Rapid7 InsightIDR Pros and Cons
Rapid7 InsightIDR Pros
Dashboards, including the main screen, provide much-needed information at a glance, without hours of coding and sifting through logs to find it. In case of an actual security incident, I have faith that insightIDR has retained all logs in a secure manner that prevents log tampering as well.
InsightIDR’s ability to process millions of transactions per day, and to notify me of the most critical ones, is priceless. InsightIDR has the alerts tuned, and has the ability to quickly drill down to determine the threat level.
Another very important part of insightIDR is the ability to collect data from endpoint devices via agent software. With a large remote workforce, this allows visibility into the endpoints that are connected to the internet, but not to the corporate network.View full review »
The incident case management is the most valuable feature. Even though there's always something I find I would like to add to that feature, the ability to quickly sort through all the logs, network and endpoint data, etc., and add it to an incident case as part of the investigation, is nice. Having it automatically timeline that additional data into the original incident timeline, and correlate it to other notable events and activities on the network, results in a huge improvement in our overall confidence that we've quickly traced down the right source of an issue.View full review »
Intelligent alerting to avoid the common problem of alert fatigue associated with traditional SIEMs.
Great coverage of all systems within our network from endpoint to firewall.
Integration with threat modeling from the Metasploit and InsightIDR repositories.
Enables the use of honey pots, honey users, and honey files to monitor for suspicious patterns.
We were able to identify criminals attempting to login from China and put a stop on their IP locations.View full review »
The alerting to drive investigations and remediation has been its most valuable feature.
It improved my organization by building a security alerting program.View full review »
The web interface is great — very useful and user-friendly.View full review »
User behavioral analytics allows us to pinpoint abnormal or suspicious behavior among millions of events every day.
Log search allows us to dive deep into aggregated logs and query all event types at once.
The log aggregation and storage provided by InsightIDR has shown no issues with scalability; aggregating over one hundred millions events daily.
InsightIDR has allowed us to find potential security issues that we did not know existed, and get remediation quickly.View full review »
I am able to run automated actions based on the output of reports, leaving me extra time to focus on more pressing matters.
The ability to ingest Office 365 log files, then process them into events and display them on a map.
The technical support is a solid 10 out of 10 as they take the time to answer any questions or problems which may arise in a reasonable time frame.View full review »
Rapid7 InsightIDR Cons
I would like the ability to adjust the threshold of certain existing alerts. Currently the only option is to change the notifications or create my own alert.View full review »
The reporting is the weakest aspect. There needs to be multi-level grouping for events (for example, group by user and destination). Right now, we can do a group by user and a separate table or group by destination. But I'd be more interested in where a person was logging into instead of who was logging in or where he was logging in.View full review »
One thing that springs to mind is easier API integration with ITSMs. We are evaluating a new ITSM and I would like to have InsightIDR create a ticket when an attack is identified, and the ticket would be closed in InsightIDR when the ITSM resolution is completed. This would take out the "single point of failure" we currently have, if the email recipient is somehow absent, in recording the risk appetite for the incident and the actions taken to mitigate or not.View full review »
Customised alert recipients need to be added to allow better first-line action and quicker response. Configurable honeypots would be a welcome addition.View full review »
The interface for doing investigation needs to be enhanced with minor improvements that would make it more useful.View full review »
It would be useful to import threat intelligence in YARA format along with known incorrect email addresses.View full review »
I feel it would greatly benefit from more supported log sources.
The ability to tune the collector for custom logs would greatly help.View full review »