DEEP-DIVE ANALYTICS AND REPORTING FOR ADDED NETWORK AND SECURITY EXPERTISE
You already have Network Detective from Continuum, so adding Inspector to your arsenal is going to be a snap, and will arm you with a powerful new tool that takes your IT assessments to a whole new level.
If you'd like to separate yourself from other MSPs and gain even greater insight into your client's network, you need Inspector for "deep dive" analysis and reporting. Inspector is an optional "add-on" appliance that can be delivered as downloadable software or as a pre-configured, ready to use, small-form physical server. With Inspector you can generate a set of reports and diagrams that add layer 2/3 discovery, internal vulnerabilities scans, and anomalous user login activity.
Completely visualize how everything is connected with layer 2/3 insight! Start with a high-level report that shows a Layer 2/3 diagram and mapping with section blow-ups that list all major network devices, and segmented diagrams of connected devices. Detailed information includes which operating systems and device types were found along with other accurate information on network devices. Links to connected computers, printers, and other devices show connectivity down to the actual switch ports. Want even more? How about Excel output and Visio versions of the layer 2/3 diagrams that can be fully manipulated (notes and links are maintained as you drag around the nodes)!
While our External Vulnerabilities reports (in the Security Assessment module) looks for security issues in your network firewalls where malicious outsiders can break in and attack your network, the Internal Vulnerability scan operates behind the business firewalls to identify and expose real and potential vulnerabilities inside the network. Inspector delivers a set of reports designed to prioritize and measure issues by their CVSS (industry standard for network vulnerabilities scoring) to ensure your technicians can patch the weaknesses and fix the holes quickly and effectively.
Expand your security know-how and easily identify anomalous user logins with a value-add report that methodically analyzes login history from the security event logs. The report uses mathematical modeling and proprietary pattern recognition to highlight potential unauthorized users who log into machines they normally do not access and at times they normally do not log in. This report delivers a security professional focus and pinpoints a manageable set of logins to investigate. The alternative is a time-consuming, manual spot check that often misses the mark and is far less reliable.
Inspector is a software appliance that you purchase through annual subscription, and can either download as a virtual machine or order pre-installed on a plug-n-play small form server.
Similar to our IT Assessment modules, Inspector is licensed through an unlimited use annual subscription. That means you can leave it permanently attached to an important client network and run as many scans and reports as you need, without arbitrary restrictions based on network size, IP range, or number of ports. Or, if you have Inspector installed on a physical device, you can run it on prospect networks or tote it among your existing clients and perform ad hoc deep dive assessments.
Best of all, whether deployed as a virtual machine or a physical appliance -- once you attach it to a client's network and turn it on -- when you get back to your office you'll see the Inspector showing up inside your Network Detective application. It doesn't get any simpler that that!Click here for pricing and to order
Inspector allows you to deliver enhanced IT assessments as-a-service for your clients in two ways: leave the appliance "permanently" connected to a network for automated, scheduled scans and reporting. Or move the Inspector appliance from network to network as a diagnostic tool to produce the valuable reports that comes with Inspector.
If you have clients with higher security concerns, ongoing compliance needs, or with larger networks and bigger staffs, it makes sense to leave an Inspector appliance on-site, continually connected to the client network. This way you can bill each client for the dedicated device and automatically run regular, enhanced reports. Plus, you can schedule and produce valuable change reports that highlight differences in scan results from period to period.
If you have smaller clients who don't need (or can't afford) a dedicated appliance and ongoing service, you can temporarily install the same Inspector appliance at each site when you visit. Then, just run the scans and collect the data for the enhanced reports. When finished, retrieve the box to install at another location – all with just a software appliance subscription. You can even save the configuration settings so the next time you return to do another scan, the set-up is even faster and easier!
Whether you install it at an existing client's network and leave it there for regularly scheduled automated assessments, or take it with you on client visits for ad hoc scans and billable projects, the Inspector appliance will perform "deep dive" analysis and reporting that will take your services to a new level of distinction.
If you already have access to a virtual servers with excess capacity, it might make most sense to just download Inspector and add it as another virtual machine (see specs before ordering).
