storage, and networking capacity are performed on demand to meet the scaling and performance needs of enterprise customers.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Platform availability, provided at https://status.rapid7.com
- Reporting types
- Real-time dashboards
Resellers
- Supplier type
- Reseller providing extra support
- Organisation whose services are being resold
- Rapid7
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
- Other
- Other data at rest protection approach
-
All of the data processed and stored is encrypted at rest using various file or disk level encryption mechanisms. Data is encrypted using industry standard AES-256 encryption with keys managed through AWS’s Key Management Service (KMS). Where possible, Rapid7 utilizes AWS’s services to manage encryption at rest (e.g. S3, EBS, RDS, etc.). When not possible, Rapid7 utilizes block level encryption provided by LUKS.
Block level encryption is used for ElasticSearch (only used to index some asset metadata). For all other persistence technologies/layers, AWS KMS is used. - Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
-
InsightVM supports data exports, real-time alerts, and scripted API integrations to deliver results and coordinate activity between these solutions. Depending on the type of integration desired and the solution in place, InsightVM data can be delivered and custom functionality can be created to enable integrations.
InsightVM provides a variety of reports in parseable formats. Reports can be created in PDF, RTF, Text, HTML, and XML, or in parseable formats including CSV export, a variety of XML exports, and direct-to-database export. Report content is based on the report template selected as well as filter criteria for vulnerability types and severities." - Data export formats
-
- CSV
- Other
- Other data export formats
-
- RTF
- HTML
- XML
- Data import formats
-
- CSV
- Other
- Other data import formats
- DS/IPS, GRC, NAC, and SIEM formats
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- Other
- Other protection between networks
- Data sent to and from the Insight platform, including data collected by collectors, agents, and engines; data ingested via APIs and plugins; and interaction with the user interface is encrypted with TLS (HTTPS). Collectors, agents, engines, and plugins are configured to verify and require a valid TLS certificate issued by a trusted certificate authority.
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- Other
- Other protection within supplier network
- Data sent to and from the Insight platform, including data collected by collectors, agents, and engines; data ingested via APIs and plugins; and interaction with the user interface is encrypted with TLS (HTTPS). Collectors, agents, engines, and plugins are configured to verify and require a valid TLS certificate issued by a trusted certificate authority.
Availability and resilience
- Guaranteed availability
- During the term of Customer’s subscription, the Service will perform in accordance with and subject to the Service Level Agreement (“SLA”) documented at https://www.rapid7.com/legal/sla/. Rapid7’s target is 100% System Availability. If the System Availability during a given month is less than 99.95%, Customer may be eligible for a credit as detailed below (“Service Credit”), which is the sole and exclusive remedy for any failure to meet the SLA.
- Approach to resilience
-
"Rapid7 maintains a Business Continuity Plan for the Insight platform. The primary goal of this plan is to ensure organizational stability, as well as coordinate recovery of critical business functions in managing and supporting business recovery in the event of disruption or disaster. Thus, the plan accomplishes the following:
Ensures critical functions can continue during and after a disaster with minimal interruption;
Identifies and decreases potential threats and exposures; and
Promotes awareness of critical interdependencies.
We can share a high-level overview of our Business Continuity Plan for the Insight platform upon request." - Outage reporting
- Service status is available at status.rapid7.com. Users may elect to subscribe to notifications from this site.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Other
- Other user authentication
-
InsightVM provides an internal authentication mechanism as well as integration with external authentication sources for authentication, minimizing user management overhead. Authorized permissions are determined by a user’s assigned role-based access control (RBAC).
The application provides single-sign-on authentication with the following sources:
• LDAP (including Microsoft Active Directory)
• Kerberos
• SAML 2.0 via external identity provider (IdP-initiated login only)
The application also continues to support its two internal user account stores:
• XML file lists default “built-in” accounts.
• Datastore lists standard user accounts, which are created by a global administrator. - Access restrictions in management interfaces and support channels
-
InsightVM provides comprehensive role-based access controls (RBACs) that govern functionality such as scanning capabilities, scan configuration creation/modification, asset grouping, reporting, administrative functions, and other settings. Along with functional access controls, RBAC extends to visibility of scan target assets. Users can only view scan or report data on those devices or collections of devices to which they have access. InsightVM includes pre-defined user roles addressing core permission sets that can be customized as needed. Additional custom roles can be created and assigned to users, allowing for efficient access management.
