Sign in Agent Mode
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Reviews from AWS customer

0 AWS reviews
  • 5 star
    0
  • 4 star
    0
  • 3 star
    0
  • 2 star
    0
  • 1 star
    0

External reviews

8 reviews
from and

External reviews are not included in the AWS star rating for the product.


    reviewer2811711

Ticket investigations have become richer and faster while query building still needs refinements

  • March 26, 2026
  • Review provided by PeerSpot

What is our primary use case?

Rapid7 MDR serves as our endpoint security solution. When we receive an alert from Rapid7 MDR, we check the logs of the endpoints that are managed on the client side, which provides us with richer information for the tickets. The enrichment that Rapid7 MDR generates for the client is greater than with other tools, and this has had a big impact.

Everything works very well with Rapid7 MDR. One day we had an incident related to an attack where Rapid7 MDR detected social engineering in a Teams chat, for which we received a notification by email. By correlating the events in Rapid7 MDR, we identified that it was a call from an unauthorized tenant within the organization.

What is most valuable?

Being able to list the vulnerabilities of the machines, being able to correlate alerts with the respective users who managed them, and having the artificial intelligence for creating query searches in the logs is crucial. The artificial intelligence for creating queries in the logs with Rapid7 MDR has been a great help because normally we use another platform called CrowdStrike, and the queries there are very different. This ultimately helps us create queries faster and more efficiently.

Rapid7 MDR has had a big impact when handling tickets by enriching them with information for the client. The client has been very pleased when handling tickets with Rapid7 MDR, unlike with other platforms, and this has had a positive impact.

It has helped with the ease and speed of detections and event correlations. Rapid7 MDR is very transparent. Investigations and detections are always identified normally, and they enrich the tickets.

What needs improvement?

I do not feel there is any improvement needed at the moment; all the features, the tools within it, and their functions are satisfactory. Because it is very good, there are always areas to improve, though I cannot point out specific ones at this moment.

For how long have I used the solution?

I have been using Rapid7 MDR for almost a year.

What do I think about the stability of the solution?

I have not experienced any stability issues.

Which solution did I use previously and why did I switch?

We used CrowdStrike previously. We still use CrowdStrike, and we have not moved 100% to Rapid7 MDR; we have a 50/50 split with both tools.

How was the initial setup?

The setup was very good. You just install a sensor for Rapid7 MDR and that is it.

What about the implementation team?

I have not used the implementation team.

Which other solutions did I evaluate?

I recommend reading the documentation, requesting a demo, and comparing Rapid7 MDR with other tools to see which is best for your organization.


    Ehsan Khaleel

Comprehensive detection has strengthened real-time protection and streamlined investigations

  • March 25, 2026
  • Review provided by PeerSpot

What is our primary use case?

I can describe many use cases for Rapid7 MDR, as there are multiple times when a person's PC gets compromised. There is an attacker behavior analysis, ABA, which is already part of the specific Rapid7 MDR XDR solution. We define a specific set of built-in rules in the MDR services and remap those rules according to our infrastructure for specific use cases.

We also deal with multiple phishing emails that we receive, and Rapid7 MDR is effective in identifying those specific use cases. In the Fintech sector, we encounter many anomalies from different servers that are publicly exposed on the internet, and Rapid7 MDR provides very beneficial use cases that eliminate the need to write custom use cases. We can define the logic in predefined use cases such as Attacker Behavior Analysis and User Behavior Analytics.

Additionally, when onboarding any log sources, there is a RegEx parser designed for parsing every log source on the built-in platform, making it quite user-friendly.

What is most valuable?

The best features in Rapid7 MDR are their team, which is made up of professionals. I interact with them whenever we face issues, even though we are running our own SOC, but we sometimes rely on Rapid7. It is having a human eye on everything. The MDR AI platform they recently transformed into is very helpful for defining use cases, real-time detections from a dashboard, and the reporting mechanism they have created within Rapid7 MDR.

Even the orchestrator platform they introduced for playbook creation is very helpful, as I create playbooks on Rapid7 using their predefined orchestrator platform.

Having a dedicated cybersecurity advisor through Rapid7 MDR significantly impacts aligning our security program with business needs because it approaches MDR better for big organizations such as mine. My first organization, Afiniti, was a significant AI-based company where I introduced Rapid7 MDR. The MDR is beneficial for both small and large organizations, unlike Splunk, which has more conditional formatting in their product.

Rapid7 MDR has positively impacted my organization by providing us with very effective management tools. Once we introduced Rapid7 MDR along with their vulnerability assessment tool, IVM, we transitioned from using Qualys and Tenable, which are top-tier tools in the market. The management tool from Rapid7 allows us to access a variety of vulnerabilities in real time to fix them effectively. How we tackle that specific MDR is indicative of its market quality. We analyzed the tool during our POC before purchasing.

We deployed endpoints on a specific server and attacked that machine using different methods, such as Metasploit, conducting DDoS attempts, and generating alerts for every anomaly from Rapid7. While a competitor's solution failed to detect many attacks, Rapid7 identified them in real time, which effectively pushed my management towards choosing Rapid7 MDR.

What needs improvement?

My experience with detection and response capabilities for Microsoft-centric environments has been positive. While API integration can be challenging with some third-party tools, Microsoft's built-in features facilitate seamless communication. I have found it relatively easy to triage and integrate Microsoft systems with Rapid7 MDR.

In terms of digital forensics and incident response included in the MDR service, my experience is that it is not very robust. We lack a dedicated forensic team, which is essential for thorough investigation. Rapid7 has introduced honeypots, which is an encouraging feature, but it is not a comprehensive solution such as those offered by competitors, such as Palo Alto's Unit 42.

Apart from forensics, I believe Rapid7 MDR should introduce more forensic services. Another area to improve is the active platform's handling of on-premises tools versus cloud-based tools. We prefer on-premises options for data security, and we find limitations in features compared to cloud-based tools, concerning data access and privacy controls.

For how long have I used the solution?

I have been working with Rapid7 MDR for the last five to six years.

What do I think about the stability of the solution?

Regarding stability and scalability, I have had no significant issues. Stability is good, and I have not experienced delays, even with on-premises deployments. I did encounter minor latency during a scheduled upgrade but was informed that it would occur.

How are customer service and support?

Evaluating the customer service and technical support teams of Rapid7 MDR, I would rate them a six out of ten. I have previous experience with IBM support, which was excellent and proactive. In contrast, Rapid7 MDR support often takes longer to respond to issues. Despite their large customer base, this highlights a need for enhancement in their support team.

Which solution did I use previously and why did I switch?

I decided to switch from those products because, while Qualys is a good vulnerability scanner, it is not very user-friendly. When scanning two machines, one with Rapid7 having an agent deployed for a level three scan and another with Qualys, the results were different. Rapid7 MDR indicated more vulnerabilities that were accurate upon verification, whereas Qualys missed many of them. This highlighted that IVM, Rapid7 MDR, and MDR stand out as top products in the market, especially for our financial sector.

How was the initial setup?

The deployment setup process for Rapid7 MDR is straightforward. I have deployed both the cloud environment and on-premises Nexpose service. Their services, whether on-premises or cloud-based, are easy to deploy, and the endpoints are lightweight and compatible with other tools in our environment.

What about the implementation team?

I bought Rapid7 MDR directly from the vendor, which is uncommon for sectors such as Fintech that usually work through intermediaries. I have had direct interactions with the Rapid7 team, specifically with someone named Nikola, and I find that beneficial.

What was our ROI?

I have seen a positive return on investment concerning Rapid7 MDR, as we have invested wisely, yielding results in detection mechanisms. I can confidently say that investing in Rapid7 MDR has been worthwhile, despite acknowledging that every tool has its flaws. Overall, the category is very good.

What's my experience with pricing, setup cost, and licensing?

