What Integrates with Rapid7 MDR?

Find out what Rapid7 MDR integrations exist in 2024. Learn what software and services currently integrate with Rapid7 MDR, and sort them by reviews, cost, features, and more. Below is a list of products that Rapid7 MDR currently integrates with:

  • 1
    Stellar Cyber Reviews
    On premises, in public cloud, with hybrid environments, and from SaaS infrastructure. Stellar Cyber is the only security platform that provides high-speed, high-fidelity threat detection with automated response across the entire attack area. Stellar Cyber's industry-leading security platform improves security operations productivity, allowing security analysts to eliminate threats in minutes instead if days or weeks. Stellar Cyber's platform accepts data inputs from both existing cybersecurity solutions and its own capabilities and correlating them to present actionable results under a single intuitive interface. This helps security analysts reduce tool fatigue and data overload. It also helps cut operational costs.
  • 2
    NorthStar Navigator Reviews

    NorthStar Navigator

    NorthStar.io, Inc.

    $8 per device
    NorthStar allows organizations to easily incorporate threat intelligence and business context to enable a risk-based approach to their vulnerability management program. The Platform automates the collection, normalization, consolidation and correlation of threat intelligence, asset, software, and vulnerability data. Combined with a transparent scoring model, NorthStar automates the tedious and manual process of prioritizing vulnerability remediation.
  • 3
    ThreatQ Reviews

    ThreatQ

    ThreatQuotient

    Threat intelligence platform - threatQ, to understand and prevent threats more effectively and efficiently, your security infrastructure and people must work smarter, and not harder. ThreatQ is an extensible and open threat intelligence platform that can accelerate security operations through simplified threat operations and management. The integrated, self-tuning, adaptive threat library, open exchange, and workbench allow you to quickly understand threats and make better decisions, thereby accelerating detection and response. Based on your parameters, automatically score and prioritize internal or external threat intelligence. Automate the aggregation and operationalization of threat intelligence across all systems. Integrating your tools, teams, and workflows will increase the effectiveness of your existing infrastructure. All teams have access to a single platform that enables threat intelligence sharing, analysis, and investigation.
  • 4
    Sacumen Connector as a Service (CaaS) Reviews
    Companies that sell security products have a huge need for connectors to third-party applications. This is driven by many factors, including customer requirement, product capabilities and enhancements. Target systems can be deployed on-premises, cloud, or hybrid environments. Complexities arise from the many options Target systems offer, such as interfaces that can be integrated (REST API. SOAP. SFTP. Message Queue. SNMP. SDKs.). Data types (JSON, Syslog, File system, XML, etc.). Authentication and authorization options: OAuth, API Tokens, Username/Passwords, OTP. MFA. SAML. Rate limit, pagination and latency, concurrency and data volume. Security Product Companies often create custom Connectors that are not standard for these Target systems. This not only results in higher development and support costs but also lower Connector performance, scalability, extensibility and cost.
  • 5
    Cyclops Reviews

    Cyclops

    Cyclops Security

    Our innovative solution allows you to validate your security controls within the context of your business requirements. Cyclops integrates your existing security tools by using the CSMA method to gather metadata about threats, vulnerabilities, SaaS applications, cloud instances and more. It enriches the data with context and insight by comparing the same entities across different products. Our cybersecurity mesh product provides a contextualized approach to validate risk, which helps you make informed decisions and focus on the things that really matter.
  • 6
    Secureworks Reviews
    Secureworks is 100% focused upon cybersecurity. It's all that we do. We have been fighting adversaries in every form for nearly two decades and protecting organizations like yours. Secureworks enriches your defenses by intelligence from the 310-billion cyber incidents we observe every day across our 4,100 customers in over 50+ countries. We have successfully automated and accelerated event detection and correlation by utilizing supervised machine learning and analytical, as well as some of the most brilliant minds in the industry. This allows you to identify threats faster and take the right actions at the right moment to reduce your risk. Secureworks Taegis XDR and Secureworks Taegis VDR are Secureworks Taegis ManagedXDR.
  • Previous
  • You're on page 1
  • Next