For additional information regarding roles and permissions, please refer to: https://insightvm.help.rapid7.com/docs/managing-users-and-authentication. - Access restriction testing frequency
- At least once a year
- Management access authentication
- 2-factor authentication
Audit information for users
- Access to user activity audit information
- You control when users can access audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
- SOC2 Type 2
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- The Information Security team is broken into the Governance and Operations functions. The Governance team's functions include GRC (governance, risk and compliance) activities and overall security program management. The Operations team's functions include vulnerability management, application security, security engineering, and various other operational roles and responsibilities. The Information Security team reports into the Products organization. We work with the Products team to build security into our platform, products and services. We engage external third party auditors to validate the security controls are operating effectively, building and maintaining customer trust and confidence.
- Information security policies and processes
-
"The Information Security and Information Technology groups are responsible for monitoring compliance with data security policies and procedures. Users found in violation of information security policies may be subject to disciplinary action, up to and including 1) removal from any access to company or customer assets, data, or systems, 2) termination of employment, and/or 3) legal action. When required, Information Security will work with Legal and People Strategy to address any instance of non-compliance.
We use a SaaS product to manage and control relevant Information Security policies, which includes version control editors and full audit history. Rapid7 employment policies are documented in an internal employee handbook."
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Rapid7 applies a systematic approach to managing change so that changes to services impacting Rapid7 and our customers are reviewed, tested, approved, and well communicated. Separate change management processes are in place for corporate IT systems and Insight platform systems to ensure changes are tailored to the specifics of each environment. The goal of Rapid7’s change management process is to prevent unintended service disruptions and to maintain the integrity of services provided to customers. All changes deployed to production undergo a review, testing, and approval process.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- The Information Security team is continuously monitoring the Rapid7 network and our product environments in accordance with formally documented vulnerability management processes and procedures. Information Security conducts vulnerability scans on a continuous basis, at least weekly. Rapid7 begins immediate action following the identification of critical vulnerabilities and generally completes the process in well under 48 hours.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
"We use InsightIDR to monitor for suspicious and malicious behavior across our user endpoints, networks, servers, and cloud services. Our InsightIDR configuration uses a combination of user behavior analytics, attacker behavior analytics in the form of curated threat intelligence, and custom alerts.
We only monitor systems that Rapid7 has implemented in our hosting environments and platform, not systems that customers deploy themselves within their environment." - Incident management type
- Supplier-defined controls
- Incident management approach
-
"There is a formal Incident Management process in place and we can provide our Incident Response policy. Incidents are handled by the Information Security team and are escalated to Rapid7's in-house Incident Response team when necessary.
Rapid7 uses InsightIDR to monitor on-premises and cloud environments for security incidents. Information Security partners with the MDR and Incident Response services teams to supplement Rapid7’s incident response program. InsightIDR alerts are regularly reviewed by analysts and escalated via a paging system when indications of potentially malicious activity are detected."
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Fighting climate change
-
Fighting climate change
At Charterhouse group are working hard to fight climate change, from Zero or offset carbon suppliers, to making sure we can use the circular economy and deploy tools and services that are carbon or energy reducing compared to the current platforms and services. Some examples are SIP from a carbon neutral company, to recycling old handsets and PBX equipment, and looking to displace handsets for power savings by using softphones on laptops and PC's that are already consuming power over physical handsets that draw power in addition to devices already being powered. We are empowering the business to look at this area closely and develop new policies and objectives as part of the business planning cycles. The Environment Policy of The Company is to ensure so far as it is reasonably practicable that its operations will be carried out with a commitment to protecting and enhancing the environment. As an office we know that we generate wastepaper products. However, as we strive for excellence in every aspect of our business, we are committed to minimising the environmental impacts of the business operation. Our stated aims are to: • Aim to continuously improve our environmental performance particularly with regards to our recycling and re-use of paper. • Where possible we will use recycled or ecologically friendly paper. • We will use 'waste' paper for notepads unless confidentiality may be compromised. • Reduce our consumption of resources and improve the efficiency of those resources by printing double sided where practicable. • Manage waste generated from my business operations according to the principles of reduction, re-use and recycling. • Recycle all paper products, ink or toner cartridges. • Comply as a minimum with all relevant environmental legislation as well as other environmental requirements. - Covid-19 recovery
-
Covid-19 recovery
