Rapid7 (NASDAQ:RPD) is trusted by IT and security professionals around the world to manage risk, simplify modern IT complexity, and drive innovation. Rapid7 analytics transform today’s vast amounts of security and IT data into the answers needed to securely develop and operate sophisticated IT networks and applications. Rapid7 research, technology, and services drive vulnerability management, penetration testing, application security, incident detection and response, and log management for more than 6,300 organizations across more than 120 countries, including 39% of the Fortune 1000. To learn more about Rapid7 or join our threat research, visit

Our Website:

Whitepaper: Penetration Testing Toolkit

by Rapid7Jun 14, 2017

Knowing your vulnerabilities - and the ways in which attackers could exploit them - is one of the greatest insights you can get in improving your security program. Penetration testing is one of the key ways you can gain this insight, but it can be hard to know how to fit them in to a larger security program, or even how to get started.

Whitepaper: Vulnerability Management & Endpoint Analytics Toolkit

by Rapid7Jun 14, 2017

The modern network is no longer compromised simply of servers and desktops; remote workers, cloud and virtualization, and mobile devices mean your risk exposure is changing every minute. InsightVM provides a fully scalable, and efficient way to collect your vulnerability data, turn it into answers, and minimize your risk.

Whitepaper: Top 20 Critical Security Controls Toolkit

by Rapid7Jun 14, 2017

The Center for Internet Security (CIS) Top 20 Critical Security Controls (previously known as the SANS Top 20 Critical Security Controls) are pretty much point of entry for any organization who wants to be prepared to stop today's most pervasive and dangerous attacks. In other words: If you're not paying attention to them already, you should get on that, posthaste. Learn why Rapid7 ranked 19 out of 20 for security controls.

Whitepaper: Cloud Security Toolkit

by Rapid7Jun 14, 2017

The secret is out: Enterprises large and small have moved to the cloud, and more are making the move daily. Whether you're an early adopter or you've been battling that persistent strain of nephophobia going around, it's important to thoroughly understand and evaluate potential cloud vendors, instilling confidence for your organization and your customers.

Whitepaper: Modern Application Security Toolkit

by Rapid7Jun 14, 2017

With application technologies evolving at such a rapid pace, both security teams and vendors have a tough time keeping pace. Over the last decade, applications have evolved from being static HTML sites to highly dynamic ones leveraging a host of technologies with highly complex clients and API driven back ends. Today's applications range from multi-page AJAX driven applications to the ever increasing Single Page Applications (SPAs) and are appearing across all industries and company sizes.

Whitepaper: Mobile Security Guide: Protect Your Organization From Mobile Malware

by Rapid7Oct 29, 2013

As mobile devices become more common, cybercriminals see them as having huge profit potential, and aim to gain access to the users' confidential personal and financial information. In this Mobile Security Guide, we will walk you through the mobile malware landscape and what you need to know to keep your organization's data safe.

Whitepaper: Combating Phishing Attacks: How to Design an Effective Program to Protect Your Organization Against Social Engineering

by Rapid7Oct 29, 2013

It seems like we have been hearing a lot about phishing in the news in recent years, and this threat hasn't abated yet. Why are attacks via phishing and social engineering in general so prevalent and so effective? This whitepaper examines the many different methods employed in phishing attacks and social engineering campaigns, and offers a solution-based approach to mitigating risk from these attack vectors.

Whitepaper: Rapid7 PCI DSS Version 3.0 Compliance Guide

by Rapid7Oct 29, 2013

Negative media coverage, a loss of customer confidence, and the resulting loss in sales can cripple a business. As a result, all entities that handle credit cardholder information are being challenged to adopt more effective data protection measures. The Payment Card Industry (PCI) Data Security Standard (DSS) was created to confront the rising threat to credit cardholder personal information. This compliance guide will provide readers with an overview of the requirements as well as suggested steps in achieving PCI compliance.

Whitepaper: The Unwitting Danger Within - Understanding and Mitigating User-Based Risk

by Rapid7Oct 29, 2013

There is a security risk in your organization that can render all of your security controls worthless with a single click. It is dynamic and changes in real-time. It is the weakest link in your infrastructure, and no singular security appliance or software exists that can lock it down. What's more, you have not one but hundreds-perhaps thousands-of these risks, each sitting behind a desk in your organization. While users represent the single largest security risk to organizations, there are measures you can put in place to mitigate the risk they can introduce to your organization. This eBook explores the different kinds of user-based risks in today's corporate environment, including mobile devices and cloud services, and gives actionable guidance on how to mitigate these risks.

Whitepaper: Gartner MarketScope Newsletter for Vulnerability Assessment 2013

by Rapid7Oct 29, 2013

Managing risk in your organization is crucial: a compromise or lack of compliance can have far reaching impact. Rapid7 understands this criticality and the complexities of protecting your organization in the ever-changing IT landscape, and once again, Rapid7 rates "Strong Positive" - the highest possible rating by Gartner.

Learn how our top-rated vulnerability assessment solution, Nexpose, and our new endpoint controls monitoring solution, ControlsInsight, help you accurately assess your defenses, make informed decisions, create credible action plans, and monitor ongoing progress.