Rapid7, a provider of security analytics software and services, announced on Tuesday that it has launched a new services group dedicated to incident response.
The Boston, Mass.-based company, which has raised $93 million in funding to date, said that its new Incident Response and Incident Response Program Development Services were designed help enterprise security teams shorten their time to respond, investigate, and remediate a breach.
Best known for its Metasploit penetration testing products, which the company gained through its 2009 acquisition of the open source Metasploit Framework, Rapid7 continues to expand its security software and services, and the newly-launched services are yet another key offering.
“Security teams face a motivated and nimble attacker and every team has to prepare for the possibility of a breach,” said Nicholas J. Percoco, vice president of Strategic Services at Rapid7. “Rapid7’s Incident Response Services can help organizations prepare with an appropriate plan, and respond with the help of world-class industry experts.”
Under Rapid7’s Incident Response Program Development, the company’s security experts perform threat simulation sessions where the incident response team works through real breach scenarios, coordinate technical response activities, identify key sources of evidence, perform mock communications, and make recommendations for customers to prioritize cleanup and recovery, the company explained.
Designed to help customers accelerate incident investigation and containment, Rapid7 Incident Response Services teams will work with in-house teams to scope the incident and focus on identifying all attacker remote access capabilities, restoring prioritized business processes and systems, and securing compromised user accounts.
The Incident Response division is part of the Strategic Services organization headed by Nicholas Percoco, who previously built and ran Trustwave’s SpiderLabs, Rapid7 said.
The Incident Response group is led by Wade Woolwine, a veteran of Mandiant’s Managed Defense business unit. Woolwine also served as a threat detection and incident response analyst in a number of different government agencies.
The Incident Responders team is led by Mike Scutt, an expert on Windows forensics, malware analysis, and incident response, the company said.
Rapid7 offers a retainer-based offering, but goes beyond traditional retainers by delivering a threat readiness assessment where its experts evaluate key areas of threat detection and incident response capabilities and establish breach response processes.
Additionally, Rapid7 offers customers the ability to convert a portion of their unused pre-purchased hours to drive improvements in any aspect of their security program.
Rapid7 Incident Response Program Development and Incident Response Services are available immediately.

For more than 10 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.
More from Mike Lennon
- ‘No Evidence’ of Cyberattack Related to FAA Outage, White House Says
- SecurityWeek to Host 2022 ICS Cybersecurity Conference October 24-27 in Atlanta
- Google Completes $5.4 Billion Acquisition of Mandiant
- Cybersecurity Firm ZeroFox Begins Trading on Nasdaq via SPAC Deal
- HUMAN Security and PerimeterX Merge on Mission to Combat Bots
- Last Call: CFP for ICS Cybersecurity Conference Closes July 15th
- Johnson Controls Acquires Tempered Networks to Shield Buildings From Cyberattacks
- Snowflake Launches Cybersecurity Workload to Find Threats Across Massive Data Sets
Latest News
- Big China Spy Balloon Moving East Over US, Pentagon Says
- Former Ubiquiti Employee Who Posed as Hacker Pleads Guilty
- Cyber Insights 2023: Venture Capital
- Atlassian Warns of Critical Jira Service Management Vulnerability
- High-Severity Privilege Escalation Vulnerability Patched in VMware Workstation
- Exploitation of Oracle E-Business Suite Vulnerability Starts After PoC Publication
- China Says It’s Looking Into Report of Spy Balloon Over US
- GoAnywhere MFT Users Warned of Zero-Day Exploit
