Listing Thumbnail

    Vector Command

     Info
    Sold by: Rapid7 
    Vector Command is a managed service that helps security teams assess external attack surfaces and identify defence gaps. It combines Rapid7's Red Team expertise with top-tier attack surface management technology to provide continuous validation of exposures
    Listing Thumbnail

    Vector Command

     Info
    Sold by: Rapid7 

    Overview

    Attackers never stop attempting to access your environment. Your security team should not either. Vector Command provides continuous red teaming to put your defence to the test and exploit gaps before attackers do. Proactively test your external attack surface with ongoing red team exercises, expert guidance, and an industry-leading External Attack Surface Management tool. Vector Command offers a comprehensive suite of features designed to fortify your security posture:

    External attack surface assessment - Know your attack surface better than the attackers do with constant reconnaissance of your internet-facing assets through Rapid7s industry-leading Command platform. Get continuous visibility into shadow IT or previously unknown exposures like exposed web services, and more.

    Ongoing, opportunistic red teaming - Rapid7s red team experts leverage the latest tactics, techniques, and procedures (TTPs) to safely exploit the external exposures and test your security controls with exercises like opportunistic phishing, external network assessment, breach simulation, emergent threat validation.

    Drive prioritization with same-day reporting - Address critical issues right away with same-day, detailed findings from successful red team exploitations, including multi-vector attack chain paths and expert-curated list of risky assets most likely to attract a malicious actor.

    Highlights

    • External attack surface visibility - Get the attacker perspective on your attack surface with persistent reconnaissance of your known and unknown internet-facing assets and exposures leveraging intuitive External Attack Surface Management, built-in with intelligence from Rapid7 Labs.
    • Continuously validate the most critical external exposures with hands-on Red Team experts via exercises like - Opportunistic Phishing, External Network Assessment, Post-Compromise Breach Simulation, Emergent Threat Validation.
    • Visualize vetted attack paths to drive remediation - Our expert team of attackers will exploit vulnerabilities and attempt to move laterally in your environment, demonstrating risks and providing visualization of multi-vector attack chains.

    Details

    Sold by

    Delivery method

    Features and programs

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Vector Command

     Info
    Pricing is based on contract duration. You pay upfront or in installments according to your contract terms with the vendor. This entitles you to a specified quantity of use for the contract duration. If you choose not to renew or replace your contract before it ends, access to these entitlements will expire.

    12-month contract (4)

     Info
    Dimension
    Description
    Cost/12 months
    Small
    0-512 Assets
    $85,000.00
    Medium
    513-1024 assets
    $95,000.00
    Large
    1025-4096 Assets
    $140,000.00
    Enterprise / Custom
    4097+ assets. Pricing starting at: $230,000
    $230,000.00

    Vendor refund policy

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Resources

    Support

    Vendor support

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Similar products

    Customer reviews

    Ratings and reviews

     Info
    0 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    0%
    0%
    0%
    0%
    0%
    0 AWS reviews
    |
    2 external reviews
    External reviews are sourced from G2  and are not included in the star rating for this product.
    Environmental Services

    Threat Command is the software to use for Cybersecurity Solutions

    Reviewed on Aug 22, 2023
    Review provided by G2
    What do you like best about the product?
    Everything can be found in just place yet easily identifiable. It is very easy to add a new system and run the scans. It shows deep insights into the vulnerabilities found in the network and how to remediate them.
    What do you dislike about the product?
    Sometimes it also shows an extra vulnerability that might not exactly relate to your application, and you end up researching about it and then after all that time, you come to know that it is not for you.
    What problems is the product solving and how is that benefiting you?
    Providing quick and easy security solutions to all the need for securely running an organisation to using application without the fear of security attacks.
    Arnaud G.

    Was better before

    Reviewed on Jan 24, 2023
    Review provided by G2
    What do you like best about the product?
    The platform is fairly easy to use. The newly revamped assets page is much better than before.
    What do you dislike about the product?
    Policies and alert profiler are complicated to set up.
    What problems is the product solving and how is that benefiting you?
    Clear, dark and deep web monitoring
    Leaked credentials monitoring
    Suspicious domains monitoring
    Copyright infrigement
    Threat Intelligence
    View all reviews