Articles By: Rapid7

Security Orchestration and Automation (SOAR) Playbook
Security orchestration and automation helps teams improve their security posture and create efficiency—without sacrificing control of important security and IT processes. This playbook highlights some of the most common use cases for security orchestration and automation, as well as useful tips on how to get started.

4 Steps to Prove the Value of Your Vulnerability Management Program
Learn how to focus your efforts, prove the value of your program, and gain trust, budget, and recognition in 4 doable steps.

Driving Immediate Value With a Cloud SIEM
Detection and response is a critical piece in an ongoing journey to improve your security posture. As the threat landscape grows increasingly complex, an effective detection and response program will help you recognize threats early and minimize the likelihood of attacker success. For many SIEM vendors, solving these complex problems requires a complex solution. For us, there’s a better way.

Nicer 2020 Report
Rapid7’s National / Industry / Cloud Exposure Report (NICER) for 2020 is the most comprehensive census of the modern internet. In a time of global pandemic and recession, the Rapid7 research team offers this data-backed analysis of the changing internet risk landscape, measuring the prevalence and geographic distribution of commonly known exposures in the interconnected technologies that shape our world.

Log Management Buyer’s Guide
The log management space is confusing, noisy, and crowded with solutions that are often very similar or vague about their offerings. Whether you have a log management solution in place today or you are building your IT stack from scratch, you have to learn the right questions to ask.

ELK Stack Costs: Things to Consider Before Committing to Self-Service Logging
The ELK Stack is the current preferred stack for do-it-yourself (DIY) logging. Elasticsearch, Logstash, and Kibana. The truth is that a successful ELK Stack implementation requires a great deal more than those three technologies.