Detector

BUILD YOUR OWN, BRANDED CYBER SECURITY OFFERING WITH DETECTOR

BEEF UP YOUR IT SECURITY SERVICE OFFERINGS WITH THIS UNIQUE SOFTWARE APPLIANCE

If you want to offer the most comprehensive IT security service to your clients, a small investment in Detector™ will yield a big return – in terms of your clients’ peace of mind and your own company’s profits.

Traditional security technologies including firewalls, anti-malware, and anti-spam filters are focused on deterrence and prevention from EXTERNAL causes. But according to every industry expert, most data security threats originate from INTERNAL sources. Detector is the only software appliance that closes this gap through a unique combination of machine learning and intelligent tagging to identify suspicious anomalies, changes and threats. In addition, Detector’s powerful analysis engine examines multiple data points and notifies you of security issues caused by unusual user behavior and network misconfigurations.

This low cost software appliance easily attaches to your client’s network and is centrally controlled by your Network Detective application. Just think about the value to that client knowing that you are now providing protection against the very real threat of a data breach from the inside.

Click here to learn more about Detector’s features and benefits.

DETECTOR FINDS WHAT OTHER SECURITY SYSTEMS MISS

Can your current security tools do this?

  • Catch unauthorized logins or attempts to restricted computers
  • Identify a new user profile suddenly added to the business owner’s computer
  • Find an application just installed on a locked down system
  • Get alerted to unauthorized wireless connections to the network
  • Notice that a new user was just granted administrative rights
  • Detect an unusual midnight log-in for the first time by a day-time worker
  • Find sensitive personal data such as credit card numbers, social security numbers and birth dates stored on machines where it doesn’t belong.

These are just a few examples of the dozens of network configuration changes, anomalous end-user behavior and other threats that Detector will catch and immediately notify you about via email message.

Click here to see what else Detector will find out.

UNIQUE "SMART-TAGS" LET YOU FINE-TUNE DETECTOR FOR EACH CLIENT

Detector is pre-configured out of the box to immediately start identifying potential security issues caused by anomalies, changes and threats. But it also includes a simple way to layer on additional meta-information that you supply about each client’s network environment to dramatically increase the effectiveness of the tool.

We call this feature "SMART-TAGS" and it’s one of the technologies that separates Detector from other internal security tools.

Click here to learn more about SMART-TAGS.

DYNAMIC DAILY ALERTS TIED TO OUR OWN CLOUD PORTAL

Detector prowls an entire network each day at whatever time you determine and then sends out daily email alerts of any suspicious issues it discovers. Each discovered issue listed in the alert is followed by a set of dynamic “Action Links” that are part of an automated process flow to “Remediate,” “Investigate” or “Ignore” the item.

Clicking on any of these Action Links will take you to the Network Detective Portal where you can review the issue forensics, automatically generate a service ticket in your favorite PSA, or create a new SMART-TAG to ignore the alert and prevent the same “false-positive” from being generated again in the future.

Click here to learn more and see sample alerts and notices.

CREATE YOUR OWN INTERNAL CYBER SECURITY SERVICES WITH OUR BLUEPRINTS

We supply this low-cost tool to you so you can provide these high-value services to all of your clients!

To help get you started, we have created a set of “blueprints” that tell you everything you need to know in order to create three different levels of branded Internal Cyber Security Services. Each blueprint includes the details of what tasks you need to perform, how to perform them, how much time it should take, and even a recommendation on how much you should charge.

And, if that’s not enough, we give you the ability to modify our starter Service Plans, or create your own from scratch, and then automatically generate a “Service Plan Catalog” and Service Plan Matrix sheet to help you sell your new security services.

Click here to learn about creating your own Internal IT Security Service.

TRY IT NOW

Go ahead and add a Detector software appliance to your Network Detective toolkit right now. If you already have a RapidFire Tools account, login to your Network Detective application and select the Upgrade button at the top right. Otherwise, click here to order Detector online right now.

