Detector

BUILD YOUR OWN, BRANDED CYBER SECURITY OFFERING WITH DETECTOR

BEEF UP YOUR IT SECURITY SERVICE OFFERINGS WITH THIS UNIQUE SOFTWARE APPLIANCE

If you want to offer the most comprehensive IT security service to your clients, a small investment in Detector™ will yield a big return – in terms of your clients’ peace of mind and your own company’s profits.

Traditional security technologies including firewalls, anti-malware, and anti-spam filters are focused on deterrence and prevention from EXTERNAL causes. But according to every industry expert, most data security threats originate from INTERNAL sources. Detector is the only software appliance that closes this gap through a unique combination of machine learning and intelligent tagging to identify suspicious anomalies, changes and threats. In addition, Detector’s powerful analysis engine examines multiple data points and notifies you of security issues caused by unusual user behavior and network misconfigurations.

This low cost software appliance easily attaches to your client’s network and is centrally controlled by your Network Detective application. Just think about the value to that client knowing that you are now providing protection against the very real threat of a data breach from the inside.

Click here to learn more about Detector’s features and benefits.

DETECTOR FINDS WHAT OTHER SECURITY SYSTEMS MISS

Can your current security tools do this?

  • Catch unauthorized logins or attempts to restricted computers
  • Identify a new user profile suddenly added to the business owner’s computer
  • Find an application just installed on a locked down system
  • Get alerted to unauthorized wireless connections to the network
  • Notice that a new user was just granted administrative rights
  • Detect an unusual midnight log-in for the first time by a day-time worker

These are just a few examples of the dozens of network configuration changes, anomalous end-user behavior and other threats that Detector will catch and immediately notify you about via email message.

Click here to see what else Detector will find out.

UNIQUE "SMART-TAGS" LET YOU FINE-TUNE DETECTOR FOR EACH CLIENT

Detector is pre-configured out of the box to immediately start identifying potential security issues caused by anomalies, changes and threats. But it also includes a simple way to layer on additional meta-information that you supply about each client’s network environment to dramatically increase the effectiveness of the tool.

We call this feature "SMART-TAGS" and it’s one of the technologies that separates Detector from other internal security tools.

Click here to learn more about SMART-TAGS.

ALERTS AND NOTICES INSTEAD OF REPORTS

Detector is unique among Network Detective tools. While our assessment and compliance modules are used to generate a wide-range of professional branded reports to document what they discover, Detector is designed to deliver timely and relevant daily email alerts of any suspicious issues it discovers, as well as comprehensive weekly notices of all network anomalies, changes and threats that it finds.

The daily alerts aggregate the issues that were detected during the past 24 hours into a single email that is delivered at whatever time you specify. It can include recommendations and can be delivered in multiple formats and different sort orders for different recipients. The weekly notice is a compact text email that contains a complete summary of all the important changes for that weekly period, and is delivered at the time of day, and day of week that you determine. It’s used to create and maintain complete documentation of all changes that you’ll want to be tracking.

Click here to learn more and see sample alerts and notices.

CREATE YOUR OWN VALUE-ADDED SERVICE WITH THIS SPECIAL SOFTWARE APPLIANCE

Detector is a software appliance that you purchase through an annual subscription, and can be either downloaded as a virtual machine (Hyper-V today, VMware late 2016) or, for an additional fee, can be ordered pre-installed on a plug-n-play small form server.

Either way, Detector is designed to be permanently attached to an individual client network to allow for the on-going regularly scheduled scanning and alerting, as well as perform continuous "machine learning" about the network it’s attached to.

With Detector as the foundation of your service deliver story, you can now expand and offer your own fee-based value-added IT security service based on Detector alerts as the core offering for each of your clients.

Click here to learn about creating your own Internal IT Security Service.

TRY IT NOW

Go ahead and add a Detector software appliance to your Network Detective toolkit right now. If you already have a RapidFire Tools account, click here to add Detector to your Network Detective tool set. Otherwise, click here to order Detector online right now.

Either way, install the appliance on one of your client sites and you will be up-and-running an enhanced security service in a matter of minutes. What’s more, you'll have a full month to put the appliance through its paces. If during that time you decide that this product is not for you, just tell us and we'll cancel your subscription and provide you with a 100% refund. Best of all, you can order additional subscriptions and appliances at any time directly from inside the tool, and qualify for exclusive RapidFire Tools customer discounts.

