Posts tagged Managed Detection and Response (MDR)

3 min Awards

Rapid7 Named a Leader in the 2020 Forrester Wave™ for Midsize Managed Security Services Providers, Q3 2020

Rapid7 is thrilled to be named a Leader in The Forrester Wave™: Midsize Managed Security Services Providers, Q3 2020!

7 min Managed Detection and Response (MDR)

Rapid7 Managed Detection and Response: The Service that Never Sleeps

In this post, we break-down everything you need to know about Rapid7 Managed Detection and Response (MDR).

6 min Managed Detection and Response (MDR)

Maturing Your Security Posture: Around-the-Clock Threat Detection With Managed Detection & Response (MDR) Services

Recently, we sat down with Jeremiah Dewey, Rapid7’s VP of Managed Services, to chat about how MDR services strengthen traditional security products.

6 min Managed Detection and Response (MDR)

Managing Cybersecurity in the Real Estate Industry

We sat down with Tony Hamil, the senior cybersecurity engineer for a real estate development company, to hear how he and his team are managing security.

9 min Security Operations (SOC)

Moving Toward a Better Signature Metric in SOCs: Detection Efficacy

In this blog, we break-down the "Detection Efficacy" metric within the Security Operation Center (SOC).

3 min Detection and Response

5 Challenges Outsourced Detection and Response Operations Can Help Solve

In this blog, we discuss five challenges that managed detection and response (MDR) operations can help solve.

6 min Managed Detection and Response (MDR)

Uncooking Eggs: Manual Dridex Dropper Malicious Document Deobfuscation Methods

Learn how to analyze an obfuscated malicious document with a focus on basic static analysis.

3 min Managed Detection and Response (MDR)

How MDR SOC Customer Tony Hamil Leverages the Automation of InsightConnect

Recently, Tony Hamil spoke with us about how InsightConnect, Rapid7’s SOAR solution, enhances and goes beyond the capabilities of the MDR SOC.

4 min InsightIDR

Rapid7 Named a Leader in Gartner Magic Quadrant for Security Information and Event Management (SIEM)

Rapid7 is thrilled to be recognized as a Leader in the 2020 Gartner Magic Quadrant for Security Information and Event Management (SIEM).

5 min MSSP

Why Do Managed Detection and Response (MDR) Services Exist in a World Dominated by MSSPs?

In this blog, we break-down why Managed Detection and Response (MDR) services can survive in a market dominated by MSSP's.

5 min Managed Detection and Response (MDR)

How Attackers Can Harvest Users’ Microsoft 365 Credentials with New Phishing Campaign

In this blog post, Rapid7's MDR services team outlines a unique phishing campaign that utilizes a novel method of scraping organizations’ branded Microsoft 365 tenant login pages to produce highly convincing credential harvesting pages.

4 min Managed Detection and Response (MDR)

A Day in the Life of a Rapid7 SOC Analyst

Today, we are diving into a day in the life of a Rapid7 security operations center (SOC) analyst, specifically around threat detection and response.

6 min Managed Detection and Response (MDR)

Managed Threat Detection and Response Vendors: Questions You Need to Ask

In this post, Wade Woolwine, managed services director of technology at Rapid7, details our approach to managed detection and response: visibility, analytics, and arming our analysts with smart, customizable automation. Defending the modern enterprise is hard work. Between the need for round-the-clock coverage, technology to provide full visibility across the expanding enterprise, a highly skilled and experienced team, and the business level pressure to “prevent a breach,” there is little wonde

4 min Endpoint Security

Why Managed Detection and Response Zeroes In On the Endpoint

This post was co-written with Wade Woolwine [https://www.rapid7.com/blog/author/wade-woolwine/], Rapid7 Director of Managed Services. What three categories do attackers exploit to get on your corporate network? Vulnerabilities, misconfigurations, and credentials. Whether the attack starts by stealing cloud service credentials, or exploiting a vulnerability on a misconfigured, internet-facing asset, compromising an internal asset is a great milestone for an intruder. Once an endpoint is comprom

3 min GDPR

MDR and GDPR: More than a lot of letters

With 2018 now well in our sights, the countdown to the General Data Protection Regulation (GDPR). is most definitely on. Articles 33 and 34 of the GDPR [https://www.rapid7.com/fundamentals/gdpr/] require organizations to communicate personal data breaches when there is a high risk of impact to the people to whom the data pertains. GDPR security requirements and breach notification go hand-in-hand, for obvious reasons. In the words of the European Commission Working Party 29 (the group who are ta