Take Advantage of Our Volume Discounts.
We know you are going to buy lots of Detectors because you can make money with the services you sell with each one. That’s why we offer a volume discount on multiple annual subscriptionns and we delay the subscription start date for each individual unit until you actually turn it on. So there’s no additional cost incurred for your “inventory” of Detectors.

Check it out now. Install the appliance on one of your client sites and you will be up-and-running with an enhanced security service in a matter of minutes. What’s more, you'll have a full month to put the appliance through its paces. If, during that time, you decide that this product is not for you, just tell us and we'll cancel your subscription and provide you with a 100% refund. Best of all, you can order additional subscriptions and appliances at any time directly from inside the tool, and qualify for exclusive RapidFire Tools customer discounts.

BETTER SECURITY FOR YOUR CLIENTS... KEY DIFFERENTIATOR FOR YOU!

If you want to offer a more comprehensive IT security service to your clients, a small investment in Detector™ will yield a big return – in terms of your clients’ peace of mind, and your own company’s profits.

Traditional security technologies deployed by most MSPs -- including firewalls, anti-malware, and anti-spam filters -- are focused on deterrence and prevention from EXTERNAL threats.

Detector is the only software appliance that closes this gap through a unique combination of machine learning and intelligent tagging to identify suspicious anomalies, changes and threats. Take a closer look at what makes Detector so valuable for both YOU and your clients:

Feature Description Benefit
Automated Scans with minimum configuration The initial configuration is very minimal and the Detector will perform scans virtually out of the gate. Get started immediately with minimum configuration.
Smart Tags Adds the world knowledge that systems without this meta-information could never get. Gets "smarter" as you tag more items in the future. "Learns" over time the customer’s environment.
Make information connections to discover issues that robotic systems like RMMs can’t.
Network Detective Scanning Engine Scans user, asset, and configuration data that monitoring systems don’t.
Definitely looks at things that anti-virus/anti-spyware/firewalls don’t. Get the power of the award winning Network Detective scanning engine that analyzes your network.
It’s always "on patrol", scanning the network at pre-set scheduled times.
Automated Report Engine for NAM and SAM Since the Detector is scanning your network using the ND Scanning Engine, it can gather the data automatically to generate NAM and SAM reports. Leverage your Detector to generate the Network and Security Assessment reports for a site (including change reports) without having to deploy another appliance or manually run the scans.
Minimizes network scans by having all scans run from the single source.
Daily Alerts Timely (daily) emails that contain a list of Anomalies, Changes, and Threats that are prioritized by Severity. Increase awareness and catch security affecting events that traditional approaches miss, including user behavior and misconfigurations.
Replace having a Security Engineer review and analyze logs and data all the time looking for potential security issues. Now they can focus on investigation and remediation.
Weekly Notices Weekly email that lists all changes.
Compact format allows easy viewing of many changes in a single email.
Allows a human to review the changes for possible anomalies and threats that could warrant further investigation.
Compact Format Plain Text email format Works well with mobile environments and email integration to PSAs.
Expanded Format HTML formatted email. Friendly readable format for alerts that includes recommendations and formatting. Ideal for users with email readers.
Sort by ACT then SEVERITY Groups content in Security Alerts by Anomalies, Changes, and Threats first then by Security. Allow easily filtering and getting to issues based on the categorization of the issue.
Sort by SEVERITY then ACT Groups content by Severity Allows users the flexibility to see the higher severity items first.
Recommended Tags A set of tags that are recommended for every Site. Provides guidance to the most popular tags that will give the most benefit in terms of alerting.

TRY IT NOW

Go ahead and add a Detector software appliance to your Network Detective toolkit right now. If you already have a RapidFire Tools account, login to your Network Detective application and select the Upgrade button at the top right. Otherwise, click here to order Detector online right now.

