Indusface to be value added distributor for Rapid7 NeXpose

By siliconindia   |   Thursday, 03 September 2009, 21:36 IST
Printer Print Email Email
Bangalore: Rapid7, a provider of unified vulnerability management solutions has partnered with India based IT security solutions company, Indusface Consulting. As part of the deal, Indusface will serve as a value added distributor for Rapid7 NeXpose. Additionally, Indusface will launch a managed security service using Rapid7 technology and expertise to bring advanced vulnerability management to the Indian market, where sophisticated attacks plague web applications, networks, databases and operating systems. With its ability to scan the broadest level of assets available, while at the same time prioritizing vulnerabilities and devising clear remediation plans, Rapid7 NeXpose gives Indusface customers the visibility into their IT infrastructure that is necessary to mitigate risk and minimize data loss. Indusface's new managed security service, built on Rapid7 NeXpose will enable customers to run scans from a secure, hosted environment using a simple web browser, reducing the need for hardware or software installation. From there, security consultants can offer analysis and guidance, and suggest mitigation steps based on the found vulnerabilities. "Our customers range from Fortune 500 organizations to startups, yet they all have a common need for advanced vulnerability management solutions that can locate threats throughout the IT infrastructure and offer a prioritization of threats based on the risk level," said Ashish Tandon, CEO of Indusface Consulting. "Both Rapid7 NeXpose and our new managed security service will provide all of our customers with the ability to achieve true visibility into their risk and prevent security attacks." Rapid7 NeXpose reduces false positives and provides detailed mitigation reports based on risk level, unlike other vulnerability management systems. As a result, IT administrators can focus on the threats that can cause the most damage by eliminating high-level weaknesses in their IT environment before the network is penetrated and sensitive information is compromised.