You are on page 1of 26

NEXPOSE

ENTERPRISE
Effective Vulnerability
Sept 2014
Management for Today’s
KEY SECURITY
CHALLENGES
Common Challenges Organizations
Experience

Visibility gaps of security Security programs


risks to business are too tactical
Key
Security Information overload
inhibits decision making
Hard to show
security adds value
Challenges
Difficulty in Costly compliance
communicating requirements
remediation

Confidential and Proprietary 3


RAPID7 SOLUTIONS
Nexpose Vulnerability Management

Know Your Network Manage Risk Effectively Simplify Your Compliance

Confidential and Proprietary 5


KNOW YOUR NETWORK
Before you can manage risk you need to find it
Efficient Security Assessment
Single Security Scan
• Simple setup & configuration
• Unified scanning
– OS, Applications, Services,
Web, Database, and
configurations
• Consolidated reporting

Confidential and Proprietary 7


Across Modern Networks
Comprehensive Visibility
• Physical, virtual, and cloud
• Real-time discovery
• Expert scanning system

Confidential and Proprietary 8


Understand Business Context
RealContext™
• Automatic classification
• Identify important systems
• Assign remediation owners

Confidential and Proprietary 9


MANAGE RISK EFFECTIVELY
Not all risk is created equal and shouldn’t be treated the same
Vulnerability Validation
Validate with Metasploit
• Safely exploit vulnerabilities
• Focus on proven risks
• Closed-loop remediation

Confidential and Proprietary 11


Advanced Vulnerability Prioritization
RealRisk™
• Threat-driven risk algorithm
• Granular risk scoring
• Use RealContext™ to
increase risk score

Confidential and Proprietary 12


Risk Remediation Planning
Top Remediations

• Actionable impactful decisions


• Short targeted reports
• Step-by-steps instructions

Confidential and Proprietary 13


SIMPLIFY YOUR COMPLIANCE
Don’t spend too much time showing and improving compliance
Unified Security & Compliance
Policy Manager
• Single assessment scan
• Customizable policies
• Consolidated reporting

Confidential and Proprietary 15


Compliance Auditing & Reporting
Policy Scanning &
• Customizable Audit Reports Reporting
PCI HIPAA SOX NERC COMPLAINT
• PCI Compliance Reports
Pass Pass

Fail Pass

Pass

Confidential and Proprietary 16


ARCHITECTURE
Flexible and Scalable Architecture

Enterprise Architecture
• Multiple deployment options
• Agentless scanning
• Scale with scan engines
• OpenAPI™ for integrations

Confidential and Proprietary 18


Nexpose Vulnerability Management
Know Your Network Manage Risk Effectively Simplify Your Compliance

• Security assessment for • Use critical threat • Perform fast, unified


the modern network awareness from security & compliance
• Identify what’s important to Metasploit assessment
your business • Prioritize business risks • Automate workflows
• Use attacker mindset to that matter • Leverage built-in Audit &
find weaknesses • Create concise actionable PCI report templates
remediation plans
Confidential and Proprietary 20
THANK YOU
APPENDIX
Drive Your Security Program Forward
Risk Scorecard
• Internal Benchmarking
• Simple Risk Grade Metric
• Improve collaboration with
IT teams

Confidential and Proprietary 23


Quickly gain insights from charts
Interactive Charts
• Interact with charts
• Risk trending drill-down
capabilities
• Identify risky outliers

Confidential and Proprietary 24


PROFESSIONAL SERVICES
Rapid7’s Professional Services Offerings

Strategic Deployment Cloud Assessment


Services & Training Services Services
• Program • 3-day Rapid • Nexpose: • Network Pen Testing
Development Deployment Managed/SaaS
• Web/Mobile App
• Security Advisory • Enterprise • PCI ASV Audit Testing
Deployment Service
• Analytic Response • Wireless, Social
• Virtual Training & • Hosted Engines Engineering
Certification

Confidential and Proprietary 26

You might also like