What process is used to keep vulnerability signatures up-to-date?
Rapid7 provides a 24-hour SLA for critical vulnerability definitions. Our vulnerability database, the key to the NeXpose system, is proprietary, and contained within NeXpose. NeXpose has an extensive built-in database of over 20,000 vulnerability checks. This database cross-links the thousands of external databases that provide patches, downloads, references and additional information about the security weaknesses in systems including CERT, SANS, CVE, Microsoft Knowledge Base and Bugtraq.