But another option is to purchase a server from us along with your subscription, and have Inspector pre-installed and ready to go. And, when it arrives, don't be fooled by the small size. The servers we ship with Inspector pack a real punch when it comes to processing speed and large storage capacity – both of which are essential to perform the sophisticated tasks necessary to collect and analyze the mountain of rich data needed for the Layer 2/3 discovery, Internal Vulnerability scans and Login Anomaly reports.
If you already subscribe to one or more of the Network Detective modules, then you're already familiar with the UI and the process of running network scans and generating reports.
The Network Detective application allows you to remotely retrieve the Unique ID for your Inspectors, verify whether or not your Inspectors are online, and also trouble shoot the deployment of your Inspectors in the field. Additionally, the Network Detective application will allow you to perform the following functions, regardless of whether your Inspector is set up as a virtual machine or a physical appliance:
The real value of Inspector is in the amazing reports that you can generate with the unlimited-use subscription that comes with this powerful software appliance. Specifically, here's what you can produce:
If you shop around for hardware or software tools that allow you to generate detailed Layer 2/3 diagrams and produce in-depth Internal Vulnerabilities reports, you'll see that the proprietary reports generated by Inspector are an amazing value. But when you consider the fact that you can automatically brand them as your own, and edit them for further customization, the ROI on this tool is off-the-charts.
Annual subscriptions to Inspector include free and unlimited use of the software appliance. If downloaded and used as a virtual machine, the operating system license is also included. If you decide to purchase a server from us and have your Inspector pre-installed, you own the server, but the software appliance and operating system both are licensed as under annual subscriptions.
Inspector software subscriptions may be purchased as an add-on to existing RapidFire Tools account, or purchased separately (click here for the pricing and order page). As with all RapidFire Tools products, Inspector software appliances are sold with our 100% satisfaction guarantee, and 30-day evaluation period, there's absolutely no risk to you. You have everything to gain and nothing to lose.
Once you install the Inspector on a client network – either as a virtual machine or physical appliance, the rest is a cakewalk. You can command Inspector to automatically scan the network and securely collect the data needed to generate our proprietary internal vulnerabilities report, as well as the full set of Level 2/3 network diagrams and reports. While you can deploy individual Inspectors for each of your client sites for ongoing reporting, all you need is a single Inspector installed as a physical appliance and you'll be able to produce an UNLIMITED number of ad hoc reports, on an unlimited number of prospect and client networks, for a full year by moving the appliance from site to site!
Like all our other Network Detective reports, the Inspector bonus reports take advantage of our enhanced branding features, giving you the ability to control the overall look-and-feel of the reports you generate. With the Enhanced Branding package, you can:
|Internal Network Vulnerabilities Summary Report. This report provides a priority ordered listing of issues by CVSS that allows technicians to prioritize the issues they are working on. It provides an extremely compact view of all issues allow a quick survey of the various issues that were detected in an environment.|
|Internal Vulnerabilities Scan Detail Report. A comprehensive output including security holes and warnings, and informational items from the Inspector's point-of-view. While our External Vulnerabilities Scan Detail Report looks for weaknesses and holes in your network firewalls where malicious outsiders can break in and attack your network, the internal vulnerability scan operates behind the business firewalls to identify and expose real and potential vulnerabilities inside the network.|
|Internal Vulnerability Scan Detail by Issue Report. A more compact version of the Internal Vulnerability Scan Detail report that is organized by issues. Devices that are affected are listed within an issue. This report is useful for technicians that are looking to resolve issues, rather than performing remediation on a particular system.|
|Anomalous Login Report. Expand your security know-how and easily identify anomalous user logins with a value-add report that methodically analyzes login history from the security event logs. The report uses mathematical modeling and proprietary pattern recognition to highlight potential unauthorized users who log into machines they normally do not access and at times they normally do not log in. This report delivers a security professional focus and pinpoints a manageable set of logins to investigate.|
|Layer 2/3 Diagram Report. Completely visualize how everything is connected! This high-level report shows a layer 2/3 diagram and mapping with section blow-ups that list all major network devices, and segmented diagrams of connected devices. Additional information is also provided to identify which operating systems and device types were found.|
|Layer 2/3 Detail Report. Detailed and accurate information on network devices and what's connected to them. Links connected computers, printers, and other devices to the actual switch ports they are connected to.|
|Layer 2/3 Detail Excel Report. The same information as in the Layer 2/3 Detail Report, but in Excel file format. Once in Excel, you'll be able to take the data and import it into your favorite Service Desk or PSA system, or simply create your own custom sorts, analyses, reports and graphs inside of Excel.|
|Layer 2/3 Diagram Image. We provide you with a 10 megapixel PNG image that can be viewed on-screen or printed on a plotter. The image can also be incorporated into other documents or further enhanced with notation.|
Below please find the answers to the most frequently-asked questions that our sales team receives from people interested in Inspector. Check them out, and if you still need additional information before subscribing, feel free to call our sales team directly at 678-323-1300, Ext. 2 or email email@example.com.
Inspector is designed to perform "deep dive" specialized data collection and generate reports that supplement the reports that you get with our other IT assessment and compliance modules. All modules and appliances use non-invasive, non-intrusive scanning techniques to collect data across the network.
The scanners that come with our IT assessment modules typically take less than an hour to run and can be run as self- extracting executables directly from a thumb-drive. However, the "deeper-dive" collection programs with Inspector -- which include layer 2/3 discovery and internal vulnerabilities scans -- can take much longer to run; many hours or even more than a day depending on the size of the network, number of ports to be scanned, etc. In addition, some of the scanners are designed to run in a Linux environment.
To simplify deployment and for improved performance, Inspector is delivered as a virtual appliance that can be easily downloaded and installed on a virtual machine or on a physical appliance. The appliance is then attached to a specific network and left to run over the extended period of time necessary to complete the comprehensive deep dive scans.
Inspector also includes built-in remote scheduling and automated report generation so it often makes sense to leave one permanently attached to client networks requiring more security and management.
No. Inspector is sold as a separate software subscription that includes deep-dive internal vulnerabilities scans and detailed Layer 2/3 discovery and diagrams. These reports are not available through our other IT assessment modules.
Some service providers purchase Inspector subscriptions just to get these reports, but the ideal scenario is to use Inspector to SUPPLEMENT your regular assessments by including these reports with the ones that come with the other modules.
No! In fact, you should avoid creating multiple RapidFire Tools accounts. All of the Network Detective components are completely integrated. If you already have Network Detective, you can upgrade your subscription to add one or more Inspectors directly from inside the Network Detective application by clicking on the Upgrade button. Once you upgrade and install your Inspector, you will access and manage each appliance directly from inside the Network Detective application, and the new reports it generates will be added to the relevant report tabs. For example, Layer 2/3 diagrams and related reports will appear with the Network Assessment reports and internal vulnerabilities scans will appear with other Security Assessment reports.
That depends upon the scope of your services for a given client. We do recommend having a dedicated Inspector installed at each of your major client sites so that you can run regular internal vulnerabilities scans and generate new Layer 2/3 diagrams to document any changes to the network. Once attached to a client network, you can remotely schedule and run the Inspector reports, as well as the reports from any other Network Detective module that you subscribe to.
Alternatively, you are free to download Inspector onto a physical appliance (or have us do it for you) and then tote it around to as many of your own client sites as you like, and rotate it around as needed. Each time you set up the appliance at a new site you will need to configure the device for that network. However the system will remember your settings the next time you return.
Yes. If you have larger clients with expansive networks and a lot of employees, the scans will take longer, the file size of the discovered data will be significantly bigger, and you'll want to run your assessments more frequently. Additionally, leaving a dedicated appliance installed at the client site will eliminate the need for you to make special trips to the client site just to do the assessments. You can set up and run the assessments, and collect the resulting data remotely. Last, it's easier to justify having your client pay for the appliance if it's dedicated to their network and part of a service you are delivering around it.
No. Inspector is a downloadable software appliance that you subscribe to. You can optionally install as a virtual machine on an existing remote server or install it on a "local" computer that you tote around from site to site. You can also choose to have Inspector preconfigured on a small form computer from RapidFire Tools and your Inspector will come pre-installed and ready to use. In that case, we own the appliance, like a cable box to a cable TV subscription.
If you subscribed to the hardware from RapidFire Tools, it would be fully covered for any service issue and we would be responsible to repair or replace the unit in the event of a failure.
Like all RapidFire Tools products, Inspector comes with an unconditional 30-day 100% money-back guarantee. If you are not satisfied with the service for any reason, let us know within 30 days and receive a full refund. If your order included a subscription to the hardware, you must also return the unit to us or be charged for its loss. There is no restocking fee. If you do not cancel, at the end of your annual subscription you will have the option to renew. If you do not renew, your software appliance and operating system will cease to function and you must return the hardware to us or be charged for its loss.
Yes! We are committed to expanding the functionality of the Inspector software appliance, and you can expect regular updates and improvements to the appliance itself, as well as updates to the devices and network data that the software can discover plus periodic new reports. These updates will be automatically pushed to all of your appliances that are attached into an active network, whether physical or virtual. We will also notify you about all updates through our monthly RapidFire Tools New & Noteworthy newsletter.
We do not sell the software appliance itself so you cannot resell that, but we encourage you to create and offer new internal network security and reporting services based on the reports generated by the appliance, and sell those services to your clients.
Yes. Our bulk discounting program starts with a minimum order of 50 units. Contact our sales team for pricing.
We offer free shipping and handling with all orders. Standard shipping is via the USPS Express Mail, or UPS Ground. Depending upon your location, you can expect to receive your Inspector appliance pre-installed on the server from us within 2-7 days of your order. You may request expedited delivery by FedEx 2-day or Next-Day air. See our order form for current pricing. When returning a unit to us, you pay for shipping.
Simply send an email to firstname.lastname@example.org with the subject line: Inspector Server Return. Provide us with your RapidFire Tools account number and reason for the return. We will reply with an RMA # and return shipping label for you to print out and use for the return shipping.
To ensure the best experience possible with the delivery of the virtual appliances, we have targeted Hyper-V as the initial platform of choice. Hyper-V is readily available on most Windows Operating Systems starting from Windows 8.1 (on the desktop) and Windows 2012 Server and newer. It's also offered free from Microsoft with their Hyper-V Edition, making it highly accessible. Also, Hyper-V virtual machines are standardized and the platform has the same scripting mechanism to install, which helps to ensure delivery of a high quality product.
We are considering support for a VMware virtual appliance, but due to the realities of multiple variants and platforms ranging from older ESX, to ESXi, to vCenter, to vSphere and the mass number of versions that are deployed, we've decided to make that a future project.
Generating detailed Layer 2/3 diagrams, and producing in-depth Internal Vulnerabilities reports has never been easier! If you purchase a physical server from us with Inspector pre-installed, just plug the Network Detective Inspector appliance into your client's network, run the Inspector Set-Up tool to identify the box and assign it to the client's site in the Network Detective application, create an Assessment to associate the scan, and you're ready to go.
Already have access to a virtual server? You can download the Inspector software appliance and operating system and set it up as a virtual machine attached to your client's network.
See for yourself how easy it is. Watch the 5-minute videos below:
Go ahead and add an Inspector software appliance to your Network Detective toolkit right now. Install the appliance on one of your client sites. Schedule your IT assessment scans. Generate the reports and diagrams. You'll have a full month to put the appliance through its paces. If during that time you decide that this product is not for you, just tell us and we'll cancel your subscription and provide you with a 100% refund. You can even return the server (if purchased with your subscription) within 30 days for a full refund less shipping.
Best of all, you can order additional subscriptions and appliances at any time directly from inside the tool, and qualify for exclusive RapidFire Tools customer discounts.
Download and install on your own virtual machine or order pre-configured as plug-n-play physical appliance.
Deep-dive diagnostic reporting
End-to-end IT Assessment Automation:
Create Your Own Cyber Security Offering:
COMPLIANCE PROCESS AUTOMATION
Compliance-as-a-Service your customers can trust.