Charterhouse is a growing group of companies, made up of several organisations from across the UK, we are continuing to employ staff from various backgrounds. We have created new employment opportunities, will re-train staff that find themselves in a position that their role is no longer available and support employment of those who left employment by COVID-19. Locally sourced staff is no longer the norm, we are embracing the work from anywhere culture, our staff current and new will have the option to work from home or an office and no longer need to be employed from the local area however, where new staff would like to work from a local office, they will be given that opportunity. Charterhouse will look to support businesses in the recovery from Covid by supporting them in new ways of working by implementing new technologies that support the new ways of working that decrees the need for travel and reduce the chance of infection rates. These new technologies and ways of working will support the recovery of our NHS and other organisations to levels pre-Covid. Our ability to bring together many technology stacks allows business to employ the right people as Charterhouse does and drive success through innovative ways of working. Implementing new health initiatives within Charterhouse will support mental and physical health for staff, maintaining the hybrid working environment will stop the spread of the COVID 19 within our workforce allowing economic growth. At Charterhouse, we feel strongly about being able to give back to our community. Each year we nominate an organisation doing great work with those in need and support them – both financially through our regular fundraising, and practically with our business technology expertise where they need help and support. - Tackling economic inequality
-
Tackling economic inequality
Charterhouse is growing, in the last 2 years we have purchased existing business to ensure group growth, these companies have brought growth to both their business and ours. These businesses are hiring within the group to ensure that we can continue organic growth to secure the future of staff and the wider group. Our ability to support SME’s is backed by our experience as an SME and one a family run business. Growth for our group comes from within and externally where your ability and attitude is more important than diversity or background. Employing the best person is key to growth, but more importantly equality. Our HR team look at the person and ability to carry out a role rather than disability or background. Our goal is to continue growth from organic, ethical and people centric sales. We allow people to be themselves, to thrive, to learn and grow in their role or for future roles. Our staff where needed will be accredited via vendors and suppliers as well as industry standard qualifications needed, backed by time and support from Charterhouse to achieve these skills and accreditations. Charterhouse are introducing more robust policies to promote a supply chain that is more sustainable and based on value than size. Smaller distributers and suppliers can deliver more value to the group, we can support smaller business by offering more opportunities to work with us and on behalf of our customers where we need 3rd party support or distribution. We work closely with suppliers to ensure that we can deliver on contracts sustainable, ethically and securely, working to many ISO standards though to Cyber essentials, our accreditations provide a framework for growth, improvement and security. - Equal opportunity
-
Equal opportunity
We have a robust recruitment policy that drives equality from the top down. Assessment criteria Our aim at Charterhouse Group, will be to always recruit the person who is most suited to each role, whether the candidate is internal or external. We recruit solely on the basis of the candidate’s skills, capabilities and individual merit as measured against the criteria for the role. Qualifications, experience, and skills may also be assessed at the level that is relevant to the job. Job descriptions and employee specifications Before initiating the recruitment process, the responsible Hiring Manager must ensure that there is an up-to-date job description for the role with clear employee specification. Advertisement of vacancies It is our policy that all vacancies be advertised on the company intranet. Equality, Diversity and Inclusion We are committed to applying our equality, diversity and inclusion policy at all stages of the recruitment and selection process. We always carry out shortlisting, interviewing and selection without regard to an applicant's sex, gender identity, sexual orientation, marital or civil partnership status, skin colour, race, nationality, ethnic or national origins, religion or belief, age, pregnancy or maternity leave. We will never exclude any candidate with a disability unless it is clear that the candidate is unable to perform a duty that is intrinsic to the role, having taken into account reasonable adjustments. To prevent any candidate from being disadvantaged because of a disability, the individual responsible for communicating with applicants should ask each candidate whether or not they require reasonable adjustments to be made. Interviews Hiring Managers conducting recruitment interviews will ensure that any questions asked during the interview is not in any way discriminatory or unnecessarily intrusive. The interview will focus on the role and the skills needed to perform it effectively. - Wellbeing
-
Wellbeing
Charterhouse take wellbeing seriously, not only do we ensure staff can work to a health work/life balance, but also can work from home when needed. The further deployment of Yu Life gives staff a set of tools and challenges to maintain both body and mental health. Teams, individuals and friends all compete in daily and weekly challenges to keep body fit, and allows for mental hearth checks and challenges. Annual company meetings and mental health first aiders all encourage staff to maintain mental health, but in a time of need they know they have help available. In addition to the above, Charterhouse offer all staff added benefits, for example Private Health care, free flu jabs and eye tests, a day off on your birthday each year, all to help boost mind and body health.
Pricing
- Price
- £7.38 a device a year
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- We can offer this as a free 30 day trial of the product.