Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

Rapid 7 to offer new tools for risk management, performance tracking

Steve Ragan | Aug. 21, 2013
Rapid 7 goes outside its usual area and talks tools to help organizations deal with user-based risk and track security control performance

 Rapid 7 this week unveiled a new set of tools designed to help businesses better judge the overall effectiveness of existing security controls and the risk associated with users across the organization.

The announcement came during UNITED, the firm's annual security gathering for customers and analysts. Company officials say the tools, called UserInsight and ControlsInsight, will help organizations deal with user-based risk, and track the performance of existing security controls across the network. Known for vulnerability management (Nexpose), penetration testing (Metasploit), mobile risk management (Mobilisafe), these new tools seem to fall outside of the norm for Rapid7.

CSO sat down with senior vice president of products and engineering, Lee Weiner, to ask why these tools, and why now.

"We've been very clear that we want to make sure we solved relevant security problems," said Weiner. "As we talked to our customers more and more, and we understand that some of the investments they've made to gain visibility and protect their organizations aren't working well for them; we've tried to build solutions that help solve those problems."

They're not looking to tackle every vertical in the security market, because that wouldn't make sense, but building something around their customer's needs does, said Weiner. In fact, over the last 12 to 18 months, Rapid7 customers and the market in general, have reported a lack of visibility into their security posture. The two areas of concern center on risk around users and the effectiveness of existing security controls.

Explaining the rationale behind developing these latest offerings, Weiner told CSO that it has to do with a couple of dynamics. First, the effectiveness of attacks has increased substantially, as well as the volume of attacks. At the heart of this growth is the weakest link in the security chain - people.

In the IT landscape, users today are more empowered than they ever were before, almost to the point to where IT isn't needed. Over the years, advances in technology means that users can work from anywhere at any time, and these freedoms have caused some issues and created a bit of an unbalanced situation for those charged with defending the business. One of the key points for regaining that balance is visibility into what users are doing, as well as when and where they are doing it - the biggest points of interest being cloud environments and mobile environments.

At the same time, organizations looking to gain this balancing foothold are either poorly served with the level of visibility available to them via existing controls, or they are unable to acquire it due to a number of factors including a lack of human or financial resources.


1  2  3  Next Page 

Sign up for Computerworld eNewsletters.