Revenue | Over $500 million See Exact Annual Revenue |
---|---|
Employees | Over 1,000Exact Company Size |
Primary Industry | 541511 Custom Computer Programming & Software Development Services |
Address | 120 Causeway Street Suite 400 Boston, MA 02114 |
Rapid7 | Revenue Est. ($ Million) | Growth Rate (%) | # Employees |
---|---|---|---|
2023 | Over $500 million Details in Premium Report | ||
2022 | |||
2021 | |||
2020 | |||
2019 |
1-Year Growth Rate: 3-Year Growth Rate (CAGR): |
Rapid7 P&L | $ Millions |
---|---|
Revenue (Sales) | |
Cost of Goods Sold | |
Gross Profit | |
Operating Expenses | |
Advertising | |
Salaries and wages | |
Other Operating Expenses | |
Total Operating Expenses | |
Operating Income | |
EBITDA | |
EBIT (Earnings Before Interest and Taxes) | |
Net Profit | |
Trademark | Date |
---|---|
R-FACTOR Installation of computer software for network and application security in the areas of network vulnerability exploitation, network vulnerability management and assessment, and network remediation management; computer consultation in the field of computer, computer network and internet security risks; computer and internet security testing services to determine and identify information and network security vulnerabilities and risks and help to prioritize remediations; computer network security services, namely, assessing, auditing, and monitoring network vulnerabilities and security risks and reporting thereon; Inventory management services that enable companies and organizations to search for and organize information on their IT assets so they may assess their network and application vulnerabilities; computer system analysis services for installation of computer systems; Computer software for use in detecting, analyzing, and prioritizing cyber computer threats and vulnerabilities; Software as a service (SAAS) services featuring software for use in detecting, analyzing, and prioritizing cyber computer threats and vulnerabilities; Design and development of electronic data security systems; Computer security threat analysis for protecting data; Development of software for secure network operations; Computer security consultancy, namely, scanning, auditing and monitoring computer systems and networks for vulnerabilities and other security risks; Computer security consultancy, namely, scanning, auditing, analyzing, measuring, and monitoring computer systems and networks for vulnerabilities, security threats, and other cybersecurity risks; Security risk assessment and response and managed security threat detection in on-premises, hosted, hybrid, and cloud computing environments; Maintenance of computer software relating to computer security and prevention of computer risks; Downloadable software for analyzing source code; downloadable software for detecting and mitigating vulnerabilities in software code; downloadable software for detecting and reporting vulnerabilities in software code; Downloadable software and cloud-based software for managing the security posture of cloud resources and cloud-based devices; Downloadable computer software for collecting, analyzing, evaluating, monitoring, and transmitting data in the fields of compliance, network security, enterprise security, and maintenance; downloadable computer software for detecting fraudulent transactions and activities; downloadable computer software for investigating, remediating, and responding to fraud and to network and enterprise threat incidents; downloadable computer software for troubleshooting, diagnosing, and protecting computer software, hardware, networks, virtual machines, and operational technology; downloadable computer software for use in analyzing and monitoring computer networks; downloadable computer software for diagnosing industrial and business performance issues; downloadable computer software in the field of application analytics; downloadable computer software for providing operational intelligence, business analytics, security information, and troubleshooting based on data; downloadable data mining software; Providing temporary use of non-downloadable software and applications for collecting, analyzing, evaluating, monitoring, and transmitting data in the fields of compliance, network security, enterprise security, and maintenance; providing temporary use of non-downloadable software and applications for detecting fraudulent transactions and activities; providing temporary use of non-downloadable software and applications for investigating, remediating, and responding to fraud and to network and enterprise threat incidents; providing temporary use of non-downloadable software and applications for troubleshooting, diagnosing, and protecting computer software, hardware, networks, virtual machines, and operational technology; providing temporary use of non-downloadable software and applications for use in analyzing and monitoring computer networks; providing temporary use of non-downloadable software and applications for diagnosing industrial and business performance issues; providing temporary use of non-downloadable software and applications in the field of application analytics; providing temporary use of non-downloadable software and applications for providing operational intelligence, business analytics, security information, and troubleshooting based on data; providing temporary use of non-downloadable data mining software; consulting services in the field of information technology; technical consulting services in the fields of datacenter architecture, public and private cloud computing solutions, and evaluation and implementation of information technology and services; technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing and information technology systems | 03/02/2023 |
TCELL Anti-piracy software; Anti-spyware software; Computer anti-virus software; Computer software and hardware for security purposes; Computer software development tools; Computer software for encryption; Computer software for security purposes, none of the foregoing in the field of telecommunications | 03/18/2015 |
SECURITYSTREET Online electronic publishing of text and graphic works of others featuring information regarding internet security; providing a website for professionals in the security business featuring blogs in the field of computer and internet security | 03/27/2012 |
Company | Headquarters | Revenue ($ MM) |
---|---|---|
NVIDIA | Santa Clara, CA | 100 |
INNOVA SOLUTIONS | Duluth, GA | 80 |
COGNIZANT TECHNOLOGY SOLUTIONS U.S. | College Station, TX | 32 |
CERNER | Kansas City, MO | 12 |
CACI INTERNATIONAL | Reston, VA | 9 |
WIPRO LIMITED | East Brunswick, NJ | 6 |
SYNTEL | Troy, MI | 5 |
GUSTO | San Francisco, CA | 4 |
DELIV | Menlo Park, CA | 4 |
Company | Headquarters | Revenue ($ MM) |
---|---|---|
RAPID7 | Boston, MA | 100 |
LINKSQUARES | Boston, MA | 75 |
AMERICAN WELL | Boston, MA | 72 |
CARBONITE | Boston, MA | 66 |
INTERSYSTEMS | Cambridge, MA | 41 |
ACTBLUE | Somerville, MA | 40 |
Company | Revenue ($ MM) |
---|---|
|