Professional Documents
Culture Documents
Module 500
Module 500
These are the 3 keys of Rapid7's vulnerability management portfolio. And that's no mistake, three
categories are top of mind for every organisation's vulnerability management program. When our
vulnerability management portfolio beats out the competition, it's because of the value we demonstrate
in these critical areas.
Collect
In this unit, learn about some of the key features that help businesses better collect data about their
environment. Features in this section will range from very basic to some of our more technical pieces.
Many items here are accompanied by a video and additional reading. Don't hesitate to take this content
on in small chunks and return to finish the rest later.
There will be four videos that take you through various collect use cases within InsightVM:
Watch as we walk through sites and scheduled scanning to demonstrate the functionality of InsightVM's
scanning features.
Further reading: A step-by-step guide to addressing new critical “named” vulns in InsightVM
2. Automated actions
In this video, we will demonstrate the power of Automated Actions to bring intelligence and automation
to a vulnerability management program. Learn a few common use cases that InsightVM can satisfy.
We talk through some of the benefits of deploying instances of the Insight Agent in the customer's
environment. Relevant use cases include remote workers and cloud environment scanning.
4. Cloud monitoring
talk through how discovery connections, adaptive security, and the Insight Agent can help organisations
gain visibility into difficult and constantly changing cloud assets & environments.