Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Network Security

Rapid7’s Metasploit Products Achieve CVE Compliance, Improve Integration

Boston based Vulnerability management and penetration testing solution provider Rapid7, announced this week that its signature products, Metasploit Pro™ and Metasploit Express™, have achieved Common Vulnerabilities and Exposures (CVE) compliance. CVE associates unique identifiers to security vulnerabilities and exposures to provide common names for publicly known problems.

Boston based Vulnerability management and penetration testing solution provider Rapid7, announced this week that its signature products, Metasploit Pro™ and Metasploit Express™, have achieved Common Vulnerabilities and Exposures (CVE) compliance. CVE associates unique identifiers to security vulnerabilities and exposures to provide common names for publicly known problems.

The Metasploit Framework is a widely used solution, and according to Rapid7, users have downloaded Metaspolit over one million times in the past year. The company also claims Metaspolit has the world’s largest, public database for quality assured exploits. The company released its Metasploit Pro product in October.

Rapid7 MetaSploit CVE

With Metasploit’s CVE compatibility, Metasploit reports can now be more easily cross-referenced with other tools, such as the NeXpose vulnerability scanner.

Rapid7 has enhanced the features of its leading software solutions with CVE to provide a reference method of information security vulnerabilities and exposures as defined by the National Cyber-Security Division of the United States Department of Homeland Security through the non-profit MITRE Corporation.

As organizations face increasing threats to complex and business-critical systems, the ability to simulate realistic attacks on their infrastructure in a Using tools such as MetaSploit, organizations can make informed decisions about which vulnerabilities should be addressed and penetration testers can meet federal, state and local standards for tracking and documenting these security risks with canonical and widely applied industry references.

 

Metasploit Pro, priced at $15,000 per user annually, provides unrestricted remote network access and enables teams to collaborate on network penetration testing projects. Metasploit Pro offers additional functionality over Metasploit Express, its lower end solution priced at $3,000 per user annually, with support for security testing of custom Web applications, managing client-side campaigns against end-users and additional evasion features.

Advertisement. Scroll to continue reading.
Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

More People On The Move

Expert Insights

Related Content

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Network Security

A zero-day vulnerability named HTTP/2 Rapid Reset has been exploited to launch some of the largest DDoS attacks in history.

Cyberwarfare

Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet