Rapid7 InsightIDR Valuable Features

Chad Kliewer
Information Security Officer at a comms service provider with 501-1,000 employees
InsightIDR’s ability to process millions of transactions per day, and to notify me of the most critical ones, is priceless. InsightIDR has the alerts tuned, and has the ability to quickly drill down to determine the threat level, which is very important to me as a one-person security department. Another very important part of insightIDR is the ability to collect data from endpoint devices via agent software. With a large remote workforce, this allows visibility into the endpoints that are connected to the internet, but not to the corporate network. View full review »
Informate3db
Information Security Manager at a tech vendor with 51-200 employees
The incident case management is the most valuable feature. Even though there's always something I find I would like to add to that feature, the ability to quickly sort through all the logs, network and endpoint data, etc., and add it to an incident case as part of the investigation, is nice. Having it automatically timeline that additional data into the original incident timeline, and correlate it to other notable events and activities on the network, results in a huge improvement in our overall confidence that we've quickly traced down the right source of an issue. View full review »
Aaron Harris
Information Security Officer at a tech vendor with 201-500 employees
* Intelligent alerting to avoid the common problem of alert fatigue associated with traditional SIEMs. * Great coverage of all systems within our network from endpoint to firewall. * Integration with threat modeling from the Metasploit and InsightIDR repositories. * Enables the use of honey pots, honey users, and honey files to monitor for suspicious patterns. It gives all the advantages of a SIEM. However, using clever AI, it looks for patterns of behavior rather than just flooding me with all the alerts. View full review »
Find out what your peers are saying about Rapid7, Splunk, AT&T and others in Security Information and Event Management (SIEM). Updated: January 2020.
389,978 professionals have used our research since 2012.
Security7d6d
Security Manager
The alerting to drive investigations and remediation has been its most valuable feature. Plus the ability to quickly search multiple logs makes investigations easier. Log correlation and alerting are also helpful. It gives us one place to have everything easily accessible and the ability to alert (including customisation of alerts). View full review »
reviewer1256475
IT Engineer Security Operation Team at a tech services company with 201-500 employees
The most valuable features have to do with ease-of-use. It is easy to check the events, investigate suspicious activities, and do forensic analysis. The web interface is great — very useful and user-friendly. View full review »
Databasea5f3
Database Administrator with 501-1,000 employees
* User behavioral analytics allows us to pinpoint abnormal or suspicious behavior among millions of events every day. * Log search allows us to dive deep into aggregated logs and query all event types at once. View full review »
Josh Serna
Information Security Systems Administrator at a non-tech company with 5,001-10,000 employees
The ability to ingest Office 365 log files, then process them into events and display them on a map. This feature is particularly useful as it allows us to view students who are attempting to bypass our content filters, and it shows us users who have been phished. View full review »
Find out what your peers are saying about Rapid7, Splunk, AT&T and others in Security Information and Event Management (SIEM). Updated: January 2020.
389,978 professionals have used our research since 2012.