Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

ICS/OT

Rapid7 Teams with Modulo to Identify and Manage Business Impacts

RSA Conference News

SAN FRANCISCO – RSA Conference 2012 – Rapid7 and Modulo (known for GRC solutions) have teamed up to offer their respective platforms in one setting, offering organizations a stronger view into the threats and vulnerabilities they face.

RSA Conference News

SAN FRANCISCO – RSA Conference 2012 – Rapid7 and Modulo (known for GRC solutions) have teamed up to offer their respective platforms in one setting, offering organizations a stronger view into the threats and vulnerabilities they face.

“By bringing together two world-class risk and compliance solutions, we are providing our customers around the world with the contextual business intelligence they need to understand and effectively manage their security risk posture,” said Sheldon Malm, head of strategic partners and alliances, Rapid7.

Combining Rapid7’s NeXpose with Modulo’s Risk Manager, customers can organize and prioritize thousands of assets and quickly focus on the items that pose the greatest risk to their business.

The joint offering will feed detailed asset identification and scanning results across the entire IT environment – including web, network, applications and databases – into a broader risk analysis process.

The point of all of this is enabling customers with the ability to identify how vulnerabilities present risk to specific business operations, processes, and strategic or tactical activities. Once that’s done, they can manage those exposures through remediation workflow.

“Hundreds of organizations worldwide choose Modulo Risk Manager due to our comprehensive out-of-the box capabilities. By automating GRC processes and reporting, we help them improve their accuracy and achieve dramatic cost savings. Our joint solution with Rapid7 gives customers a unified framework and dashboard that amplifies this value proposition and reduces overall business risk,” said Terence Lee, managing director, North America at Modulo.

Modulo will integrate Metasploit Professional with Modulo Risk Manager in Q3 2012.

Advertisement. Scroll to continue reading.

Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.

Register

Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...

ICS/OT

The overall effect of current global geopolitical conditions is that nation states have a greater incentive to target the ICS/OT of critical industries, while...

Endpoint Security

Today, on January 10, 2023, Windows 7 Extended Security Updates (ESU) and Windows 8.1 have reached their end of support dates.

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Cybersecurity Funding

2022 Cybersecurity Year in Review: Top news headlines and trends that impacted the security ecosystem

Risk Management

In this virtual summit, SecurityWeek brings together expert defenders to share best practices around reducing attack surfaces in modern computing.