Skip to main content

Help us improve the Digital Marketplace - send your feedback

Charterhouse Voice & Data

Insight ThreatCommand

Advanced external threat intelligence tool that finds and mitigates threats targeting your organization, employees, and customers. By proactively monitoring thousands of sources across the clear, deep, and dark web, Threat Command enables informed decisions and rapid responses to protect your business. Threat Command enables advanced automated response to threat alerts.

Features

  • Digital Risk Protection
  • Threat Protection Expertise
  • Rapid Remediation & Takedown
  • Advanced Investigation and Threat Mapping
  • Clear, Deep, & Dark Web Protection
  • IOC Management & Enrichment
  • Seamless Automation
  • Expansive Threat Library

Benefits

  • Accelerate Response, detection and automated alerts across your environment.
  • Simplified Workflows with advanced investigation and mapping capabilities
  • Unlimited 24x7x365 access to expert analysts
  • Accelerated onboarding with intuitive dashboards.

Pricing

£45 a licence a year

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at publicsector@cvdgroup.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

7 9 1 9 1 8 2 7 0 2 2 0 8 3 4

Contact

Charterhouse Voice & Data Liz Holmes
Telephone: 02076137441
Email: publicsector@cvdgroup.com

Service scope

Software add-on or extension
No
Cloud deployment model
  • Public cloud
  • Hybrid cloud
Service constraints
Available upon request
System requirements
Cloud based solution - requirements detailed https://www.rapid7.com/products/threat-command/

User support

Email or online ticketing support
Email or online ticketing
Support response times
"We have established the following Service Level Objectives (SLOs) that govern our response and communication processes. The following time frames are relative to your time zone.
Severity-1 “Critical”: < 2 Hours initial response, 4 Business Hours update cadence
Severity-2 “High”: < 4 Business Hours initial response, 3 Business Days update cadence
Severity-3 “Medium”: < 12 Business Hours initial response, 5 Business Days update cadence"
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
https://www.rapid7.com/globalassets/_pdfs/whitepaperguide/rapid7-customer-support-guidebook.pdf/
Describes how R7 support works, we have a technical Account Management team and the details can be found here.
https://www.rapid7.com/contentassets/27cecc8df3274f698972f0c2a69e6b40/rapid7-technical-account-management-support-brief.pdf/
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Rapid7 offers online help, free webinars, and formalized, curriculum-based training for Rapid7 products including hands-on technical lab exercises. Rapid7 offers a flexible training model available in virtual open enrollment, virtual dedicated and on-site classroom formats. Custom training is also an option for your organization. We build a class or entire curriculum suited to your specific training objectives. Courses can include introductory or advanced product topics and can cover one or more products. The Alert profiler enables the user to easily control noise and false positives and together with a policy, automatically close down any unreleated alerts thereby streamlining their security efforts
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
If you opt to end your engagement with Rapid7, you have the opportunity to collect and transfer any data that is possible to export.
End-of-contract process
At the end of a contract, you will have the opportunity to collect and transfer any data possible to export. If you request that Rapid7 delete all of your data, the request will be processed within 14 days. No additional fees apply.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
Application to install
Yes
Compatible operating systems
  • Linux or Unix
  • Windows
  • Other
Designed for use on mobile devices
No
Service interface
Yes
User support accessibility
None or don’t know
Description of service interface
Accessible via web browser
Accessibility standards
None or don’t know
Description of accessibility
Details available on request
Accessibility testing
Details available on request
API
Yes
What users can and can't do using the API
The API is a Restful JSON interface. A user is able to push and pull data values into and out of the Threat Command database. For example, the addition of new assets could be automated via an API call. Equally threat details and statistics can be extracted from the API to help populate extrernal report applications
API documentation
Yes
API documentation formats
Open API (also known as Swagger)
API sandbox or test environment
No
Customisation available
Yes
Description of customisation
Threat Command provides a feature called Alert Profile. This feature allows a user to define a "scenario" for each threat type they are interested in. A scenario is a series of conditions coupled together with logic that tells Threat Command what threat type the user wants to be alerted on and what severity to attach to that scenario.

Scaling

Independence of resources
Cloud components are hosted in AWS. Rapid increases in CPU, memory, storage, and networking capacity are performed on demand to meet the scaling and performance needs of enterprise customers.

Analytics

Service usage metrics
Yes
Metrics types
Platform availability is provided at https://status.rapid7.com
Reporting types
Real-time dashboards

Resellers

Supplier type
Reseller providing extra support
Organisation whose services are being resold
Rapid7

Staff security

Staff security clearance
Other security clearance
Government security clearance
None

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
Yes
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
In-house
Protecting data at rest
Other
Other data at rest protection approach
All of the data processed and stored is encrypted at rest using various file or disk level encryption mechanisms. Data is encrypted using industry standard AES-256 encryption with keys managed through AWS’s Key Management Service (KMS). Where possible, Rapid7 utilizes AWS’s services to manage encryption at rest (e.g. S3, EBS, RDS, etc.). When not possible, Rapid7 utilizes block level encryption provided by LUKS.
Data sanitisation process
Yes
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Details available upon request
Data export formats
  • CSV
  • ODF
  • Other
Other data export formats
  • PDF
  • RTF
  • Text
  • HTML
  • XML
  • Parseable Formats including CSV and XML Exports
Data import formats
  • CSV
  • Other
Other data import formats
Rapid7 has technology alliances with 50+ partners

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
During the term of Customer’s subscription, the Service will perform in accordance with and subject to the Service Level Agreement (“SLA”) documented at https://www.rapid7.com/legal/sla/. Rapid7’s target is 100% System Availability. If the System Availability during a given month is less than 99.95%, Customer may be eligible for a credit as detailed below (“Service Credit”), which is the sole and exclusive remedy for any failure to meet the SLA.
Approach to resilience
"Rapid7 maintains a Business Continuity Plan for the Insight platform. The primary goal of this plan is to ensure organizational stability, as well as coordinate recovery of critical business functions in managing and supporting business recovery in the event of disruption or disaster. Thus, the plan accomplishes the following:
Ensures critical functions can continue during and after a disaster with minimal interruption;
Identifies and decreases potential threats and exposures; and
Promotes awareness of critical interdependencies.
We can share a high-level overview of our Business Continuity Plan for the Insight platform upon request."
Outage reporting
Service status is available at status.rapid7.com. Users may elect to subscribe to notifications from this site.

Identity and authentication

User authentication needed
Yes
User authentication
2-factor authentication
Access restrictions in management interfaces and support channels
The Insight Platform provides an internal authentication mechanism as well as integration with external authentication sources for authentication, minimizing user management overhead. Authorized permissions are determined by a user’s assigned role-based access control (RBAC).
The application provides single-sign-on authentication with the following sources:
• LDAP (including Microsoft Active Directory)
• Kerberos
• SAML 2.0 via external identity provider (IdP-initiated login only)
The application also continues to support its two internal user account stores:
• XML file lists default “built-in” accounts.
• Datastore lists standard user accounts, which are created by a global administrator.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Access to user activity audit information
You control when users can access audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
British Assessment Bureau
ISO/IEC 27001 accreditation date
06/11/2023
What the ISO/IEC 27001 doesn’t cover
-
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
Yes
Any other security certifications
SOC Type 2

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
The Information Security team is broken into the Governance and Operations functions. The Governance team's functions include GRC (governance, risk and compliance) activities and overall security program management. The Operations team's functions include vulnerability management, application security, security engineering, and various other operational roles and responsibilities. The Information Security team reports into the Products organization. We work with the Products team to build security into our platform, products and services. We engage external third party auditors to validate the security controls are operating effectively, building and maintaining customer trust and confidence.
Information security policies and processes
"The Information Security and Information Technology groups are responsible for monitoring compliance with data security policies and procedures. Users found in violation of information security policies may be subject to disciplinary action, up to and including 1) removal from any access to company or customer assets, data, or systems, 2) termination of employment, and/or 3) legal action. When required, Information Security will work with Legal and People Strategy to address any instance of non-compliance.

