Overview
Attackers never stop attempting to access your environment. Your security team should not either. Vector Command provides continuous red teaming to put your defence to the test and exploit gaps before attackers do. Proactively test your external attack surface with ongoing red team exercises, expert guidance, and an industry-leading External Attack Surface Management tool. Vector Command offers a comprehensive suite of features designed to fortify your security posture:
External attack surface assessment - Know your attack surface better than the attackers do with constant reconnaissance of your internet-facing assets through Rapid7s industry-leading Command platform. Get continuous visibility into shadow IT or previously unknown exposures like exposed web services, and more.
Ongoing, opportunistic red teaming - Rapid7s red team experts leverage the latest tactics, techniques, and procedures (TTPs) to safely exploit the external exposures and test your security controls with exercises like opportunistic phishing, external network assessment, breach simulation, emergent threat validation.
Drive prioritization with same-day reporting - Address critical issues right away with same-day, detailed findings from successful red team exploitations, including multi-vector attack chain paths and expert-curated list of risky assets most likely to attract a malicious actor.
Highlights
- External attack surface visibility - Get the attacker perspective on your attack surface with persistent reconnaissance of your known and unknown internet-facing assets and exposures leveraging intuitive External Attack Surface Management, built-in with intelligence from Rapid7 Labs.
- Continuously validate the most critical external exposures with hands-on Red Team experts via exercises like - Opportunistic Phishing, External Network Assessment, Post-Compromise Breach Simulation, Emergent Threat Validation.
- Visualize vetted attack paths to drive remediation - Our expert team of attackers will exploit vulnerabilities and attempt to move laterally in your environment, demonstrating risks and providing visualization of multi-vector attack chains.
Details
Features and programs
Financing for AWS Marketplace purchases
Pricing
Dimension | Description | Cost/12 months |
---|---|---|
Small | 0-512 Assets | $85,000.00 |
Medium | 513-1024 assets | $95,000.00 |
Large | 1025-4096 Assets | $140,000.00 |
Enterprise / Custom | 4097+ assets. Pricing starting at: $230,000 | $230,000.00 |
Vendor refund policy
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
Software as a Service (SaaS)
SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.
Resources
Vendor resources
Support
Vendor support
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.
Similar products
Customer reviews
Threat Command is the software to use for Cybersecurity Solutions
Was better before
Leaked credentials monitoring
Suspicious domains monitoring
Copyright infrigement
Threat Intelligence