Rapid7's excellent MDR needs no introduction for security professionals seeking an exceptional product. But complex deployments can cause disappointment for some businesses.
Now, ITHQ brings you the ideal solution.
Welcome to MDR-X.
ITHQ and Rapid7 have created an extended version of MDR specifically to ensure complex deployments are delivered on time, perfectly configured and mapped to regulations.
Through extra SLA coverage, support and expert guidance, MDR-X is designed to ensure qualifying businesses get their ideal MDR deployment. Full security needs are met, with vCISO and other support as necessary.
All relevant Rapid7 skills and certs are provided by ITHQ expert technicians. We are your conduit, acting on your behalf, working with the Rapid7 team to deliver and manage exactly the solution you need.

JT needed a Rapid7 MDR service that could meet Telecoms Security Act requirements, reduce pressure on the internal IT team, and manage security alerts properly. After an earlier deployment attempt fell short, ITHQ delivered MDR-X with the added support, configuration, and managed service needed to get the platform working as intended.
Watch the full case study to see how MDR-X helped JT Global turn a stalled deployment into a working security outcome.
For over 11,000 companies around the world, there is no other MDR solution comparable to Rapid7's. We proudly partner Rapid7 on complex MDR deployments, delivering better security to more businesses who might otherwise be forced to settle for less.
ITHQ are more than established Rapid7 delivery partners, we are also governance experts and highly skilled technicians. We fill the gap between your team and Rapid7, handle your security alerts, support your investigations and more. As your expert guide, we manage every aspect of your deployment, ensuring the solution is tailored to your complex business requirements.
ITHQ delivers and manages MDR-X for financial services organisations, legal firms, casinos and other highly regulated businesses. We know how to ensure your compliance, empower your teams with exceptional visibility across the attack surface, manage your ongoing project evolution and more.


Scans over 70 different services and protocols to gain insights into global exposure to common vulnerabilities. Findings inform Rapid7's product R&D, their Quarterly Threat Report and The National Exposure Index.
Deploys low interaction honeypots globally, and gathers data on connections and incoming attacks via telemetry. Provides objective assessment of attacker behaviours and drives collaboration with other internet-scale researchers.
Shows organisations their internet exposure. Addresses the increasing complexity of corporate IT environments and shadow IT. Reveals third-party exposures, misconfigurations, system exploitations and more.
Rapid7 supports various communities to share threat intel including: Metasploit pen testing framework, Recog fingerprinting network, AttackerKB threat analysis forum and Velociraptor endpoint interrogation platform.
"We thought [a solution like this] was out of our reach. But the service ITHQ offers has made it accessible to us and given me the peace of mind that we're getting day-zero protection."
"On one of our customer Wi-Fi systems, for example, we have 1600 concurrent connections every weekend so performance is obviously vital. Our systems show that not only has the amount of monitored endpoints doubled, but the number of alerts has actually reduced to one-sixth of what they were."
"ITHQ has all the expertise and a rapid onboarding process that ensured we were fully set up in a short time."

Vendor lock-in is not just a technology issue. Bundling, platform dependency, and reseller bias create resilience risk, says David Thomas.
Read On
Achieving measurable resilience via strategic tech investment … ITHQ is with you from kick off to triumph.
Read On
Rapid7 has defined exposure management. Discover how its Command Platform leads the field.
Read OnWhat does true tech freedom mean to you? Scott and Chris talk about the benefits of securely accessing all your apps with SSO, frictionless user and permissions management, all via the cloud and one simple platform
BackBox CEO, Rekha Shenoy, and Technical Director, Tony Dalton, demonstrate why automation is key to maintaining cyber resilience at the network level. Watch this webinar to understand how BackBox helps eliminate time-consuming manual tasks while improving security posture through automated vulnerability management.
Compliant does not necessarily equal Resilient. One of our financial sector clients discusses the difference a SAFE Assessment has made to their security posture with our Head of Cyber Resilience, Dave Thomas