We use a SaaS product to manage and control relevant Information Security policies, which includes version control editors and full audit history. Rapid7 employment policies are documented in an internal employee handbook."

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Rapid7 applies a systematic approach to managing change so that changes to services impacting Rapid7 and our customers are reviewed, tested, approved, and well communicated. Separate change management processes are in place for corporate IT systems and Insight platform systems to ensure changes are tailored to the specifics of each environment. The goal of Rapid7’s change management process is to prevent unintended service disruptions and to maintain the integrity of services provided to customers. All changes deployed to production undergo a review, testing, and approval process.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
The Information Security team is continuously monitoring the Rapid7 network and our product environments in accordance with formally documented vulnerability management processes and procedures. Information Security conducts vulnerability scans on a continuous basis, at least weekly. Rapid7 begins immediate action following the identification of critical vulnerabilities and generally completes the process in well under 48 hours.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
We use InsightIDR to monitor for suspicious and malicious behavior across our user endpoints, networks, servers, and cloud services. Our InsightIDR configuration uses a combination of user behavior analytics, attacker behavior analytics in the form of curated threat intelligence, and custom alerts.

We only monitor systems that Rapid7 has implemented in our hosting environments and platform, not systems that customers deploy themselves within their environment.
Incident management type
Supplier-defined controls
Incident management approach
There is a formal Incident Management process in place and we can provide our Incident Response policy. Incidents are handled by the Information Security team and are escalated to Rapid7's in-house Incident Response team when necessary.

Rapid7 uses InsightIDR to monitor on-premises and cloud environments for security incidents. Information Security partners with the MDR and Incident Response services teams to supplement Rapid7’s incident response program. InsightIDR alerts are regularly reviewed by analysts and escalated via a paging system when indications of potentially malicious activity are detected.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

Our environmental strategy demonstrates the efforts Rapid7 make as a business and global participant in the fight against climate change.

• Our Sustainability Committee meets regularly to discuss how we continue to improve our approach and ensure that we exceed all applicable environmental laws and regulations.

Rapid7:

• Identify and measure the most material environmental impacts of our operations.

• establish targets to reduce our environmental impact and strive for continuous improvement. Even though we are a technology company with no physical manufacturing, we work to minimize our greenhouse gas (GHG) emissions. We calculate our GHG emissions on a regular basis to review where we can make more of an impact.

• reuse, recycle, and responsibly dispose of electronic waste. Rapid7 is committed to using third party vendors that allow us to recycle our outdated electronics according to international guidelines.

• minimize waste sent to landfill through recycling in all locations and composting of food waste in select Rapid7 offices.

• conduct waste audits in larger Rapid7 offices to measure waste reduction.

• have switched from single use dishware and cutlery to reusable products, reducing the amount of waste we send to landfills.

• measure major greenhouse gas emissions with the aim of continuous reduction of carbon-intensive activities, improved energy efficiencies, and the procurement of renewable energy.

• develop goals, practices, and metrics to measure and create more sustainable workplaces at Rapid7 offices globally.

• rely on video conferencing technology in all Rapid7 offices in order to reduce carbon emissions from non-essential business travel.

• locate offices near transportation hubs to maximize the number of employees who use public transportation.

• locate offices in areas with easy, walkable access to a wide range of amenities.

• use sustainable materials and systems when completing new offices builds and retrofitting where appropriate.

Tackling economic inequality

• Offices designed to be inclusive to all Moose, with gender-neutral restrooms and showers and mother’s suites

• Competitive maternity and paternity leave for expectant parents

• Pay equity regardless of gender or race, confirmed by routine surveys and external specialist review

• Curated and gamified courses on diversity, inclusion, and belonging through Linkedin Learning

• Expand the cybersecurity workforce by developing new talent sources and fostering STEM programs which reach underrepresented and under-resourced communities. When we create more opportunities for all people we further equality while expanding the workforce, solving one of cybersecurity’s biggest challenges.

• Support free and open security solutions, which provide tools to those without resources to protect their organizations, and support organizations who lack resources to effectively implement the cybersecurity measures they need.

• Strengthen cybersecurity outcomes and awareness for all through advocacy and research, particularly within under-resourced and vulnerable communities. We are compelled to create better policy outcomes and drive community collaboration, support those without significant security resources, and provide greater education on the realities of the threat landscape. The Rapid7 Cybersecurity Foundation invests in organizations who work in the following areas in pursuit of creating a secure and prosperous digital future for all:

• STEM education, Diversity, Equity & Inclusion in technology, and efforts by organizations to make careers in cybersecurity welcoming to all;

• Open source tools and volunteering to help make effective cybersecurity solutions available to under-resourced organizations, including non-profits and municipalities; and

• Research and policy advocacy to strengthen cybersecurity for vulnerable communities, improve cybersecurity awareness, and make effective security outcomes available to all.

Equal opportunity

"At Rapid7, we fundamentally believe that every person deserves an equal opportunity to build an exceptional career and that diversity of mindset is integral to the growth and success of our company."

Corey Thomas, Chairman & CEO

At Rapid7, we celebrate people bringing diverse perspectives to the table as we work together to help create a secure digital future for everyone.

Diversity of backgrounds and mindsets help us close gaps in experience and spark innovation. A deep commitment to Diversity, Equity & Inclusion is core to the strength and success of our business.

It empowers our communities, makes our company healthier, and makes our customers more secure. It’s also, quite simply, the right thing to do.

Not just for us, but for the advancement of our industry and our world. This is why we are building a place where everyone feels welcome to be their authentic selves.

We’re committed to bringing together people from different backgrounds and investing in programs that nurture pathways for the future talent of our tech community.

This commitment is fuelled by two of our core values:

Be an Advocate and Bring You.

We advocate for customers, underrepresented groups, and one another, to create a more connected and collaborative experience for all; and we want every person to feel empowered to embrace their own uniqueness and feel comfortable bringing their true self to work.

Wellbeing

We refer to our people at Rapid7 as Moose, a word that remains unchanged in both its singular and plural forms.

It’s one of the many ways we work to build an internal sense of camaraderie and community.

We’re one Moose and proud of the diverse perspectives that strengthen our herd.

Here are some notable initiatives helping to make Rapid7 a more diverse, equitable, and inclusive home for every Moose.

At Rapid7, we believe that everyone has a role to play in creating an inclusive environment.

We regularly create intentional moments for our people to educate themselves on the lived experience of others and grow on their personal journey of inclusion.

Our goal is that anyone, no matter their background can come to Rapid7, be proud of who they are and do their best work ever.

Community and Culture are a big deal here, our Rapid Impact Groups (RIGs) are supported by the business, but entirely driven by employees.

The only requirement is that our groups foster connection across the business, offer opportunities for professional development, aid in the elevation of the communities they were created to support and find meaningful ways to support fellow RIGs.

• Offices designed to be inclusive to all Moose, with gender-neutral restrooms and showers and mother’s suites

• Competitive maternity and paternity leave for expectant parents

• Pay equity regardless of gender or race, confirmed by routine surveys and external specialist review

• Curated and gamified courses on diversity, inclusion, and belonging through LinkedIn Learning

Pricing

Price
£45 a licence a year
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
We can offer this as a free 30 day trial of the product.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at publicsector@cvdgroup.com. Tell them what format you need. It will help if you say what assistive technology you use.