Regarding pricing, I manage everything with Rapid7 MDR, and I find their pricing very reasonable compared to the market. They negotiate well with us on various aspects of MDR, and we have received great rates for services such as IVM, including Threat Command.

What other advice do I have?

I am taking advantage of the expanded ecosystem telemetry support in Rapid7 MDR. We have enhanced the logging mechanism within Rapid7 MDR, allowing us to assign projects to different teams with visibility only of their specific assets. This approach supports various vulnerability assessments and compliance achievements. My management is overall pleased as we have managed to meet compliance standards such as ISO 27001 and NIST due to features provided by Rapid7 MDR.

I utilize AI-assisted Risk-Aware Investigation workflows, integrating both our on-prem and cloud infrastructure. By using APIs in our environment, we gain enhanced visibility, giving us detailed insights that greatly assist in real-time monitoring.

This approach impacts my alert triage and prioritization processes since Active Directory is a crucial element in our industry. Rapid7 MDR improves the alerting mechanism for Active Directories and all connected user activities. Previously used SIEM solutions did not adequately capture anomalies on ADs. With Rapid7 MDR, any anomaly triggers escalated alerts in real time.

I am using the Integrated MDR for Microsoft Environments feature, having integrated Microsoft 365 with our MDR and endpoints from Microsoft Active Directory and Azure. This integration provides us with comprehensive visibility into our infrastructure.

Regarding transparency in detection and investigations with Rapid7 MDR, we receive metrics such as MTTR and MTTD (Mean Time to Detect and Mean Time to Respond). We monitor how quickly the tool detects anomalies and how long it takes to respond, which shows improvement due to the specific MDR product. My overall review rating for Rapid7 MDR is 8.5 out of 10.


    Hiroshi Watanabe

Threat detection benefits stand out while AI capabilities need improvement

  • May 20, 2025
  • Review provided by PeerSpot

What is our primary use case?

The typical use case for Rapid7 MDR is that it is highly valued. It is not so bad, but competition with EDR is tough. Rapid7 MDR does not position itself as EDR or XDR, so it is rather a SIEM type solution, which makes it different from CrowdStrike, SentinelOne, or Microsoft. They are not in the competition listing of EDR products.

What is most valuable?

The features of Rapid7 MDR that I find most effective for threat detection are the threat intelligence capabilities because it already collects many vulnerabilities and exploitations, as well as the configuration of network devices. They integrate everything into one solution. The other solutions such as CrowdStrike or SentinelOne don't collect all the vulnerabilities or threat intelligence except within their product itself, making Rapid7 MDR very strong in this aspect.

I have seen an ROI from this solution in terms of time savings. Because it includes everything, including SIEM, EDR, and vulnerability control, other solutions require integration of every module and vendor. It is easier to implement once they start, as the modules of the EDR can be challenging to implement and may require consulting.

What needs improvement?

There are areas of Rapid7 MDR that have room for improvement. The market is now changing very quickly towards artificial intelligence, and all the SIEM, EDR, and XDR vendors are moving to apply artificial intelligence in their solutions. Rapid7 MDR is currently weak in AI solutions and intelligence, which is concerning. It is also somewhat delayed compared to many vendors such as CrowdStrike, SentinelOne, or Microsoft, who are heading in such directions.

For how long have I used the solution?

I have worked with Rapid7 MDR for approximately three years.

What do I think about the stability of the solution?

I would rate the stability of Rapid7 MDR rather high, approximately six or eight out of ten.

What do I think about the scalability of the solution?

I would rate the scalability of Rapid7 MDR very high on a scale of one to 10, approximately eight.

How are customer service and support?

The technical support from Rapid7 MDR is adequate, rating approximately six out of ten. The lower tier support is not very good. Additionally, Japanese customers require Japanese representatives as the support is primarily in English.

How was the initial setup?

The initial setup of Rapid7 MDR is relatively easy because it integrates everything. However, the complete setup process is challenging due to the numerous modules involved. This includes cloud deployment, on-premises implementation of network devices, data collection, and agent installation. Implementation is manageable for existing Rapid7 customers, but it can be very challenging for new customers.

