Cyber Hawk

WHITE LABEL YOUR VERY OWN CYBER SECURITY OFFERING

MANAGED SECURITY SERVICES ARE GROWING 400% TO $30B IN 2020. WHAT ARE YOU WAITING FOR?

Security is top of mind for MSPs today because clients demand it! But offering sophisticated security solutions is not easy. They require a substantial investment in multiple technologies and additional hiring of security engineers. A burden most MSPs can't handle. So the average MSP settles for the same common set of security components--Firewall, anti-virus, spam filter. Commodities, providing low-margins and no differentiation.

Did you know that most security vulnerabilities occur inside a business, behind the firewall? In fact, more than 70% of all cyber security incidents today are the result of INTERNAL security issues that no firewall, anti-virus or malware device could have prevented.

What you need is a technology that detects these exploits, is easy to support, and cost effective to roll out. What you need is Cyber Hawk so you can begin offering new, high-value INTERNAL security services to all your clients.

Cyber Hawk is value-packed with everything you need to sell and deliver out-of-the-box cyber security offerings. You get an unlimited-use license to deploy the Cyber Hawk appliance virtual appliance at all of your client sites to scan, detect and alert on security issues (see license terms for details). You'll appreciate the brandable, dynamic built-in marketing material to help you position and sell your new security services with default Service Plans, Product Catalogs, and end-user slide shows. Even a Managed Security Service Agreement. Cyber Hawk integrates to all major PSAs for easy ticket creation too.

A small investment in our Cyber Hawk will yield a huge return in terms of increased revenue, competitive differentiation, and serious peace-of-mind for your clients.

THE ULTIMATE INTERNAL THREAT DETECTION AND ALERTING SOFTWARE

Cyber Hawk is built around our industry-leading Cyber Hawk appliance cyber-threat alerting appliance and comes with a soup-to-nuts blueprint for configuring, selling, and delivering a branded, internal cybersecurity service. With Cyber Hawk, you can do the following:

  1. Generate 20% additional top-line revenue through upsells of new security offerings
  2. Close more business through security service differentiation
  3. Sell unique security services to prospects even when they use another MSP for their managed services
  4. Advertise and promote high-level IT security expertise
  5. Reduce the likelihood of client churn through stickiness for specialized security services

The Cyber Hawk appliance software appliance can be run on either Hyper-V or VMware platforms and is built upon the award-winning scanning technology of our Network Detective IT assessment and compliance assessment modules.

Cyber Hawk appliance is the only software appliance that combines machine learning and intelligent tagging to identify suspicious anomalies, changes and threats to the environment. In addition, Cyber Hawk appliance's powerful analysis engine examines multiple data points and notifies you of security issues caused by unusual user behavior and network misconfigurations.

This low cost software appliance easily attaches to your client's network and is centrally controlled by your Network Detective application. Just think about the value to your client knowing that you are now providing protection against the very real threat of a data breach from the inside.

Click here to learn more about Cyber Hawk appliance's features and benefits.

THE Cyber Hawk appliance FINDS WHAT OTHER SECURITY SYSTEMS MISS

Can your current security tools do this?

  • Catch unauthorized logins or attempts to restricted computers
  • Identify a new user profile suddenly added to the business owner's computer
  • Find an application just installed on a locked down system
  • Get alerted to unauthorized wireless connections to the network
  • Notice that a new user was just granted administrative rights
  • Detect an unusual midnight log-in for the first time by a day-time worker
  • Find sensitive personal data such as credit card numbers, social security numbers and birth dates stored on machines where it doesn’t belong.

These are just a few examples of the dozens of network configuration changes, anomalous end-user behavior and other threats the Cyber Hawk appliance will catch and notify you about via daily email alerts.

Click here to see what else Cyber Hawk appliance will find out.

DYNAMIC DAILY ALERTS TIED TO OUR OWN CLOUD PORTAL

Cyber Hawk appliance prowls an entire network each day (at a time you determine) and then sends out daily email alerts of any suspicious issues it discovers. Each discovered issue listed in the alert is followed by a set of dynamic “Action Links” that are part of an automated process flow to “Remediate,” “Investigate” or “Ignore” the item. Clicking on any of these Action Links will take you to the Network Detective portal where you can review the issue forensics, automatically generate a service ticket in your favorite PSA, or create a new SMART-TAG to ignore the alert and prevent the same “false-positive” from being generated again in the future.

Click here to learn more and see sample alerts and notices.

CREATE YOUR OWN INTERNAL CYBER SECURITY SERVICES WITH Cyber Hawk

We created the Cyber Hawk appliance cyber security alerting appliance for MSPs who want to identify potential cyber threats on their client networks that would otherwise go undetected. But the real money is in taking your MSP offering to the next level by building in a base-line internal cyber security service for every client. The Cyber Hawk subscription includes a license for unlimited Cyber Hawk appliances. This allows you to set up new security services where you can charge for the discovery, investigation and remediation of detected internal threats. You can also upsell your clients into higher value recurring managed security services.

To help you get started, we have created a set of “blueprints” that tell you everything you need to know in order to create three different levels of branded Cyber Security Services. Each blueprint includes the details of what tasks you need to perform, how to perform them, how much time it should take, and even a recommendation on how much you should charge.

And, if that’s not enough, we give you the ability to modify our starter Service Plans, or create your own from scratch, and then automatically generate a “Service Plan Catalog” and Service Plan Matrix sheet to help you sell your new security services.

Click here to learn about creating your own Internal IT Security Service with Cyber Hawk.

TRY IT NOW

Go ahead and order Cyber Hawk to start building your security service portfolio right now. If you already have a RapidFire Tools account, login to your Network Detective application and select the Upgrade button at the top right. Otherwise, click here to order Cyber Hawk online right now. What’s more, you'll have a full month to put the system through its paces. Try creating your own plans, generate your own catalogs and comparison charts, and pitch your clients.  If, during that time, you decide this product is not for you, just tell us and we'll cancel your subscription and provide you a 100% refund.

CREATE YOUR OWN CYBER SECURITY OFFERINGS WITH OUR BUILT-IN SERVICE DELIVERY SYSTEM (SDS)

Everything you need to configure, sell and deliver your own branded internal cyber security services -- across your entire client base -- is here and available now! The Cyber Hawk appliance Service Delivery System (SDS) is an affordable tool that provides you with a license to deploy an UNLIMITED number of Cyber Hawk appliance internal cyber threat alerting appliances, plus everything you need to configure, sell and deliver your own branded internal cyber security offerings.

Click here to download our free Whitepaper.

If that’s not enough, we’ve pre-configured three levels of internal cyber security services that you can immediately begin offering as soon as you purchase your subscription to Cyber Hawk. We've also prepared a whitepaper that give you step-by-step instructions how to deliver these services, and even how much to charge.

Silver Level Standard Internal Cyber Security Service

The Silver level service is designed to be added to your baseline MSP contract so you can really differentiate yourself from the competition. Our unlimited appliance subscription model makes this doable. Setting up the Silver Level service is a snap, and we’ve structured it in such a way as to increase your level of visibility with your clients, with little to no incremental labor. When the internal threats start showing up, your client will be glad to pay you extra to investigate and remediate.

Gold Level Comprehensive Internal Cyber Security Service

The Gold Level Internal Cyber Security Offering is considerably more comprehensive, provides an important upsell opportunity and defines the level of service that you should be providing to your more important clients. The ones that fall in the 80/20 rule – the 20% of your client that are generating 80% of your revenue. The built-in configurations for this service plan cover a more comprehensive set of security issues, and deliver enhanced security including internal vulnerabilities scans.

Platinum Level Premium Internal Cyber Security Service

The Platinum Level Internal Cyber Security Offering offers top end internal cyber security services that you can upsell to those clients whose lines of business deal with highly sensitive data and strict IT compliance requirements. Typically this would be any covered entity in the health care field, any client involved with financial services, and any with an e-commerce site, retail operation, or where financial transactions pass through the organization’s networks.

MORE DETECTION, BETTER PROTECTION. EVERY ONE OF YOUR CLIENTS NEEDS THIS!

When you explain to a business owner that the biggest "threat" to the security of the business is actually on the inside of the firewall, you’ll have no trouble selling your new internal IT security service.

Here are some "fun facts" from a recent Forrester study to share with your clients and prospects about internal threats:

  • About 1/3 of all security breaches stem from lost or stolen devices that took too long to discover were missing.
  • Another 27% of breaches are caused by inadvertent misuse of data by employees which is often never discovered until well after-the-fact.
  • An additional 12% of breaches are caused by malicious insiders, most of whom were never suspected of "being the type."

