Automate IT security through the use of Rapid7 InsightConnect
April 19, 2022

Automate IT security through the use of Rapid7 InsightConnect

Anonymous | TrustRadius Reviewer
Score 7 out of 10
Vetted Review
Verified User

Overall Satisfaction with Rapid7 InsightConnect

We use Rapid7 InsightConnect to automate various aspects of security in our IT department. We don't have the staff to constantly monitor everything 24/7. This has given us the ability to identify and remedy various malware attacks, along with automating the process after hours. Phishing emails have been reduced to a minimum as well.
  • Reduce phishing emails
  • Locate devices infected with malware and isolate them.
  • No need to learn a proprietary coding language to configure.
  • Initial deployment can get complex
  • User interface looks outdated
  • Cost was higher than expected
  • Email scanning for phishing attempts.
  • Checking for vulnerabilities through plugins.
  • Ability to isolate/resolve issues with no user intervention.
  • Cost was higher than the competitors, but worth it
  • No need to hire additional staff to maintain it
  • We haven't been hit with ransomware as a result
  • Splunk SOAR (Security Orchestration, Automation and Response) (formerly Phantom) and Palo Alto Networks Cortex XSOAR (formerly Demisto)
Palo Alto was slightly cheaper, but more complex and would need the training to be effective. Splunk was comparative from a price standpoint, but the automation features of Rapid7 InsightConnect outweighed those of Splunk SOAR. Honestly, all of these are great choices, but for our environment, it made more sense to go with Rapid7.

Do you think Rapid7 InsightConnect delivers good value for the price?

Yes

Are you happy with Rapid7 InsightConnect's feature set?

Yes

Did Rapid7 InsightConnect live up to sales and marketing promises?

Yes

Did implementation of Rapid7 InsightConnect go as expected?

No

Would you buy Rapid7 InsightConnect again?

Yes

This is perfect for an IT department with minimal staff. Security is usually an afterthought in small IT departments. If you have a dedicated security team, then something like this could be replaced with something more complex. The features it comes with are aimed toward a team that doesn't monitor and change things all the time. It's more of a set it and let it handle the rest type.