Inspector

DEEP-DIVE SCANS PRODUCE SPECIAL REPORTS FOR ADDED NETWORK & SECURITY EXPERTISE

TAKE YOUR IT ASSESSMENTS TO A NEW LEVEL AT A PRICE YOU CAN AFFORD

If you’d like to separate yourself from other MSPs and gain even greater insight into your client’s network, you need Inspector for "deep dive" analysis and reporting. Inspector is an optional "add-on" appliance that can be delivered as downloadable software or as a pre-configured, ready to use, small-form physical server. With Inspector you can generate a set of reports and diagrams that add layer 2/3 discovery, internal vulnerabilities scans, and anomalous user login activity.

Completely visualize how everything is connected with layer 2/3 insight! Start with a high-level report that shows a Layer 2/3 diagram and mapping with section blow-ups that list all major network devices, and segmented diagrams of connected devices. Detailed information includes which operating systems and device types were found along with other accurate information on network devices. Links to connected computers, printers, and other devices show connectivity down to the actual switch ports. Want even more? How about Excel output and Visio versions of the layer 2/3 diagrams that can be fully manipulated (notes and links are maintained as you drag around the nodes)!

While our External Vulnerabilities reports (in the Security Assessment module) looks for security issues in your network firewalls where malicious outsiders can break in and attack your network, the Internal Vulnerability scan operates behind the business firewalls to identify and expose real and potential vulnerabilities inside the network. Inspector delivers a set of reports designed to prioritize and measure issues by their CVSS (industry standard for network vulnerabilities scoring) to ensure your technicians can patch the weaknesses and fix the holes quickly and effectively.

Expand your security know-how and easily identify anomalous user logins with a value-add report that methodically analyzes login history from the security event logs.  The report uses mathematical modeling and proprietary pattern recognition to highlight potential unauthorized users who log into machines they normally do not access and at times they normally do not log in. This report delivers a security professional focus and pinpoints a manageable set of logins to investigate. The alternative is a time-consuming, manual spot check that often misses the mark and is far less reliable.

CHOOSE PLUG-N-PLAY OR DOWNLOADABLE SOFTWARE

Inspector is a software appliance that you purchase through annual subscription, and can either download as a virtual machine or order pre-installed on a plug-n-play small form server.

Similar to our IT Assessment modules, Inspector is licensed through an unlimited use annual subscription. That means you can leave it permanently attached to an important client network and run as many scans and reports as you need, without arbitrary restrictions based on network size, IP range, or number of ports. Or, if you have Inspector installed on a physical device, you can run it on prospect networks or tote it among your existing clients and perform ad hoc deep dive assessments.

Best of all, whether deployed as a virtual machine or a physical appliance -- once you attach it to a client's network and turn it on -- when you get back to your office you'll see the Inspector showing up inside your Network Detective application. It doesn't get any simpler that that!

Click here for pricing and to order

ON-SITE OR ON-THE-GO

Inspector allows you to deliver enhanced IT assessments as-a-service for your clients in two ways: leave the appliance "permanently" connected to a network for automated, scheduled scans and reporting. Or move the Inspector appliance from network to network as a diagnostic tool to produce the valuable reports that come with Inspector.

If you have clients with higher security concerns, ongoing compliance needs, or with larger networks and bigger staffs, it makes sense to leave an Inspector appliance on-site, continually connected to the client network. This way you can bill each client for the dedicated device and automatically run regular, enhanced reports. Plus, you can schedule and produce valuable change reports that highlight differences in scan results from period to period.

If you have smaller clients who don’t need (or can’t afford) a dedicated appliance and ongoing service, you can temporarily install the same Inspector appliance at each site when you visit. Then, just run the scans and collect the data for the enhanced reports. When finished, retrieve the box to install at another location – all with just a software appliance subscription. You can even save the configuration settings so the next time you return to do another scan, the set-up is even faster and easier!

Whether you install it at an existing client’s network and leave it there for regularly scheduled automated assessments, or take it with you on client visits for ad hoc scans and billable projects, the Inspector appliance will perform “deep dive” analysis and reporting that will take your services to a new level of distinction.

