Rapid7's unified vulnerability management solution, NeXpose, scans Web applications, databases, operating systems, and network devices for visibility into threats

July 15, 2009

4 Min Read

PRESS RELEASE

SAN DIEGO " July 6, 2009 " Technology Integration Group (TIG) announced today the release of a Virtual Appliance housing Rapid7's flagship unified vulnerability management solution, NeXpose. The virtual appliance enables- organizations to quickly implement vulnerability management without the cost and effort associated with installing physical hardware into their environment. Those organizations looking to integrate a vulnerability appliance into their network without requiring additional Microsoft licenses, and who are uncomfortable working with Linux, will find tremendous value in the appliance.

"Integrating a quality vulnerability management solution into a VMware-based appliance makes a lot of sense," said Jeromie Jackson, TIG's Senior Security Architect & developer of the appliance. "With the current focus on adopting green technology, reducing server sprawl, and eliminating power concerns in data centers, utilizing existing bare metal to house the application allows for redundancy, scalability, and maximization of existing resources. Rapid7 NeXpose scans the broadest level of assets for vulnerabilities to deliver comprehensive executive data, while dramatically reducing the false positives common with other commercial and open-source vulnerability scanners. As a result, users can focus on the threats that cause the most damage, while saving both time and money."

Rapid7 NeXpose is one of the core applications TIG utilizes for their professional services work. As a unified vulnerability management solution, NeXpose scans the broadest level of assets, including Web applications, databases, operating systems, and network devices, giving direct, actionable visibility into real threats to mitigate risk and achieve compliance. Leveraging Rapid7 NeXpose in the virtual appliance will enable users to find threats, assess their risk based on priority, and devise a remediation plan for mitigation, essential in virtual environments. There are plans for further appliance development- many tools support VMware but have not yet reached maturity to where they have been productized as virtual appliances. Vendors are welcomed to contact Mr. Jackson for other such developments.

"Virtual appliances are common in today's enterprises and provide the ability to reduce cost and increase efficiency. However, because of their wide-spread adoption, organizations need to constantly stay ahead of the security threats that can compromise business-critical applications and data in virtual environments," said Mike Tuchen, president and chief operating officer of Rapid7. "By developing a virtual appliance with Rapid7 NeXpose, TIG is offering users the ability to leverage existing investments for computing, while at the same time providing the vulnerability management technology that they need in today's world of sophisticated attacks."

With a focus on operational excellence and business value, TIG brings the non-biased third-party advice organizations need to prudently manage risk and IT operations. With a proven track record of success and references worldwide, TIG offers customers a best practices approach to technology implementation that includes proven processes and methodologies. TIG is dedicated to maintaining a highly trained team of certified consultants and system engineers in addition to manufacturer authorized technicians. TIG takes continual strides to keep staff up-to-date with current technology, best practices, and industry standards. The appliance can be downloaded at http://www.jeromiejackson.com.

About TIG: A premier IT systems integrator, TIG has over 27 years of experience providing customers with best-in-class technology solutions. Offering a consultative approach to fulfilling your unique computing needs, TIG is committed to earning our place as a trusted partner to our clients by providing the highest level of service, value, and advanced technology. A financially stable computing technology provider, TIG has remained profitable every year since the company's founding in 1981. With a goal of continually improving customer service through awareness of our customer's needs, TIG consistently ranks over 96% in customer satisfaction surveys. Customers confidently rely on TIG to solve technology issues on time and to remain within budget.

An award-winning Certified Minority Enterprise, certified Small Disadvantaged Business, and a Corporate Plus' member of the National Minority Supplier Development Council (NMSDC), TIG is a leading diversity supplier to organizations nationwide. In addition to the company's headquarters in San Diego, TIG has offices located in Albuquerque, Boise, Boulder, Dallas, Denver, Detroit, Honolulu, Indianapolis, Irvine, Las Vegas, Los Alamitos, Philadelphia, Torrance, Richmond, Sacramento, San Antonio, San Francisco Bay area, Seattle, Tampa, Washington, D.C., Heidelberg, Germany, and Shanghai, China.

About Rapid7 Rapid7' is a leader in vulnerability management and compliance, delivering a single unified solution across an organization's entire infrastructure. Rapid7 NeXpose helps security professionals to reduce their attack surface by providing actionable insights into the real threats from vulnerabilities across their entire IT infrastructure. Rapid7 NeXpose is the only solution that provides in-depth coverage of vital Web and database systems in addition to networked devices, servers and operating systems. The NeXpose A.I. and Reporting Engines synthesize large quantities of raw data to provide direct insight into the vulnerabilities that represent the most risk to the business. From this insight the product delivers a set of prioritized remediation recommendations that help security professionals get protection fast. Organizations including Black & Decker, Trader Joe's, Florida State University, the New York Times and the City of Philadelphia continually rely on Rapid7 products and services to mitigate risk and remain compliant. For more information, visit www.rapid7.com.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights