PRODUCTS

CHOOSE YOUR WEAPONS

Network Detective offers a wide range of software tools, each designed to produce a unique set of specialized reports for a different type of IT assessment. The more modules you have, the broader the range of assessments you will be able to perform, and the more opportunities you will have to build out and support your IT service portfolio. We also offer specialized software appliances that will take your IT assessments to the next level.

Network Assessment Module

Comes with a complete set of reports that touches on the broadest range of systems, network assets, settings, configuration, installed applications and endpoint security. It also includes a an Active Directory site diagram, and detailed information in an Excel format that you can manipulate or integrate into your PSA. More

Security Assessment Module

Includes a full set of security reports that focus on network and user-related security risks, and is designed to allow you to offer a basic Managed Security Service to all of your clients. This report reveals which users have access to what systems, and what systems are configured with what permissions. This module also includes a powerful, integrated external vulnerabilities scan. More

Exchange Assessment Module

Is a unique IT assessment tool with both specialized and generalized applications. Because it includes a comprehensive scan of the entire MS Exchange or Office 365 platform, it’s a great tool for pre-Exchange migration documentation and post migration validation. But it’s also a great everyday Exchange management tool that will aid you in supporting your clients who are running MS Exchange. More

SQL Server Assessment Module

Gives you the tools you need to properly manage the networks that have applications running on SQL Server, including SharePoint. The tool is easy enough to use that non-DBA techs can quickly and easily run the scan and generate all the reports needed for maintaining and reporting the status of any SQL Server database. Yet the information delivered in the reports is powerful enough to give even the most savvy Database Administrator insights to assess potential threats and gauge the overall health of the databases BEFORE something critical goes wrong. More

HIPAA Compliance Module

Is the first purpose-built IT tool to combine automated collection of network data with information collected through observations, photographs and surveys. It's also the only software that gives you a repository to safely and securely collect all the data, and a built-in HIPAA risk assessment engine that automatically generates the official documents that comprise a comprehensive HIPAA IT assessment including a Risk Analysis, Management Plan, and Evidence of Compliance. More

PCI Compliance Module

Has broad business market opportunity and should be used at any network where your clients accept credit cards – including retailers, online merchants, and mail order companies. Similar in approach to the HIPAA Compliance Module, the PCI tool combines automated collection of network data with information collected through observations, photographs and surveys. It also automatically generates the official documents that comprise a comprehensive PCI data security assessment. In most cases, you will want to use Inspector (see below) to perform the Internal Vulnerabilities Scan and the Layer 2/3 Network Diagram, which are a mandatory requirement of PCI. More

INSPECTOR™ SOFTWARE APPLIANCE

Inspector performs "deep-dive" diagnostics including layer 2/3 network discovery, login anomaly detection, and internal vulnerability scans. Scans are downloaded into Network Detective where you can generate the specialized reports. The software appliance can be downloaded after purchase and installed in a Hyper-V environment, or purchased pre-installed on a small-form server. More

DETECTOR™ SOFTWARE APPLIANCE

Traditional security technologies including firewalls, anti-malware, and anti-spam filters are focused on deterrence and prevention from external causes, even though 70% of security problems originate from internal sources. Detector is the only software appliance that closes this gap through a unique combination of machine learning and intelligent tagging to identify suspicious Anomalies, Changes and Threats (ACT). More

REPORTER™ SOFTWARE APPLIANCE

Fully automated remote scheduling of Network Detective scans & reports, Reporter is your ticket to increased productivity through pre-scheduled data collection, and automatic generation of your IT Assessment reports. Not only does Reporter automate the generation of all your Network Detective reports, it also automatically delivers your reports via email to anyone on your distribution list. It’s like having a skilled admin on staff dedicated to creating reports for you and your clients. More