In all, internal vulnerabilities in some form or another are responsible for a total of 70% of all data breaches.

And if your client questions the value of the service, go ahead and install Cyber Hawk appliance on his network on a trial basis. It won’t take too many alerts to convince your client of the value of the service you are offering with our tool.

The beauty about this offering is that your cost to deliver it is so low, and the value so high. Not only will you dramatically improve your clients’ network security, you’ll also gain a more intimate understanding of each client’s network environment. It’s like the difference between having a full time internal security person guarding the fort, and hiring a part-timer to stop by once in a while to check on things.

And don’t forget to offer this service as part of every new business pitch. Your internal IT security service could be the main reason why a potential new client selects you over your competitors.

TRY IT NOW

Go ahead and order Cyber Hawk to start building your security service portfolio right now. If you already have a RapidFire Tools account, login to your Network Detective application and select the Upgrade button at the top right. Otherwise, click here to order Cyber Hawk online right now.

What's more, you'll have a full month to put the system through its paces. Try creating your own plans, generate your own catalogs and comparison charts, and pitch your clients. If, during that time, you decide this product is not for you, just tell us and we'll cancel your subscription and provide you with a 100% refund.

BETTER SECURITY FOR YOUR CLIENTS. A KEY DIFFERENTIATOR AND REVENUE GENERATOR FOR YOU!

If you want to offer a more comprehensive IT security service to your clients that other MSPs aren’t even talking about, a small monthly investment in Cyber Hawk™ will yield a big return. One Cyber Hawk subscription covers ALL OF YOUR clients, so your ROI is virtually guaranteed.

Traditional security technologies deployed by most MSPs -- including firewalls, anti-malware, and anti-spam filters -- are focused on deterrence and prevention from EXTERNAL threats.

Cyber Hawk is the only software appliance-driven product that closes this gap through a unique combination of machine learning and intelligent tagging to identify suspicious anomalies, changes and threats. Take a closer look at what makes our appliance, and the comprehensive Cyber Hawk solution so valuable for both YOU and your clients:

Feature Description Benefit
Automated Scans with minimum configuration The initial configuration is minimal and the Cyber Hawk appliance will perform scans virtually out of the gate. Get started immediately with minimum configuration. And, with the Cyber Hawk solution, ongoing adjustments are automatic!
Smart Tags Adds the world knowledge that systems without this meta-information could never get. Gets "smarter" as you tag more items in the future. "Learns" over time the customer’s environment.
Make information connections to discover issues that robotic systems like RMMs can’t.
Network Detective Scanning Engine Scans user, asset, and configuration data that monitoring systems don’t.Discovers threats that anti-virus/anti-spyware/firewalls don’t. Get the power of the award winning Network Detective scanning engine that analyzes your network. It’s always "on patrol", scanning the network at pre-set scheduled times.
Marketing Collateral Dynamically generated Service Plan Catalogs can be instantly created including any combination of plans you pick. Create a professional one-page plan comparison matrix to show your client an at-a-glance summary of plan differences. Use our internal cyber threat brochure to sell your offering. Customized and branded marketing materials are included in this package, helping you to sell your new offerings to both existing clients and new prospects.
Pre-built Plans and Catalogs Cyber Hawk comes with three levels of completely configured services plans that are ready for you to deliver as is. Service plan catalogs, plan comparison brochures and more can be immediately printed out with your branding and used to sell. Get started selling as soon as you subscribe.
Service Plan Creator Cyber Hawk gives you the ability to modify the pre-built plans to create unique offerings, or start from scratch building completely unique and customized plans for each of your clients, to meet their needs and budget. Complete flexibility to create unique offerings that will differentiate you from other MSPs.
Daily Alerts Timely (daily) emails that contain a list of Anomalies, Changes, and Threats that are prioritized by Severity. Alerts included with the stand-alone Cyber Hawk appliance are static. Alerts with the Cyber Hawk solution include interactive hyperlinks to start the actions to "remediate" "investigate" or "ignore" the alert. Increase awareness and catch security affecting events that traditional approaches miss, including user behavior and misconfigurations.
Replace having a Security Engineer review and analyze logs and data all the time looking for potential security issues. Now they can focus on investigation and remediation.
Weekly Notices Weekly email that lists all changes.
Compact format allows easy viewing of many changes in a single email.
Allows a human to review the changes for possible anomalies and threats that could warrant further investigation.
Branded alerts and cloud portal Alerts from the stand-alone appliance are sent through our SMTP gateway. With Cyber Hawk, you can use a custom gate and use custom "FROM" email addresses.
Cyber Hawk also includes branded sub-domain and branded client alert management portal.
Works well with mobile environments and email integration to PSAs. Keeps your company brand top-of-mind with clients.
Expanded Format HTML formatted email. Friendly readable format for alerts that includes recommendations and formatting. Ideal for users with email readers.
Sort by ACT then SEVERITY Groups content in Security Alerts by Anomalies, Changes, and Threats first then by Security. Allow easily filtering and getting to issues based on the categorization of the issue.
Sort by SEVERITY then ACT Groups content by Severity Allows users the flexibility to see the higher severity items first.
Recommended Tags A set of tags that are recommended for every Site. Provides guidance to the most popular tags that will give the most benefit in terms of alerting.
Direct PSA Integration Use the "Action Links" included with Cyber Hawk to turn individual (or grouped) alerts into service tickets inside of Autotask, ConnectWise, or Tigerpaw One.  

