HOW IT WORKS

HOW NETWORK DETECTIVE WORKS

Network Detective is not only the most powerful and sophisticated IT assessment tool set available, it’s also incredibly easy-to-use. Perhaps that’s what makes it the #1 diagnostic and reporting product used by MSPs and IT service providers.

All of our products are accessed and controlled through a common software application which is included with your first purchase. Regardless of which software module or appliance that you start with, it’s easy to subscribe to additional Network Detective products and have them immediately available inside the same user-interface.

While each product is designed to support a specialized IT discipline or compliance area, they all work the same way:

Step 1. Run Your Data Collectors. We have built a unique library of proprietary network scanners designed to gather an enormous amount of network, machine and end-user data. Some scanners can be run remotely off of our servers (such as the External Vulnerability Scan). Some (like our IT Assessment Scanners) can be downloaded from our website or run directly off a thumb drive. Some are included on our software appliances that are connected to the client network (like our Internal Vulnerability Scanner). The product(s) you purchase determine which scanners are available for your use. Regardless of which scanners you use, a simple Configuration Wizard will quickly guide you through the process.

Step 2. Collect the Data. You can collect data from any device that’s connected to the network centrally through the Network Scanners. We also provide you with separate device scanners to collect data from stand-alone machines, and machines with different operating systems. You can also collect data manually through on-site observations, interviews, and photographs. Collected data is encrypted and automatically saved to the location you specify.

Step 3. Import the Data. Regardless of the source, you can import all the data gathered at a given site into Network Detective, and the tool automatically assembles and combines everything into a single data set to give you a fully-integrated set of reports.

Step 4. Generate Your Reports. You can preview the results of your scans using a powerful data browser built into Network Detective. The reports you produce depend on the products you subscribe to. Pick an available report and generate it with a single click. Reports are saved in standard MS Office formats, including Word, Excel, and PowerPoint, which you can easily edit. Reports are automatically formatted based upon the templates you chose, and the customized branding elements that you select.

To get a better idea of how this works, check out the video below for a quick demo of how to run one of our products.