BETTER SECURITY FOR YOUR CLIENTS... KEY DIFFERENTIATOR FOR YOU!

If you want to offer a more comprehensive IT security service to your clients, a small investment in Detector™ will yield a big return – in terms of your clients’ peace of mind, and your own company’s profits.

Traditional security technologies deployed by most MSPs -- including firewalls, anti-malware, and anti-spam filters -- are focused on deterrence and prevention from EXTERNAL threats.

Detector is the only software appliance that closes this gap through a unique combination of machine learning and intelligent tagging to identify suspicious anomalies, changes and threats. Take a closer look at what makes Detector so valuable for both YOU and your clients:

Feature Description Benefit
Automated Scans with minimum configuration The initial configuration is very minimal and the Detector will perform scans virtually out of the gate. Get started immediately with minimum configuration.
Smart Tags Adds the world knowledge that systems without this meta-information could never get. Gets "smarter" as you tag more items in the future. "Learns" over time the customer’s environment.
Make information connections to discover issues that robotic systems like RMMs can’t.
Network Detective Scanning Engine Scans user, asset, and configuration data that monitoring systems don’t.
Definitely looks at things that anti-virus/anti-spyware/firewalls don’t. Get the power of the award winning Network Detective scanning engine that analyzes your network.
It’s always "on patrol", scanning the network at pre-set scheduled times.
Automated Report Engine for NAM and SAM Since the Detector is scanning your network using the ND Scanning Engine, it can gather the data automatically to generate NAM and SAM reports. Leverage your Detector to generate the Network and Security Assessment reports for a site (including change reports) without having to deploy another appliance or manually run the scans.
Minimizes network scans by having all scans run from the single source.
Daily Alerts Timely (daily) emails that contain a list of Anomalies, Changes, and Threats that are prioritized by Severity. Increase awareness and catch security affecting events that traditional approaches miss, including user behavior and misconfigurations.
Replace having a Security Engineer review and analyze logs and data all the time looking for potential security issues. Now they can focus on investigation and remediation.
Weekly Notices Weekly email that lists all changes.
Compact format allows easy viewing of many changes in a single email.
Allows a human to review the changes for possible anomalies and threats that could warrant further investigation.
Compact Format Plain Text email format Works well with mobile environments and email integration to PSAs.
Expanded Format HTML formatted email. Friendly readable format for alerts that includes recommendations and formatting. Ideal for users with email readers.
Sort by ACT then SEVERITY Groups content in Security Alerts by Anomalies, Changes, and Threats first then by Security. Allow easily filtering and getting to issues based on the categorization of the issue.
Sort by SEVERITY then ACT Groups content by Severity Allows users the flexibility to see the higher severity items first.
Recommended Tags A set of tags that are recommended for every Site. Provides guidance to the most popular tags that will give the most benefit in terms of alerting.

TRY IT NOW

Go ahead and add a Detector software appliance to your Network Detective toolkit right now. If you already have a RapidFire Tools account, click here to add Detector to your Network Detective tool set. Otherwise, click here to order Detector online right now.

DETECTOR DIGS DEEP TO FIND SUSPICIOUS INTERNAL SECURITY ISSUES

Discovering security threats from the inside is much harder than identifying and stopping threats from the outside. Perhaps that’s why there are so few tools out there that do it, and why so few MSPs offer internal IT security as a service. All that changes with Detector.

Detector uses proven Network Detective non-invasive scanning technology to dig deep into whatever computer network that it’s attached to, and then digs even deeper into everything that is connected to it, whether physically or virtually.

But it’s not just on a random data-gathering mission. Each time Detector executes a pre-scheduled scan, it’s on the look-out for three classifications of internal security issues: Anomalies, Changes and Threats.

Anomalies are suspicious activities and findings that are out of the ordinary and unexpected and that should be investigated. Examples of anomalies are users logging in at times outside their historical patterns, or a USB drive plugged into a computer that has been tagged as being "locked down."

Changes are recorded variances from previous scans linked to specific aspects of the network environment that could represent a threat. Examples of suspicious changes are a user’s security permission promoted to administrative, or a new device added to the network that wasn’t there before.