What other advice do I have?

I have knowledge of CrowdStrike solutions as a competitor, though not direct experience.

I would recommend Rapid7 MDR to others, but this market is changing quickly due to artificial intelligence. I cannot say it is the best solution for customers as the market is evolving, with new solutions emerging and existing vendors improving their offerings in the near future.

Overall, I would rate Rapid7 MDR a seven out of ten. Once customers can implement it, it becomes a good solution for them, though implementation remains a significant consideration.


    Nuki Agustino Wono

Excels in incident response and minimize false positives at flexible pricing

  • June 26, 2024
  • Review provided by PeerSpot

How has it helped my organization?

My company is also implementing Rapid7 MDR for database security. When comparing it with other solutions like ductless systems, Rapid7 stands out specifically for MDR network protection and response.

What is most valuable?

Rapid7's MDR service offers several strong points. Firstly, it excels in incident response. Rapid7 focuses not only on incident detection but also on response, aiming to minimize false positives effectively. This capability is crucial for reducing unnecessary alerts and ensuring that responses are targeted and efficient.

Additionally, Rapid7's MDR service extends beyond just incident response. It includes features for vulnerability assessment and vulnerability management, which are essential for proactive security measures. These features help in identifying and managing potential risks before they can be exploited.

For how long have I used the solution?

I have been using Rapid7 MDR for three years. We are the vendor of this solution.

What do I think about the stability of the solution?

The product is stable. I rate the solution’s stability a nine out of ten.

What do I think about the scalability of the solution?

The scalability is high. It is suitable for enterprise businesses. I rate the solution’s scalability a seven out of ten.

How are customer service and support?

Support is excellent.

How was the initial setup?

The initial setup is straightforward. To install the Rapid7, sensor and pull off kit, we only need less than a day.

I rate the initial setup an eight or nine out of ten, where one is difficult, and ten is easy.

What's my experience with pricing, setup cost, and licensing?

We have a very nice pricing. It is flexible.

What other advice do I have?

Rapid7 MDR leverage AI highly to enhance threat detection and response capabilities.

Overall, I rate the solution an eight out of ten.


    Oluwaseun Sonaike

Offers good integrations , very scalable and flexible and we can send as many logs as we want

  • December 20, 2023
  • Review provided by PeerSpot

What is our primary use case?

We use it for our security and virtual center security. It helps us investigate incidents and physical issues.

How has it helped my organization?

We've filled in crucial gaps we had with our previous solution. This was a key factor in choosing Rapid7 during the selection process. The ROI is already starting to show, too.

We saw specific cost reductions. We used to pay extra for external user insight and availability management in our old setup. Now, that's all included in Rapid7, which saves us money and simplifies management.

What is most valuable?

The integrations are a big plus. We can easily onboard log sources and transition from our previous MSSP without any hassle. We don't have any major issues and it has good ease of use for resource onboarding a breeze.

What needs improvement?

There are potential improvements in reports and dashboards.

For how long have I used the solution?

We have been using it for a couple of months. It replaced SecureWorks in my current environment. We used SecureWorks MDR in my previous role.

What do I think about the stability of the solution?

It is a stable solution.

What do I think about the scalability of the solution?

Our previous solution was limited by events per second or other load restrictions. With Rapid7, we can send as many logs as we want. We're not limited by any event or check numbers. It's very flexible and scalable, unlike our previous setup.

How are customer service and support?

The support is quite responsive. We often jump on calls for onboarding assets and custom configurations like log forwarding. We haven't needed much beyond that.

How was the initial setup?

The setup was definitely straightforward. Onboarding and integrations were a breeze.

What about the implementation team?

We started by selecting a vendor, in this case, External Call.com. They handled a lot of the initial and out-of-box configuration and setup, and their consultants took care of the rest of the process. Everything was smooth and efficient in the business sense. The deployment took about six months.

