rapid7

Results 1 - 15 of 15Sort Results By: Published Date | Title | Company Name
Published By: Rapid7     Published Date: May 22, 2012
The ongoing struggle to prevent hackers from breaching assets and malware from gaining a foothold requires a vulnerability management strategy that begins with a comprehensive measurement of security risk. Organizations must examine the entire IT stack, including the operating system, network, applications, and databases. These new technologies include dynamic, virtualized environments and services outside traditional physical IT infrastructures, such as virtualized, cloud-based services and social networking.
Tags : 
security, risk management, security intelligence, security assessment, prevent data breach, cyber security, vulnerability management, penetration testing, data breach, breach, access control, anti spam, anti spyware, security management
    
Rapid7
Published By: Rapid7     Published Date: May 22, 2012
Rapid7's CSO and Chief Architect of Metasploit leads this webcast which covers the most critical java-based security flaws and demonstrates the use of Metasploit in exploiting them. The target list includes web browsers, mobile platforms, embedded devices, application servers, and RPC services.
Tags : 
java, network security, security breach, security flaws, network intrusion, identity management, internet security, intrusion detection, intrusion prevention
    
Rapid7
Published By: Rapid7     Published Date: Jul 12, 2012
In this webcast, Bernd Leger, VP of Marketing, Products & Solutions at Rapid7 and Nate Crampton, Product Manager at Rapid7 discuss the current state of how organizations are prioritizing vulnerabilities in their environments and what security professionals can do to lower their security thresholds.
Tags : 
rapid7, technology, security, it management, business technology, security management, security policies, data protection, data quality, vulnerability management
    
Rapid7
Published By: Rapid7     Published Date: Oct 15, 2012
The need for real-time vulnerability management and risk assessment
Tags : 
rapid7, data security, vulnerability management, risk assessment, virtual machine, virtualization, it infrastructure, data management, infrastructure
    
Rapid7
Published By: Rapid7     Published Date: Nov 27, 2012
What's your security protection factor (SPF)? In this on demand webcast for IT and security professionals, Rapid7's CSO and Chief Architect of Metasploit, HD Moore, shows how you can reduce your remediation workload by testing which vulnerabilities really matter.
Tags : 
rapid7, technology, security, it management, business technology, access control, application security
    
Rapid7
Published By: Rapid7     Published Date: Nov 27, 2012
The "Bring Your Own Device" (BYOD) trend started in late 2009 and caught on with users faster than IT expected, especially as iOS and Android devices became dominant. This webinar will delve into the underlying risks associated with BYOD, and provide a simple step-by-step approach to mitigate their risks.
Tags : 
rapid7, technology, security, it management, business technology, access control, identity management, intrusion prevention
    
Rapid7
Published By: Rapid7     Published Date: Jan 10, 2013
In a January 2012 market research study, 71 percent of the businesses surveyed said that mobile devices have caused an increase in security incidents.
Tags : 
security, network security, cloud, mobile, cloud, byod, mobile computing, mobile workers, smart phones, wifi, wireless application software, wireless communications, wireless hardware, wireless infrastructure, wireless security, application integration, application performance management, best practices, desktop management
    
Rapid7
Published By: Rapid7     Published Date: Apr 04, 2013
This whitepaper examines the many different methods employed in phishing attacks and social engineering campaigns, and offers a solution-based approach to mitigating risk from these attack vectors.
Tags : 
rapid7, protect organization, attacks via phishing, solution based approach, mitigating risks, intrusion detection, intrusion prevention, phishing, security policies, risk management, data protection
    
Rapid7
Published By: Rapid7     Published Date: Jul 24, 2013
The Payment Card Industry (PCI) Data Security Standard (DSS) was created to confront the rising threat to credit cardholder personal information. This compliance guide will provide readers with an overview of the requirements as well as suggested steps in achieving PCI compliance.
Tags : 
rapid7, pci compliance, dss compliance, pci dss compliance, secure transactions, online payment security, security, payment processing, atm, authentication, business continuity, compliance, hacker detection, identity management, web service security, business technology
    
Rapid7
Published By: Rapid7     Published Date: Jul 24, 2013
As mobile devices become more common, cybercriminals see them as having huge profit potential, and aim to gain access to the user's confidential personal and financial information. In this Mobile Security Guide, we'll walk you through the mobile malware landscape and what you need to know to keep your organization's data safe.
Tags : 
rapid7, malware, mobile malware, trojan, virus, app security, mobile device security, iphone security, blackberry security, threat protection, anti spam, anti spyware, anti virus, application security, email security, internet security, intrusion prevention, password management, web service security, mobile computing
    
Rapid7
Published By: Rapid7     Published Date: Oct 09, 2013
Learn how our top-rated vulnerability assessment solution, Nexpose, and our new endpoint controls monitoring solution, ControlsInsight, help you accurately assess your defenses, make informed decisions, create credible action plans, and monitor ongoing progress.
Tags : 
gartner, marketscope, rapid7, vulnerability assessment, 2013, security, it landscape protection, network security, network security appliance, vulnerability management
    
Rapid7
Published By: Rapid7     Published Date: Oct 15, 2013
This eBook explores the different kinds of user-based risks in today's corporate environment, including mobile devices and cloud services, and gives actionable guidance on how to mitigate these risks.
Tags : 
rapid7, risk, security, real-time, infrastructure, intrusion detection, intrusion prevention, mobile computing, wireless security
    
Rapid7
Published By: Rapid7     Published Date: Mar 19, 2014
This paper discusses reasons why visibility is so essential, and outlines how you can use visibility beyond and within the firewall to develop policies and processes that protect what you canít control.
Tags : 
rapid7, security, cloud security, firewall, mobile applications, social applications, social media, protection, network security, firewalls, intrusion prevention, data protection, vulnerability management, mobile device management, data loss prevention
    
Rapid7
Published By: Rapid7     Published Date: Mar 19, 2014
In this guide, penetration testers will learn how to evade anti-virus detection on target machines for your Metasploit pen tests. This guide will be most useful to readers who already have some penetration testing experience and are familiar with Metasploit Pro.
Tags : 
rapid7, security, anti virus, virus protection, antivirus, spam, hackers, internet security, penetration testing, intrusion prevention, network security, anti spam, application security, intrusion detection, phishing, data protection
    
Rapid7
Published By: Rapid7     Published Date: Nov 27, 2012
The Payment Card Industry Data Security Standards (PCI DSS), with its over 200 requirements, can seem like a daunting set of regulations. Nonetheless, if your organization handles any kind of credit card information, you must be PCI DSS compliant. As difficult as this can seem, you can get expert help with our new eBook.
Tags : 
rapid7, technology, security, it management, business technology, access control, application security, compliance
    
Rapid7
Search      

Search the Library

Add Research

Get your company's research in the hands of targeted business professionals.