Take advantage of our volume discounts. Order multiple Detectors at the same time and you’ll save on each one. Pre-pay your annual subscription(s) and you’ll save even more. Even though you pay at the time of purchase, your annual subscription start date is delayed until you actually turn it on, so you will have a full year of service revenue to cover each one.

DETECTOR DIGS DEEP TO FIND SUSPICIOUS INTERNAL SECURITY ISSUES

Discovering security threats from the inside is much harder than identifying and stopping threats from the outside. Perhaps that’s why there are so few tools out there that do it, and why so few MSPs offer internal IT security as a service. All that changes with Detector.

Detector uses proven Network Detective non-invasive scanning technology to dig deep into whatever computer network that it’s attached to, and then digs even deeper into everything that is connected to it, whether physically or virtually.

But it’s not just on a random data-gathering mission. Each time Detector executes a pre-scheduled scan, it’s on the look-out for three classifications of internal security issues: Anomalies, Changes and Threats.

Anomalies are suspicious activities and findings that are out of the ordinary and unexpected and that should be investigated. Examples of anomalies are users logging in at times outside their historical patterns, or a USB drive plugged into a computer that has been tagged as being "locked down."

Changes are recorded variances from previous scans linked to specific aspects of the network environment that could represent a threat. Examples of suspicious changes are a user’s security permission promoted to administrative, or a new device added to the network that wasn’t there before.

Threats are defined as clear and recognizable dangers to the network environment that need fast attention. Examples of threats would be a critical security hole or a machine in the "DMZ" that hasn’t been patched in 30 days.

Every day Detector looks at a broad range of assets and configurations in search of anomalies, changes and threats, including: Wireless Networks, Network Devices, User Behavior, Computers, Printers, DNS entries, Switch Port Connections (Layer 2/3), and Internal Network Vulnerabilities. It also looks at issues specifically for environments subject to HIPAA and PCI compliance.

And, on a weekly basis, it also will notify you of ALL changes in the large categories of: Access Control, Computer Security, Wireless Access, Network Security.

THE SMARTEST INTERNAL IT SECURITY TOOL KEEPS GETTING SMARTER

Detector incorporates a proprietary feature we call "SMART-TAGS" that allows you to fine-tune the tool to adapt to each client’s unique environment.

SMART-TAGS allow you to enrich the detection system by adding information about specific users, assets and settings that helps Detector get "smarter" about what it’s finding. That means more potential threats identified with fewer "false positives."

Here’s an example of some examples of SMART-TAGS at your disposal:

TagApplied to
AUTHORIZED SSIDSSID
GUEST WIRELESS NETWORKIP Range
GUEST NETWORKIP Range
VIRTUAL MACHINEComputer
BUSINESS OWNER PCComputer
BUSINESS OWNERUser
LOCKED DOWNComputer
IT ADMINUser
RESTRICTED IT ADMIN ONLYComputer
RESTRICTED NETWORKIP Range
AUTHORIZED PRINTERPrinter
SINGLE DESKTOP USERUser

Here are some examples of how you might use the SMART-TAGS to fine-tune Detector’s alerts for a particular client:

  • You tag a particular computer as being "RESTRICTED IT ADMIN ONLY". Now when any user logs in that hasn’t been tagged "IT ADMIN", Detector will send an alert.
  • You tag a particular computer as "Locked Down" (meaning don’t allow changes to this computer). If someone manages to install an application on this machine, then Detector will pick it up and let you know. In this way, tagging can remove false positives and increases the relevance of alerts.
  • You tag a specific wireless network as a "GUEST WIRELESS NETWORK" telling Detector it doesn’t need to worry about new devices appearing on it. But if a new device shows up on any non-guest network, then the appearance is significant and Inspector will send you an alert so you can determine if it’s worth looking into.

You can add to, or modify, your SMART-TAGS at any time. That allows you to see what kind of alerts Detector is sending you and create the tags you want to "tweak" the system.

