Rapid7 introduces Vector Command

New offensive security offering powered by Rapid7’s Command Platform and expert Red Team enables organizations to continuously discover, assess, and validate vulnerabilities through the lens of an adversary.

  • Wednesday, 18th September 2024 Posted 1 year ago in by Phil Alsop

Rapid7 has introduced Vector Command, a fully-managed offensive security service. Vector Command combines the external attack surface assessment capabilities of Rapid7’s recently launched Command Platform with continuous Red Teaming services by its internal experts to help customers identify and validate IT security posture weaknesses from an attacker’s perspective.

As the attack surface expands through shadow IT, cloud resources, SaaS solutions, and more, security leaders must maintain visibility of their organization’s internet-facing assets and the security risks those external exposures introduce. Vector Command delivers a continuous discovery, assessment, and validation service that goes beyond vulnerabilities to confirm that the overall state of an organization's IT security posture and controls are sufficient in thwarting would-be adversaries.

“Attackers are constantly performing reconnaissance in an effort to get a foot in the door,” said Jeremiah Dewey, senior vice president, service delivery, Rapid7. “The Vector Command managed service proactively assesses the customer’s external attack surface — in the same way a threat actor would — to pinpoint weaknesses like previously unknown vulnerabilities, misconfigurations, or missing security controls. With our skilled Red Teamers continuously emulating real-world attack scenarios, customers will be able to validate exposures and defenses, monitor readiness, and build resiliency against future threats.”

Customers using Vector Command will note the following key benefits:

Increased visibility of the external attack surface with persistent, proactive reconnaissance of both known and unknown internet-facing assets.

Improved risk prioritization with ongoing, expert-led Red Team operations that cut through the noise of EASM-only tools as well as the latency of point-in-time security testing exercises to surface validated critical exposures.

Guaranteed same-day reporting of successful exploits, clearly visualized attack paths, and regular expert consultation to confidently drive remediation efforts and resiliency planning.

Sophos identifies critical weaknesses in identity security

Posted 7 hours ago by Sophie Milburn
Sophos' latest report highlights the escalating identity security challenges, with high breach rates and costly recoveries.
SonicWall has introduced the NSv XS, a subscription-based virtual firewall designed for small and distributed environments, offering enhanced...
By integrating the Alteryx One platform, the Marine Conservation Society has enhanced its data processing, driving meaningful environmental...

State of the channel 2026: navigating the AI era

Posted 2 days ago by Sophie Milburn
The latest GTIA report reveals AI's dominant role in the future of IT service provision across the UK and Ireland.

Integris expands global reach with acquisition

Posted 1 week ago by Sophie Milburn
Integris has acquired First Focus to expand its MSP footprint and broaden services for SMB customers.
Climb Channel Solutions UK introduces a model emphasising personal connections to improve MSP growth, aiming to challenge platform-centric IT...

WatchGuard introduces Rai

Posted 1 week ago by Phil Alsop
WatchGuard® Technologies says that it has redefined how managed service providers (MSPs) deliver security at scale with the launch of Rai™....

Syspro launches marketplace

Posted 1 week ago by Phil Alsop
New Marketplace gives customers access to trusted partner solutions that integrate with the Syspro platform.