Threats are defined as clear and recognizable dangers to the network environment that need fast attention. Examples of threats would be a critical security hole or a machine in the "DMZ" that hasn’t been patched in 30 days.

Every day Detector looks at a broad range of assets and configurations in search of anomalies, changes and threats, including: Wireless Networks, Network Devices, User Behavior, Computers, Printers, DNS entries, Switch Port Connections (Layer 2/3), and Internal Network Vulnerabilities. It also looks at issues specifically for environments subject to HIPAA and PCI compliance.

And, on a weekly basis, it also will notify you of ALL changes in the large categories of: Access Control, Computer Security, Wireless Access, Network Security.

THE SMARTEST INTERNAL IT SECURITY TOOL KEEPS GETTING SMARTER

Detector incorporates a proprietary feature we call "SMART-TAGS" that allows you to fine-tune the tool to adapt to each client’s unique environment.

SMART-TAGS allow you to enrich the detection system by adding information about specific users, assets and settings that helps Detector get "smarter" about what it’s finding. That means more potential threats identified with fewer "false positives."

Here’s an example of some examples of SMART-TAGS at your disposal:

TagApplied to
AUTHORIZED SSIDSSID
GUEST WIRELESS NETWORKIP Range
GUEST NETWORKIP Range
VIRTUAL MACHINEComputer
BUSINESS OWNER PCComputer
BUSINESS OWNERUser
LOCKED DOWNComputer
IT ADMINUser
RESTRICTED IT ADMIN ONLYComputer
RESTRICTED NETWORKIP Range
AUTHORIZED PRINTERPrinter
SINGLE DESKTOP USERUser

Here are some examples of how you might use the SMART-TAGS to fine-tune Detector’s alerts for a particular client:

  • You tag a particular computer as being "RESTRICTED IT ADMIN ONLY". Now when any user logs in that hasn’t been tagged "IT ADMIN", Detector will send an alert.
  • You tag a particular computer as "Locked Down" (meaning don’t allow changes to this computer). If someone manages to install an application on this machine, then Detector will pick it up and let you know. In this way, tagging can remove false positives and increases the relevance of alerts.
  • You tag a specific wireless network as a "GUEST WIRELESS NETWORK" telling Detector it doesn’t need to worry about new devices appearing on it. But if a new device shows up on any non-guest network, then the appearance is significant and Inspector will send you an alert so you can determine if it’s worth looking into.

You can add to, or modify, your SMART-TAGS at any time. That allows you to see what kind of alerts Detector is sending you and create the tags you want to "tweak" the system.

TRY IT NOW

Go ahead and add a Detector software appliance to your Network Detective toolkit right now. If you already have a RapidFire Tools account, click here to add Detector to your Network Detective tool set. Otherwise, click here to order Detector online right now.

DAILY ALERTS AND WEEKLY NOTICES KEEP YOU AHEAD OF ANY INTERNAL THREAT

Detector’s job is to keep you posted of anything going on inside your client’s network that could represent an internal security issue that you should know about.

You set the time for the daily scan and when it finishes, Detector reports back with an email alert sent to any addresses you specify, including your own ticketing system.

The daily alerts aggregate the issues that were detected during the past 24 hours and can be sorted either by the priority/severity (high, medium and low) of the threat, or by the type of issue (threat, anomaly, change).

There are dozens of types of network changes, anomalous end-user behaviors and misconfiguration threats that Detector will catch. Here’s a sample of the categories of alerts -- more are being added all the time.

Category ACT Alert Name
Wireless Threat Unauthorized wireless connection
Access Control Change New profile (Business Owner's computer)
Computers Change Application installed on locked down system
Computers Change Removable drive added to locked down system
Access Control Change Administrative rights granted
Access Control Threat Unauthorized access to IT restricted computer
Access Control Change New device on restricted network
Access Control Threat Unauthorized access to accounting computer
Access Control Threat Unauthorized access to CDE
Access Control Threat Unauthorized access to ePHI
Access Control Change Unauthorized printer on network
Access Control Anomaly Suspicious user logons by single desktop user
Computers Threat Internet restriction not enforced
Computers Threat Critical patches not applied timely on DMZ computer
Computers Threat Critical patches not applied timely
Access Control Change New profile
Access Control Change New user
Access Control Anomaly Unusual logon to computer by user
Access Control Anomaly Unusual logon time by user
Network Security Threat New High Severity Internal Vulnerability
Network Security Threat New Medium Severity Internal Vulnerability
Access Control Change Local User Admin User Added
CLICK HERE TO DOWNLOAD A PDF OF SAMPLE DAILY ALERTS.