OPTIONAL "SMALL BUT MIGHTY" SERVER

If you already have access to a virtual servers with excess capacity, it might make most sense to just download Inspector and add it as another virtual machine (see specs before ordering).

But another option is to purchase a server from us along with your subscription, and have Inspector pre-installed and ready to go. And, when it arrives, don’t be fooled by the small size. The servers we ship with Inspector pack a real punch when it comes to processing speed and large storage capacity – both of which are essential to perform the sophisticated tasks necessary to collect and analyze the mountain of rich data needed for the Layer 2/3 discovery, Internal Vulnerability scans and Login Anomaly reports.

WORKS SEAMLESSLY WITH THE NETWORK DETECTIVE APPLICATION

If you already subscribe to one or more of the Network Detective modules, then you’re already familiar with the UI and the process of running network scans and generating reports.

The Network Detective application allows you to remotely retrieve the Unique ID for your Inspectors, verify whether or not your Inspectors are online, and also trouble shoot the deployment of your Inspectors in the field. Additionally, the Network Detective application will allow you to perform the following functions, regardless of whether your Inspector is set up as a virtual machine or a physical appliance:

  • Associate an Inspector to a specific client Site
  • Re-assign an Inspector to a different client Site
  • Create tasks for the Inspector to perform
  • Create your own task library for each specific Inspector appliance
  • Queue the tasks to run on an Inspector appliance
  • Download scans from Inspector to a Network Detective application anywhere in the world
  • View the status of all Inspectors for a given account. For each Inspector, you can:
    • See what tasks are running
    • Check whether the appliance software is up-to-date
    • Initiate a command to have the Inspector update itself

Click here to learn more about our non-invasive IT assessment solutions.

THE AMAZING INSPECTOR REPORTS

The real value of Inspector is in the amazing reports that you can generate with the unlimited-use subscription that comes with this powerful software appliance. Specifically, here’s what you can produce:

  • Layer 2/3 Reports
    • Layer 2/3 Diagram Report – Network diagram broken into quadrants
    • Layer 2/3 Detail Report – documents network connectivity by switches
    • Layer 2/3 Detail Excel Export – Excel version of the Layer 2/3 Detail Report
    • Layer 2/3 Diagram JPEG – full diagram of network connectivity of routers, switches, and end-points (severs, workstations, printers)
  • Internal Vulnerabilities Scan
    • Open Ports and Protocol Vulnerability that would be exploited ONCE a hacker is in your network – or by employees. INSIDE attacking INSIDE. This complements the external vulnerability scan performed with our Security Assessment module, which finds weaknesses at the network “edge” that could be exploited by external sources.
  • Anomalous User Login Activity
    • This report methodically analyzes login history from the security event logs using mathematical modeling and proprietary pattern recognition to highlight potential unauthorized users who log into machines they normally do not access and at times they normally do not log in.

Click here to view and download sample reports.

WHY PAY THOUSANDS MORE?

If you shop around for hardware or software tools that allow you to generate detailed Layer 2/3 diagrams and produce in-depth Internal Vulnerabilities reports, you’ll see that the proprietary reports generated by Inspector are an amazing value. But when you consider the fact that you can automatically brand them as your own, and edit them for further customization, the ROI on this tool is off-the-charts.

Click here to watch a quick demo.

TRY IT NOW

Annual subscriptions to Inspector include free and unlimited use of the software appliance. If downloaded and used as a virtual machine, the operating system license is also included. If you choose to have your Inspector software appliance pre-installed on a small form computer, we own the hardware and are responsible for repair or replacement of the equipment, if needed.

Inspector software subscriptions may be purchased as an add-on to existing RapidFire Tools account, or purchased separately (click here for the pricing and order page). As with all RapidFire Tools products, Inspector software appliances are sold with our 100% satisfaction guarantee, and 30-day evaluation period, there's absolutely no risk to you. You have everything to gain and nothing to lose.

OUR REPORTS & DIAGRAMS SELL YOUR SERVICES!