As long as the collectors are running in the cloud, there's not much maintenance required. We decided to keep the programming on-premise, but that's a separate decision.

What was our ROI?

We saw an ROI. We saw specific cost reductions. We used to pay extra for external user insight and vulnerability management in our old setup. Now, that's all included in Rapid7, which saves us money and simplifies vulnerability management.

What's my experience with pricing, setup cost, and licensing?

It's reasonable compared to our previous solution. We conducted a cost-benefit analysis and based on that it met our needs and usage, so we are satisfied with the price.

What other advice do I have?

Rapid7 works well for us and meets our current needs. It's a solid eight out of ten. However, it depends on your organization's cybersecurity roadmap.

For example, if your long-term plan is to have an on-premise security team, then Rapid7 might not be the best fit.

We don't have on-premise capabilities and rely solely on the cloud, so it works for us. But other organizations might need that on-premise option. So, it really depends on their cybersecurity roadmap.


    Environmental Services

Threat Command is the software to use for Cybersecurity Solutions

  • August 22, 2023
  • Review provided by G2

What do you like best about the product?
Everything can be found in just place yet easily identifiable. It is very easy to add a new system and run the scans. It shows deep insights into the vulnerabilities found in the network and how to remediate them.
What do you dislike about the product?
Sometimes it also shows an extra vulnerability that might not exactly relate to your application, and you end up researching about it and then after all that time, you come to know that it is not for you.
What problems is the product solving and how is that benefiting you?
Providing quick and easy security solutions to all the need for securely running an organisation to using application without the fear of security attacks.


    RussellBurrows

An affordable solution that provides automation workflows and allows users to customize alerts

  • July 28, 2023
  • Review provided by PeerSpot

What is our primary use case?

We use the solution in our security operation center. We use the tool to provide more visibility into the security operation center.

What is most valuable?

It is a good solution. It's not a black box. Our security operations center has similar access to the console that we have access to. It's very open. The product has automation workflows. It has around 5000 detections in it. I trust the solution.

The product is continuously developing. Whenever something new comes out, the product is upgraded. We can also bring in community threat feeds. The product allows us to customize our alerts. Log query searching has come a long way. It doesn’t require us to code anymore. We can just type in what we are looking for.

We can also deploy our agents. The good thing about agents is that we can use the automation workflow to disable user accounts. We can also make it disable and quarantine an asset. These features are provided right out of the box. The workflows do not cost us more money.

What needs improvement?

The product should provide full transparency in security operations. I want to see what's exactly going on on the other side. I want to know what is happening, what my security operations center is doing, and whether they are working for me.

For how long have I used the solution?

I have been using the solution for four to five years for two to three different companies.

How are customer service and support?

The nice thing about MDR is that we have a number to call. If there's something major or risky, we have a telephone number for that group.

Which solution did I use previously and why did I switch?

I have used Arctic Wolf. We switched to Rapid7 MDR because we didn’t get a lot of insight from Arctic Wolf, and it provided a lot of false positives.

How was the initial setup?

I rate the ease of setup a seven out of ten. It is not bad. It takes a little bit more time. It will probably take three weeks to get the product up and running, especially by the time we deploy all the agents.

What about the implementation team?

We need four people to deploy the solution. It includes server, network, security, and desktop experts.

What's my experience with pricing, setup cost, and licensing?

The product is not overly priced. We can buy products for a cheaper price, but we will not get as much technology.

What other advice do I have?

I trust the tool with my network. Overall, I rate the product a nine out of ten.


    Arnaud G.

Was better before

  • January 24, 2023
  • Review provided by G2

What do you like best about the product?
The platform is fairly easy to use. The newly revamped assets page is much better than before.
What do you dislike about the product?
Policies and alert profiler are complicated to set up.
What problems is the product solving and how is that benefiting you?
Clear, dark and deep web monitoring
Leaked credentials monitoring
Suspicious domains monitoring
Copyright infrigement
Threat Intelligence


showing 1 - 8