OPENBASE
Close

Security Solution
Security Solution

Security Solution
Globally leading security solution for the safe protection of network infrastructures
Radware FireEye hp Vectra Rapid7
Rapid7
  • Phone
    Senior DirectorIm HanjuT. +82-2-3404-5643
  • Email

Vulnerability diagnosis and mock hacking verification solution
(Nexpose / Metasploit / AppSpider)

Solution of Rapid 7 is a product for the protection of the assets within the company by analyzing / verifying / countering the security vulnerabilities of the companies (servers, DB, network and security) in automatic format.

Background for the introduction of the product

Majority of the formats of the security accidents that have recently been on the rise rapidly are through the vulnerabilities of the internal system and software. New vulnerabilities are being discovered even at this very moment.
Although the personnel in charge of security of the company need to manage the exposure of the internal assets to such security vulnerabilities and prevent security accidents through continuous security update, it is impossible to manage the countless number of systems and applications through manual methods.
The Solution of Rapid 7 automatically detects the security vulnerabilities of the corporate assets, presents the measures to be taken in accordance with the ranking of the threat and proposes the means of the protection / management of internal assets at the minimum cost and time through verification through actual infiltration test.

Product portfolio

The products provided by Rapid7 includes Nexpose that automatically diagnoses more than 62,000 vulnerabilities of the overall IT assets with checklists with more than 150,000 items, Appspider that specifically analyzes web vulnerabilities and Metasploit, which is the most widely used mock invasion test tool in the world.

Closed Loop security diagnosis platform

Management of vulnerability and assessment of composition
Management of vulnerability and assessment of composition
Assessment of risk, Conformation of risk
Penetration test and confirmation of threat
Penetration test and confirmation of threat
Metasploit Pro Workflow
Metasploit Pro Workflow
Report on results
Report on results