Once you install the Inspector on a client network – either as a virtual machine or physical appliance, the rest is a cakewalk. You can command Inspector to automatically scan the network and securely collect the data needed to generate our proprietary internal vulnerabilities report, as well as the full set of Level 2/3 network diagrams and reports. While you can deploy individual Inspectors for each of your client sites for ongoing reporting, all you need is a single Inspector installed as a physical appliance and you'll be able to produce an UNLIMITED number of ad hoc reports, on an unlimited number of prospect and client networks, for a full year by moving the appliance from site to site!

MAKE OUR REPORTS YOUR REPORTS

Like all our other Network Detective reports, the Inspector bonus reports take advantage of our enhanced branding features, giving you the ability to control the overall look-and-feel of the reports you generate. With the Enhanced Branding package, you can:

  • Personalize the reports with your company name and logo
  • Change the accent colors to match your own company standards
  • Select from a number of pre-designed report templates
  • Embellish your reports with photos and images from our pre-screened, royalty-free library

SAMPLE BONUS REPORTS AND DIAGRAMS YOU GET:

Internal Network Vulnerabilities Summary Report. This report provides a priority ordered listing of issues by CVSS that allows technicians to prioritize the issues they are working on. It provides an extremely compact view of all issues allow a quick survey of the various issues that were detected in an environment.
Internal Vulnerabilities Scan Detail Report. A comprehensive output including security holes and warnings, and informational items from the Inspector's point-of-view. While our External Vulnerabilities Scan Detail Report looks for weaknesses and holes in your network firewalls where malicious outsiders can break in and attack your network, the internal vulnerability scan operates behind the business firewalls to identify and expose real and potential vulnerabilities inside the network.
Internal Vulnerability Scan Detail by Issue Report. A more compact version of the Internal Vulnerability Scan Detail report that is organized by issues. Devices that are affected are listed within an issue. This report is useful for technicians that are looking to resolve issues, rather than performing remediation on a particular system.
Anomalous Login Report. Expand your security know-how and easily identify anomalous user logins with a value-add report that methodically analyzes login history from the security event logs. The report uses mathematical modeling and proprietary pattern recognition to highlight potential unauthorized users who log into machines they normally do not access and at times they normally do not log in. This report delivers a security professional focus and pinpoints a manageable set of logins to investigate.
Layer 2/3 Diagram Report. Completely visualize how everything is connected! This high-level report shows a layer 2/3 diagram and mapping with section blow-ups that list all major network devices, and segmented diagrams of connected devices. Additional information is also provided to identify which operating systems and device types were found.
Layer 2/3 Detail Report. Detailed and accurate information on network devices and what's connected to them. Links connected computers, printers, and other devices to the actual switch ports they are connected to.
Layer 2/3 Detail Excel Report. The same information as in the Layer 2/3 Detail Report, but in Excel file format. Once in Excel, you'll be able to take the data and import it into your favorite Service Desk or PSA system, or simply create your own custom sorts, analyses, reports and graphs inside of Excel.
Layer 2/3 Diagram Image. We provide you with a 10 megapixel PNG image that can be viewed on-screen or printed on a plotter. The image can also be incorporated into other documents or further enhanced with notation.

ANSWERS TO ADDITIONAL QUESTIONS YOU MAY HAVE

Below please find the answers to the most frequently-asked questions that our sales team receives from people interested in Inspector. Check them out, and if you still need additional information before subscribing, feel free to call our sales team directly at 678-323-1300, Ext. 2 or email sales@rapidfiretools.com.

HOW DOES INSPECTOR DIFFER FROM THE OTHER NETWORK DETECTIVE MODULES?

Inspector is designed to perform “deep dive” specialized data collection and generate reports that supplement the reports that you get with our other IT assessment and compliance modules. All modules and appliances use non-invasive, non-intrusive scanning techniques to collect data across the network.

The scanners that come with our IT assessment modules typically take less than an hour to run and can be run as self- extracting executables directly from a thumb-drive. However, the “deeper-dive” collection programs with Inspector -- which include layer 2/3 discovery and internal vulnerabilities scans -- can take much longer to run; many hours or even more than a day depending on the size of the network, number of ports to be scanned, etc. In addition, some of the scanners are designed to run in a Linux environment.

To simplify deployment and for improved performance, Inspector is delivered as a virtual appliance that can be easily downloaded and installed on a virtual machine or on a physical appliance. The appliance is then attached to a specific network and left to run over the extended period of time necessary to complete the comprehensive deep dive scans.

Inspector also includes built-in remote scheduling and automated report generation so it often makes sense to leave one permanently attached to client networks requiring more security and management.

IF I WANT INSPECTOR, DO I STILL NEED THE OTHER NETWORK DETECTIVE MODULES?

No. Inspector is sold as a separate software subscription that includes deep-dive internal vulnerabilities scans and detailed Layer 2/3 discovery and diagrams. These reports are not available through our other IT assessment modules.

Some service providers purchase Inspector subscriptions just to get these reports, but the ideal scenario is to use Inspector to SUPPLEMENT your regular assessments by including these reports with the ones that come with the other modules.

IF I ALREADY HAVE NETWORK DETECTIVE AND SUBSCRIBE TO INSPECTOR, DO I NEED A SEPARATE RAPIDFIRE TOOLS ACCOUNT AND SEPARATE NETWORK DETECTIVE SOFTWARE APPLICATION?

No! In fact, you should avoid creating multiple RapidFire Tools accounts. All of the Network Detective components are completely integrated. If you already have Network Detective, you can upgrade your subscription to add one or more Inspectors directly from inside the Network Detective application by clicking on the Upgrade button. Once you upgrade and install your Inspector, you will access and manage each appliance directly from inside the Network Detective application, and the new reports it generates will be added to the relevant report tabs. For example, Layer 2/3 diagrams and related reports will appear with the Network Assessment reports and internal vulnerabilities scans will appear with other Security Assessment reports.

DO I NEED A SEPARATE INSPECTOR APPLIANCE FOR EVERY CLIENT?

That depends upon the scope of your services for a given client. We do recommend having a dedicated Inspector installed at each of your major client sites so that you can run regular internal vulnerabilities scans and generate new Layer 2/3 diagrams to document any changes to the network. Once attached to a client network, you can remotely schedule and run the Inspector reports, as well as the reports from any other Network Detective module that you subscribe to.

Alternatively, you are free to download Inspector onto a physical appliance (or have us do it for you) and then tote it around to as many of your own client sites as you like, and rotate it around as needed. Each time you set up the appliance at a new site you will need to configure the device for that network. However the system will remember your settings the next time you return.

IS THERE ANY REASON WHY I WOULD NEED MULTIPLE INSPECTORS?

Yes. If you have larger clients with expansive networks and a lot of employees, the scans will take longer, the file size of the discovered data will be significantly bigger, and you’ll want to run your assessments more frequently. Additionally, leaving a dedicated appliance installed at the client site will eliminate the need for you to make special trips to the client site just to do the assessments. You can set up and run the assessments, and collect the resulting data remotely. Last, it’s easier to justify having your client pay for the appliance if it’s dedicated to their network and part of a service you are delivering around it.

WHEN I PLACE THE ORDER, AM I BUYING THE PHYSICAL APPLIANCE?

No. Inspector is a downloadable software appliance that you subscribe to. You can optionally install as a virtual machine on an existing remote server or install it on a "local" computer that you tote around from site to site. You can also choose to have Inspector preconfigured on a small form computer from RapidFire Tools and your Inspector will come pre-installed and ready to use. In that case, we own the appliance, like a cable box to a cable TV subscription.

WHAT HAPPENS IF SOMETHING GOES WRONG WITH THE BOX ITSELF?

If you subscribed to the hardware from RapidFire Tools, it would be fully covered for any service issue and we would be responsible to repair or replace the unit in the event of a failure.

WHAT HAPPENS WHEN MY SUBSCRIPTION ENDS, OR IF I DECIDE TO CANCEL?

