- 18 Hot IT Certifications for 2014
- CIOs Opting for IT Contractors Over Hiring Full-Time Staff
- 12 Best Free iOS 7 Holiday Shopping Apps
- For CMOs Big Data Can Lead to Big Profits
CSO - BOSTON - Rapid 7 this week unveiled a new set of tools designed to help businesses better judge the overall effectiveness of existing security controls and the risk associated with users across the organization.
The announcement came during UNITED, the firm's annual security gathering for customers and analysts. Company officials say the tools, called UserInsight and ControlsInsight, will help organizations deal with user-based risk, and track the performance of existing security controls across the network. Known for vulnerability management (Nexpose), penetration testing (Metasploit), mobile risk management (Mobilisafe), these new tools seem to fall outside of the norm for Rapid7.
CSO sat down with senior vice president of products and engineering, Lee Weiner, to ask why these tools, and why now.
"We've been very clear that we want to make sure we solved relevant security problems," said Weiner. "As we talked to our customers more and more, and we understand that some of the investments they've made to gain visibility and protect their organizations aren't working well for them; we've tried to build solutions that help solve those problems."
They're not looking to tackle every vertical in the security market, because that wouldn't make sense, but building something around their customer's needs does, said Weiner. In fact, over the last 12 to 18 months, Rapid7 customers and the market in general, have reported a lack of visibility into their security posture. The two areas of concern center on risk around users and the effectiveness of existing security controls.
Explaining the rationale behind developing these latest offerings, Weiner told CSO that it has to do with a couple of dynamics. First, the effectiveness of attacks has increased substantially, as well as the volume of attacks. At the heart of this growth is the weakest link in the security chain - people.
In the IT landscape, users today are more empowered than they ever were before, almost to the point to where IT isn't needed. Over the years, advances in technology means that users can work from anywhere at any time, and these freedoms have caused some issues and created a bit of an unbalanced situation for those charged with defending the business. One of the key points for regaining that balance is visibility into what users are doing, as well as when and where they are doing it - the biggest points of interest being cloud environments and mobile environments.
At the same time, organizations looking to gain this balancing foothold are either poorly served with the level of visibility available to them via existing controls, or they are unable to acquire it due to a number of factors including a lack of human or financial resources.
With UserInsight, Rapid7 promises to help organizations flag common, but reoccurring problems such as compromised credentials and risky behavior. In the 2013 Verizon Data Breach Investigations Report, weak or stolen user credentials were used in 76 percent of the network intrusions reported in 2012. In many of those cases, the victim organization had some level of visibility into the behaviors of their users, but not enough per se, to notice when someone was accessing resources outside of their normal pattern.