TRY IT NOW

Go ahead and add a Detector software appliance to your Network Detective toolkit right now. If you already have a RapidFire Tools account, login to your Network Detective application and select the Upgrade button at the top right. Otherwise, click here to order Detector online right now.

Take advantage of our volume discounts. Order multiple Detectors at the same time and you’ll save on each one. Pre-pay your annual subscription(s) and you’ll save even more. Even though you pay at the time of purchase, your annual subscription start date is delayed until you actually turn it on, so you will have a full year of service revenue to cover each one.

DAILY ALERTS AND WEEKLY NOTICES KEEP YOU AHEAD OF ANY INTERNAL THREAT

Detector’s job is to keep you posted of anything going on inside your client’s network that could represent an internal security issue that you should know about.

You set the time for the daily scan and when it finishes, Detector reports back with an email alert sent to any addresses you specify, including your own ticketing system.

The daily alerts aggregate the issues that were detected during the past 24 hours and can be sorted either by the priority/severity (high, medium and low) of the threat, or by the type of issue (threat, anomaly, change).

There are dozens of types of network changes, anomalous end-user behaviors and misconfiguration threats that Detector will catch. Here’s a sample of the categories of alerts -- more are being added all the time.

Category ACT Alert Name
Wireless Threat Unauthorized wireless connection
Access Control Change New profile (Business Owner's computer)
Computers Change Application installed on locked down system
Computers Change Removable drive added to locked down system
Access Control Change Administrative rights granted
Access Control Threat Unauthorized access to IT restricted computer
Access Control Change New device on restricted network
Access Control Threat Unauthorized access to accounting computer
Access Control Threat Unauthorized access to CDE
Access Control Threat Unauthorized access to ePHI
Access Control Change Unauthorized printer on network
Access Control Anomaly Suspicious user logons by single desktop user
Computers Threat Internet restriction not enforced
Computers Threat Critical patches not applied timely on DMZ computer
Computers Threat Critical patches not applied timely
Access Control Change New profile
Access Control Change New user
Access Control Anomaly Unusual logon to computer by user
Access Control Anomaly Unusual logon time by user
Network Security Threat New High Severity Internal Vulnerability
Network Security Threat New Medium Severity Internal Vulnerability
Access Control Change Local User Admin User Added
CLICK HERE TO DOWNLOAD A PDF OF SAMPLE DAILY ALERTS.

The weekly notices are sent on a weekly basis after Detector completes its weekly internal security scan. Even though Detector sends you alerts on a daily basis on any potential threat it finds, once a week it will send you a tight summary of ALL the changes that took place during the prior week.

This gives you a quick at-a-glance summary of the changes that didn’t trigger a security alert but might be worth a quick review.

Changes included in Detector’s weekly report fall into the following objects and categories.

Category Sub-Category
Network Wireless Networks
Network Devices
Domain Users
Computers
Printers
DNS
Switch Port Connections
Local Users
Security New Internal Vulnerability

CLICK HERE TO DOWNLOAD A PDF OF SAMPLE WEEKLY NOTICES.

TRY IT NOW

Go ahead and add a Detector software appliance to your Network Detective toolkit right now. If you already have a RapidFire Tools account, login to your Network Detective application and select the Upgrade button at the top right. Otherwise, click here to order Detector online right now.

Take advantage of our volume discounts. Order multiple Detectors at the same time and you’ll save on each one. Pre-pay your annual subscription(s) and you’ll save even more. Even though you pay at the time of purchase, your annual subscription start date is delayed until you actually turn it on, so you will have a full year of service revenue to cover each one.

CREATE YOUR OWN CYBER SECURITY SERVICE WITH THIS SPECIAL SOFTWARE APPLIANCE

The Perfect Opportunity To Expand Your Recurring Revenue
Using just Detector, you can offer a basic internal cyber security service that is easy to sell, easy to deliver, and one that your clients will see the value of every day. But you can take your offerings to even higher levels, and command even higher monthly fees, by expanding your security services through some of our other IT Assessment and Compliance tools.

