Rapid7, Inc.

États‑Unis d’Amérique


Commandez votre montre hebdomadaire Rapid7, Inc.
Quantité totale PI 344
Quantité totale incluant filiales 345 (+ 1 pour les filiales)
Rang # Quantité totale PI 3 867
Note d'activité PI 3,4/5.0    450
Rang # Activité PI 1 594
Symbole boursier
  • R7D (frankfurt)
  • RPD (nasdaq)
ISIN US7534221046
Capitalisation 2,700M  (USD)
Industrie Software - Application
Secteur Technology
Classe Nice dominante Services scientifiques, technolo...

Brevets

Marques

330 11
0 0
0 3
0
 
Dernier brevet 2026 - Techniques for chronological vul...
Premier brevet 2006 - Upright camcorder with a dual le...
Dernière marque 2025 - EXPOSURE COMMAND
Première marque 2023 - RAPID7

Filiales

1 subsidiaries with IP (1 patents, 0 trademarks)

 S'inscrire grtuitement pour accéder à la liste des filiales

Industrie (Classification de Nice)

Derniers inventions, produits et services

2025 Invention Cloud computing environment asset monitoring. Techniques for monitoring assets in a cloud comput...
Invention Cybersecurity vulnerability risk determination. Techniques for analyzing cybersecurity vulnerabi...
Invention Network attack path visualization. The techniques described herein relate to visualizing network...
P/S Installation of computer software for network and application security in the areas of network vu...
Invention Techniques for operating a computer network security system in a cloud computing environment. Ma...
Invention Event-driven monitoring of resources in a cloud computing environment. Techniques for event driv...
Invention Proactive protection of computer networks against unexploited vulnerabilities. A server determin...
Invention Techniques for detecting cyberattacks on an authentication system. Some embodiments provide tech...
Invention Visual exploration for efficient access analysis for cloud provider entities. An access policy a...
Invention System for collecting computer network entity information employing abstract models. An entity t...
Invention Used cached summaries for efficient access analysis for cloud provider entities. An access polic...
Invention Techniques for detecting malicious software in a computing asset. Some embodiments provide techn...
2024 Invention Updating remote scan engines with custom vulnerability checks. Various embodiments include syste...
Invention Single round trip collection of user and group data for security posture assessment. A software ...
Invention Dimensionality reduction technique for training dataset with bit string features. An anomaly det...
Invention Transaction conflict resolution in a file-system-backed database system. Embodiments of a transa...
Invention Techniques for chronological vulnerability event recognition. Techniques for identifying vulnera...
Invention Machine learning techniques for generating common vulnerability scoring system vectors. Some emb...
P/S Installation of computer software for network and application security in the areas of network v...
Invention System for automatically discovering, enriching and remediating entities interacting in a compute...
Invention Generating configuration change event stream for event-driven assessment of resources. A configur...
Invention Intelligent identification of correlations across security services. Various embodiments include ...
Invention File directory structure and naming convention for storing columnar tables. A database system sto...
Invention Systems and methods for determining current risk of cybersecurity vulnerabilities. Techniques for...
2023 Invention Techniques for detecting cyberattacks on an authentication system. Some embodiments provide techn...
Invention Techniques for identifying network attack paths. The techniques described herein relate to identi...
Invention Techniques for visualizing network attack paths. An example method includes using at least one co...
Invention Security service platform for rule matching. Various embodiments include systems and methods pert...
Invention Providing obfuscated results to a network scanner. As an example, an asset receives a request fro...
Invention Software testing system for detecting code injection vulnerabilities. Systems and methods are dis...
Invention Security rule matching over structurally deduplicated network data. Various embodiments include s...
Invention Cloud integrated network security. Various embodiments include systems and methods pertaining to ...
P/S Downloadable computer software for use in detecting, analyzing, and prioritizing cyber computer t...
Invention Mirroring traffic in a service mesh to detect and block offending microservices. In some examples...
2022 Invention Vulnerability detection at points of exposure. Methods and systems for identifying a vulnerabilit...
Invention Storing scan requests for fast preparatory scans of an asset. A method for authenticated asset as...
Invention Honey repository. Embodiments disclose a honeyrepo implemented in a cybersecurity computing envir...
Invention Application-level cybersecurity using multiple stages of classifiers. Various embodiments include...
Invention Cyberattack detection using multiple stages of classifiers. Various embodiments include systems a...
Invention Predictive scan engine runtime durations. Various embodiments include systems and methods to impl...
Invention Signed remote execution for assessment of network system assets. A method for authenticated asset...
Invention Policy exceptions for assessment of network system assets. A method for authenticated asset asses...
Invention Predicting a probability associated with an unexploited vulnerability. A server determines vulner...
Invention Security posture recommender system. Various embodiments include systems and methods to implement...
Invention Vulnerability result integration scheme. Various embodiments include systems and methods to imple...
Invention Command line parsing for classification of process start alerts. A method includes obtaining a co...
Invention Complementary scan engine scheme. Various embodiments include systems and methods to implement a ...
Invention Visual exploration for efficient access analysis for cloud provider entities. An access policy an...
2021 Invention Recognizing and mitigating successful cyberattacks. Embodiments of a cyberattack monitoring syste...
Invention Organization vendor-based risk assessment using internet telemetry. Various embodiments include s...
2020 Invention Automated generation of anomaly scenarios for testing machine learned anomaly detection models. A...
Invention Predictive modeling to identify anomalous log data. Disclosed herein are methods, systems, and pr...
2019 Invention Data value classifier. Methods and systems for identifying targets on a network. The disclosed me...