Categories
Problems that solves
Unauthorized access to corporate IT systems and data
Risk or Leaks of confidential information
Employee personal use of corporate IT during working hours
Risk of attacks by hackers
Risk of data loss or damage
Risk of lost access to data and IT systems
Non-compliant with IT security requirements
Customer fraud
Values
Reduce Costs
Ensure Security and Business Continuity
Ensure Compliance
About Product
Product presentation
Description
Rapid7’s InsightIDR is your security center for incident detection and response, authentication monitoring, and endpoint visibility. InsightIDR identifies unauthorized access from external and internal threats, and highlights suspicious activity so you don’t have to weed through thousands of data streams.
InsightIDR combines the full power of endpoint forensics, log search, and sophisticated dashboards into a single solution. It is a Software as a Service (SaaS) tool that collects data from your existing network security tools, authentication logs, and endpoint devices. InsightIDR then aggregates the data at an on-premises Collector or a dedicated host machine that centralizes your data.
Use this Collector to gather and transmit your logs securely to AWS, which hosts customer databases and the web interface. Rapid7 runs analytics on this data to correlate users, accounts, authentications, alerts, and privileges. The analysis provides insight into user behavior while searching for known indicators of compromise.
Rapid7 recommends keeping dedicated Collectors on-premises to collect event data, log data, and endpoint data.
When you connect all of the various data streams to InsightIDR, you can take advantage of all the following built-in features made with users in mind:
- Unify your data into a single security view
- Analyze raw logs, endpoint data, and network traffic
- Receive alerts for suspicious activity
- Prioritize events
- Investigate events
Competitive products
Deployments with this product
User features
Roles of Interested Employees
Chief Executive Officer
Chief Information Officer
Chief Technical Officer
Chief IT Security Officer