Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

Collect, Prioritise, Remediate

These are the 3 keys of Rapid7's vulnerability management portfolio. And that's no mistake, three
categories are top of mind for every organisation's vulnerability management program. When our
vulnerability management portfolio beats out the competition, it's because of the value we demonstrate
in these critical areas.

Collect

Learn the use cases, learn the solutions

In this unit, learn about some of the key features that help businesses better collect data about their
environment. Features in this section will range from very basic to some of our more technical pieces.
Many items here are accompanied by a video and additional reading. Don't hesitate to take this content
on in small chunks and return to finish the rest later.

There will be four videos that take you through various collect use cases within InsightVM:

1. Sites, scans, and schedules

Watch as we walk through sites and scheduled scanning to demonstrate the functionality of InsightVM's
scanning features.

Further reading: A step-by-step guide to addressing new critical “named” vulns in InsightVM

2. Automated actions

In this video, we will demonstrate the power of Automated Actions to bring intelligence and automation
to a vulnerability management program. Learn a few common use cases that InsightVM can satisfy.

Further reading: Common automated actions


3. Agents

We talk through some of the benefits of deploying instances of the Insight Agent in the customer's
environment. Relevant use cases include remote workers and cloud environment scanning.

Further reading: Insight Agent Technology Brief

Further reading: Insight Agent Feature Brief

4. Cloud monitoring

talk through how discovery connections, adaptive security, and the Insight Agent can help organisations
gain visibility into difficult and constantly changing cloud assets & environments.

Further reading: The Cloud: How CISOs can embrace it

You might also like