Get The IT Assessment-As-A-Service Blueprint
Based on industry best practices, we’ve created a set of three levels of recurring cyber security services that you can deliver with a combination of our tools. Each service level builds on the one before to meet the needs of different types of clients. And, to help guide you in setting up these services, we’ve created three “blueprints” that tell you exactly which Network Detective modules you need, which scans to run, when to run them, which reports to generate and what to do with them in addition to the alerts generated by Detector.

Click here to watch the webinar and get the blueprint.

And, if that’s not enough, Network Detective includes a unique “Service Plan Creator” tool that gives you the ability to modify our starter Service Plans, or create your own from scratch. You define and name the offerings based on the policies you want to enforce, and the tool automatically generates a “Service Plan Catalog” (or catalogs), and Service Plan Matrix sheet that compares your plans to help you sell them to your clients and prospects. Once you sell one of your plans to your client, simply “apply” the selected plan to the Detector assigned to that client and it's automatically configured to deliver that exact plan. It doesn’t get easier than that.

Armed with the ability to deliver such a high value security service at such a low monthly price, you can’t afford NOT to get a Detector for each of your clients.

When you explain to a business owner that the biggest "threat" to the security of the business is actually on the inside of the firewall, you’ll have no trouble selling your new internal IT security service.

Here are some "fun facts" from a recent Forrester study to share with your clients and prospects about internal threats:

  • About 1/3 of all security breaches stem from lost or stolen devices that took too long to discover were missing
  • Another 27% of breaches are caused by inadvertent misuse of data by employees which is often never discovered until well after-the-fact
  • An additional 12% of breaches are caused by malicious insiders, most of whom were never suspected of "being the type."

In all, internal vulnerabilities in some form or another are responsible for a total of 70% of all data breaches.

And if your client questions the value of the service, go ahead and install Detector on his network on a trial basis. It won’t take too many alerts to convince your client of the value of the service you are offering with our tool.

The beauty about this offering is that your cost to deliver it is so low, and the value is so high. Not only will you dramatically improve your clients’ network security, you’ll also gain a more intimate understanding of each client’s network environment. It’s like the difference between having a full time internal security person guarding the fort, and hiring a part-timer to stop by once in a while to check on things.

And don’t forget to offer this service as part of every new business pitch. Your internal IT security service could be the main reason why a potential new client selects you over your competitors.

TRY IT NOW

Go ahead and add a Detector software appliance to your Network Detective toolkit right now. If you already have a RapidFire Tools account, login to your Network Detective application and select the Upgrade button at the top right. Otherwise, click here to order Detector online right now. You'll have a full month to put the appliance through its paces. If during that time you decide that this product is not for you, just tell us and we'll cancel your subscription and provide you with a 100% refund. You can even return the server (if purchased with your subscription) within 30 days for a full refund less shipping.

Best of all, you can order additional subscriptions and appliances at any time directly from inside the tool, and qualify for exclusive RapidFire Tools customer discounts.

TRY IT NOW

Go ahead and add a Detector software appliance to your Network Detective toolkit right now. If you already have a RapidFire Tools account, login to your Network Detective application and select the Upgrade button at the top right. Otherwise, click here to order Detector online right now.

Either way, install Detector on one of your client sites. Set the schedule for when you want it to run. After the first scan is complete, fine-tune your system with Detector’s unique SMART-TAGS feature.

You'll have a full month to put the appliance through its paces. If during that time you decide that this product is not for you, just tell us and we'll cancel your subscription and provide you with a 100% refund. You can even return the server (if purchased with your subscription) within 30 days for a full refund less shipping.

Best of all, you can order additional subscriptions and appliances at any time directly from inside the tool, and qualify for exclusive RapidFire Tools customer discounts.