Hi [[ session.user.profile.firstName ]]

IT Security by Rapid7

  • Date
  • Rating
  • Views
  • Rapid7 AppSpider Product Demo - APAC Rapid7 AppSpider Product Demo - APAC Hollis Howell Recorded: Feb 17 2017 23 mins
    While today's malicious attackers pursue a variety of goals, they share a preferred channel of attack - the millions of custom web, mobile, and cloud applications companies deploy to serve their customers.

    Join us for a live demo of Rapid7's AppSpider, to explore its capabilities of dynamically scanning applications for vulnerabilities across all modern technologies.
  • Rapid7 AppSpider Product Demo Rapid7 AppSpider Product Demo Hollis Howell Recorded: Feb 16 2017 23 mins
    While today's malicious attackers pursue a variety of goals, they share a preferred channel of attack - the millions of custom web, mobile, and cloud applications companies deploy to serve their customers.

    Join us for a live demo of Rapid7's AppSpider, to explore its capabilities of dynamically scanning applications for vulnerabilities across all modern technologies.
  • Rapid7 AppSpider Product Demo - EMEA Rapid7 AppSpider Product Demo - EMEA Hollis Howell Recorded: Feb 16 2017 23 mins
    While today's malicious attackers pursue a variety of goals, they share a preferred channel of attack - the millions of custom web, mobile, and cloud applications companies deploy to serve their customers.

    Join us for a live demo of Rapid7's AppSpider, to explore its capabilities of dynamically scanning applications for vulnerabilities across all modern technologies.
  • Ransonware: Don't Believe The Hype of Vendors - APAC Ransonware: Don't Believe The Hype of Vendors - APAC Matthew Hathaway Recorded: Feb 15 2017 57 mins
    A number of Rapid7's customers have been evaluating the risks posed by the swift rise of ransomware as an attack vector. As of today, there is no known method for recovering lost data without cooperating with the criminals responsible for the ransomware. Of course, backing up valuable data before an attack is critical in order to recover from this kind of attack.

    Join Matthew Hathaway, Senior Managers of Solution Marketing to cover:

    - Snake oil sales techniques around ransomware
    - Best ways to protect your organization from this threat
    - Disaster recovery processes to have in place
    - And more!
  • Ransomware: Don't Believe The Hype of Vendors Ransomware: Don't Believe The Hype of Vendors Matthew Hathaway Recorded: Feb 14 2017 56 mins
    A number of Rapid7's customers have been evaluating the risks posed by the swift rise of ransomware as an attack vector. As of today, there is no known method for recovering lost data without cooperating with the criminals responsible for the ransomware. Of course, backing up valuable data before an attack is critical in order to recover from this kind of attack.

    Join Matthew Hathaway, Senior Managers of Solution Marketing to cover:

    - Snake oil sales techniques around ransomware
    - Best ways to protect your organization from this threat
    - Disaster recovery processes to have in place
    - And more!
  • Ransomware: Don't Believe The Hype of Vendors - EMEA Ransomware: Don't Believe The Hype of Vendors - EMEA Matthew Hathaway Recorded: Feb 14 2017 56 mins
    A number of Rapid7's customers have been evaluating the risks posed by the swift rise of ransomware as an attack vector. As of today, there is no known method for recovering lost data without cooperating with the criminals responsible for the ransomware. Of course, backing up valuable data before an attack is critical in order to recover from this kind of attack.

    Join Matthew Hathaway, Senior Managers of Solution Marketing to cover:

    - Snake oil sales techniques around ransomware
    - Best ways to protect your organization from this threat
    - Disaster recovery processes to have in place
    - And more!
  • Rapid7 InsightIDR Product Demo - APAC Rapid7 InsightIDR Product Demo - APAC Eric Sun and Pat Haley Recorded: Feb 10 2017 48 mins
    Rapid7 InsightIDR delivers trust and confidence: you can trust that any suspicious behavior is being detected, and have confidence that with the full context, you can quickly remediate.

    Developed side-by-side with incident response teams, InsightIDR eliminates data complexity, reduces alert fatigue, and makes analytics accessible to all. You see only what you need to see – from endpoint to cloud.

    By integrating with your existing network & security stack, InsightIDR leverages user behavior analytics to correlate the millions of events your organization generates daily to the exact users and assets behind them. Along with custom included intruder traps, you'll automatically detect the top attack vectors behind breaches, including compromised credentials, malware, and phishing. Combined with a fully searchable data set and endpoint interrogation, InsightIDR directly addresses the gaps found in most of today's detection technologies, including SIEM and IPS.

    Watch this video to learn how InsightIDR can help you:

    How to cut through the noise to detect attacks
    How to investigate incidents faster
    How to end the drudgery of security data management
    Q&A
    And more!
    We believe this is the SIEM you've been waiting for!
  • Rapid7 InsightIDR Product Demo Rapid7 InsightIDR Product Demo Eric Sun and Pat Haley Recorded: Feb 9 2017 48 mins
    Rapid7 InsightIDR delivers trust and confidence: you can trust that any suspicious behavior is being detected, and have confidence that with the full context, you can quickly remediate.

    Developed side-by-side with incident response teams, InsightIDR eliminates data complexity, reduces alert fatigue, and makes analytics accessible to all. You see only what you need to see – from endpoint to cloud.

    By integrating with your existing network & security stack, InsightIDR leverages user behavior analytics to correlate the millions of events your organization generates daily to the exact users and assets behind them. Along with custom included intruder traps, you'll automatically detect the top attack vectors behind breaches, including compromised credentials, malware, and phishing. Combined with a fully searchable data set and endpoint interrogation, InsightIDR directly addresses the gaps found in most of today's detection technologies, including SIEM and IPS.

    Watch this video to learn how InsightIDR can help you:

    How to cut through the noise to detect attacks
    How to investigate incidents faster
    How to end the drudgery of security data management
    Q&A
    And more!
  • Rapid7 InsightIDR Product Demo - EMEA Rapid7 InsightIDR Product Demo - EMEA Eric Sun and Pat Haley Recorded: Feb 9 2017 48 mins
    Rapid7 InsightIDR delivers trust and confidence: you can trust that any suspicious behavior is being detected, and have confidence that with the full context, you can quickly remediate.

    Developed side-by-side with incident response teams, InsightIDR eliminates data complexity, reduces alert fatigue, and makes analytics accessible to all. You see only what you need to see – from endpoint to cloud.

    By integrating with your existing network & security stack, InsightIDR leverages user behavior analytics to correlate the millions of events your organization generates daily to the exact users and assets behind them. Along with custom included intruder traps, you'll automatically detect the top attack vectors behind breaches, including compromised credentials, malware, and phishing. Combined with a fully searchable data set and endpoint interrogation, InsightIDR directly addresses the gaps found in most of today's detection technologies, including SIEM and IPS.

    Watch this video to learn how InsightIDR can help you:

    How to cut through the noise to detect attacks
    How to investigate incidents faster
    How to end the drudgery of security data management
    Q&A
    And more!
    We believe this is the SIEM you've been waiting for!
  • The Countries Most Vulnerable to Cyber Attacks - APAC The Countries Most Vulnerable to Cyber Attacks - APAC Bob Rudis and Tod Beardsley Recorded: Feb 8 2017 58 mins
    Rapid7's research team has identified and ranked the 50 countries most exposed to hacking, based on the prevalence of insecure networks and internet channels around the world.

    This webcast will discuss insights into global exposure to common vulnerabilities through internet-wide surveys across different services and protocols. Join us to learn what these most vulnerable countries are.

Embed in website or blog