Like all RapidFire Tools products, Inspector comes with an unconditional 30-day 100% money-back guarantee. If you are not satisfied with the service for any reason, let us know within 30 days and receive a full refund. If your order included a subscription to the hardware, you must also return the unit to us or be charged for its loss. There is no restocking fee. If you do not cancel, at the end of your annual subscription you will have the option to renew. If you do not renew, your software appliance and operating system will cease to function and you must return the hardware to us or be charged for its loss.

DOES MY SUBSCRIPTION INCLUDE FREE SOFTWARE UPDATES?

Yes! We are committed to expanding the functionality of the Inspector software appliance, and you can expect regular updates and improvements to the appliance itself, as well as updates to the devices and network data that the software can discover plus periodic new reports. These updates will be automatically pushed to all of your appliances that are attached into an active network, whether physical or virtual. We will also notify you about all updates through our monthly RapidFire Tools New & Noteworthy newsletter.

CAN I RESELL NETWORK DETECTIVE INSPECTOR?

We do not sell the software appliance itself so you cannot resell that, but we encourage you to create and offer new internal network security and reporting services based on the reports generated by the appliance, and sell those services to your clients.

IS THERE A VOLUME DISCOUNT AVAILABLE FOR INSPECTOR?

Yes. Our bulk discounting program starts with a minimum order of 50 units. Contact our sales team for pricing.

WHO PAYS FOR SHIPPING IF I WANT A PHYSICAL APPLIANCE AND HOW LONG WILL IT TAKE TO GET IT?

We offer free shipping and handling with all orders. Standard shipping is via the USPS Express Mail, or UPS Ground. Depending upon your location, you can expect to receive your Inspector appliance pre-installed on the server from us within 2-7 days of your order. You may request expedited delivery by FedEx 2-day or Next-Day air. See our order form for current pricing. When returning a unit to us, you pay for shipping.

HOW DO I SET UP A RETURN OF THE INSPECTOR SERVER I PURCHASE FROM YOU?

Simply send an email to support@rapidfiretools.com with the subject line: Inspector Server Return. Provide us with your RapidFire Tools account number and reason for the return. We will reply with an RMA # and return shipping label for you to print out and use for the return shipping.

WHAT VIRTUAL MACHINES DOES INSPECTOR WORK ON?

To ensure the best experience possible with the delivery of the virtual appliances, we have targeted Hyper-V as the initial platform of choice.  Hyper-V is readily available on most Windows Operating Systems starting from Windows 8.1 (on the desktop) and Windows 2012 Server and newer.  It's also offered free from Microsoft with their Hyper-V Edition, making it highly accessible.  Also, Hyper-V virtual machines are standardized and the platform has the same scripting mechanism to install, which helps to ensure delivery of a high quality product.

We are considering support for a VMware virtual appliance, but due to the realities of multiple variants and platforms ranging from older ESX, to ESXi, to vCenter, to vSphere and the mass number of versions that are deployed, we've decided to make that a future project.

HOW IT WORKS

Generating detailed Layer 2/3 diagrams, and producing in-depth Internal Vulnerabilities reports has never been easier! If you purchase a physical server from us with Inspector pre-installed, just plug the Network Detective Inspector appliance into your client’s network, run the Inspector Set-Up tool to identify the box and assign it to the client’s site in the Network Detective application, create an Assessment to associate the scan, and you’re ready to go.

Already have access to a virtual server? You can download the Inspector software appliance and operating system and set it up as a virtual machine attached to your client’s network.

See for yourself how easy it is. Watch the 5-minute videos below:


TRY IT NOW

Go ahead and add an Inspector software appliance to your Network Detective toolkit right now. Install the appliance on one of your client sites. Schedule your IT assessment scans. Generate the reports and diagrams. You'll have a full month to put the appliance through its paces. If during that time you decide that this product is not for you, just tell us and we'll cancel your subscription and provide you with a 100% refund. You can even return the server (if purchased with your subscription) within 30 days for a full refund less shipping.

Best of all, you can order additional subscriptions and appliances at any time directly from inside the tool, and qualify for exclusive RapidFire Tools customer discounts.