The weekly notices are sent on a weekly basis after Detector completes its weekly internal security scan. Even though Detector sends you alerts on a daily basis on any potential threat it finds, once a week it will send you a tight summary of ALL the changes that took place during the prior week.

This gives you a quick at-a-glance summary of the changes that didn’t trigger a security alert but might be worth a quick review.

Changes included in Detector’s weekly report fall into the following objects and categories.

Category Sub-Category
Network Wireless Networks
Network Devices
Domain Users
Computers
Printers
DNS
Switch Port Connections
Local Users
Security New Internal Vulnerability

CLICK HERE TO DOWNLOAD A PDF OF SAMPLE WEEKLY NOTICES.

TRY IT NOW

Go ahead and add a Detector software appliance to your Network Detective toolkit right now. If you already have a RapidFire Tools account, click here to add Detector to your Network Detective tool set. Otherwise, click here to order Detector online right now.

CREATE YOUR OWN VALUE-ADDED SERVICE WITH THIS SPECIAL SOFTWARE APPLIANCE

At just $69/month for this software appliance, and even less if you pre-pay your annual subscription, you can’t afford NOT to get a Detector for each one of your clients.

When you explain to a business owner that the biggest "threat" to the security of the business is actually on the inside of the firewall, you’ll have no trouble selling your new internal IT security service.

Here are some "fun facts" from a recent Forrester study to share with your clients and prospects about internal threats:

  • About 1/3 of all security breaches stem from lost or stolen devices that took too long to discover were missing
  • Another 27% of breaches are caused by inadvertent misuse of data by employees which is often never discovered until well after-the-fact
  • An additional 12% of breaches are caused by malicious insiders, most of whom were never suspected of "being the type."

In all, internal vulnerabilities in some form or another are responsible for a total of 70% of all data breaches.

And if your client questions the value of the service, go ahead and install Detector on his network on a trial basis. It won’t take too many alerts to convince your client of the value of the service you are offering with our tool.

The beauty about this offering is that your cost to deliver it is so low, and the value is so high. Not only will you dramatically improve your clients’ network security, you’ll also gain a more intimate understanding of each client’s network environment. It’s like the difference between having a full time internal security person guarding the fort, and hiring a part-timer to stop by once in a while to check on things.

And don’t forget to offer this service as part of every new business pitch. Your internal IT security service could be the main reason why a potential new client selects you over your competitors.

TRY IT NOW

Go ahead and add a Detector software appliance to your Network Detective toolkit right now. If you already have a RapidFire Tools account, click here to add Detector to your Network Detective tool set. Otherwise, click here to order Detector online right now. You'll have a full month to put the appliance through its paces. If during that time you decide that this product is not for you, just tell us and we'll cancel your subscription and provide you with a 100% refund. You can even return the server (if purchased with your subscription) within 30 days for a full refund less shipping.

Best of all, you can order additional subscriptions and appliances at any time directly from inside the tool, and qualify for exclusive RapidFire Tools customer discounts.

TRY IT NOW

Go ahead and add a Detector software appliance to your Network Detective toolkit right now. If you already have a RapidFire Tools account, click here to add Detector (Link to Customer Log-in Page) to your Network Detective tool set. Otherwise, click here to order (Link to website order page) Detector online right now.

Either way, install Detector on one of your client sites. Set the schedule for when you want it to run. After the first scan is complete, fine-tune your system with Detector’s unique SMART-TAGS feature.

You'll have a full month to put the appliance through its paces. If during that time you decide that this product is not for you, just tell us and we'll cancel your subscription and provide you with a 100% refund. You can even return the server (if purchased with your subscription) within 30 days for a full refund less shipping.

Best of all, you can order additional subscriptions and appliances at any time directly from inside the tool, and qualify for exclusive RapidFire Tools customer discounts.