TRY IT NOW

Go ahead and order Cyber Hawk to start building your security service portfolio right now. If you already have a RapidFire Tools account, login to your Network Detective application and select the Upgrade button at the top right. Otherwise, click here to order Cyber Hawk online right now.

What’s more, you'll have a full month to put the system through its paces. Play around with creating your own plans, generate your own catalogs and comparison charts, and pitch your clients. If, during that time, you decide that this product is not for you, just tell us and we'll cancel your subscription and provide you with a 100% refund.

Cyber Hawk DIGS DEEP TO FIND SUSPICIOUS INTERNAL SECURITY ISSUES

Discovering security threats from the inside is much harder than identifying and stopping threats from the outside. Perhaps that's why there are so few tools out there that do it well, and why so few MSPs offer internal IT security as a service. All that changes with Cyber Hawk.

The Cyber Hawk alerting appliance uses proven Network Detective non-invasive scanning technology to dig deep into whatever computer network that it's attached to, and then digs even deeper into everything that is connected to it, whether physically or virtually. But it's not just on a random data-gathering mission. Each time Cyber Hawk executes a pre-scheduled scan, it's on the look-out for three classifications of internal security issues: Anomalies, Changes and Threats.

Anomalies are suspicious activities and findings that are out of the ordinary and unexpected and that should be investigated. Examples of anomalies are users logging in at times outside their historical patterns, or a USB drive plugged into a computer that has been tagged as being "locked down."

Changes are recorded variances from previous scans linked to specific aspects of the network environment that could represent a threat. Examples of suspicious changes are a user's security permission promoted to administrative, or a new device added to the network that wasn't there before.

Threats are defined as clear and recognizable dangers to the network environment that need fast attention. Examples of threats would be a critical security hole or a machine in the "DMZ" that hasn't been patched in 30 days.

Every day Cyber Hawk looks at a broad range of assets and configurations in search of anomalies, changes and threats including: Wireless Networks, Network Devices, User Behavior, Computers, Printers, DNS entries, Switch Port Connections (Layer 2/3), and Internal Network Vulnerabilities. It also looks at compliance related issues, specifically, for environments subject to HIPAA and PCI.

And, on a weekly basis, Cyber Hawk will notify you of ALL changes in the large categories of: Access Control, Computer Security, Wireless Access, Network Security.

THE SMARTEST INTERNAL IT SECURITY TOOL KEEPS GETTING SMARTER

Cyber Hawk incorporates a proprietary feature we call "SMART-TAGS" that allows you to fine-tune the tool to adapt to each client's unique environment. SMART-TAGS allow you to enrich the detection system by adding information about specific users, assets and settings that helps Cyber Hawk get "smarter" about what it's finding. That means more potential threats identified with fewer "false positives."

Here's an example of some examples of SMART-TAGS at your disposal:

Tag Applied to
AUTHORIZED SSID SSID
GUEST WIRELESS NETWORK IP Range
GUEST NETWORK IP Range
VIRTUAL MACHINE Computer
BUSINESS OWNER PC Computer
BUSINESS OWNER User
LOCKED DOWN Computer
IT ADMIN User
RESTRICTED IT ADMIN ONLY Computer
RESTRICTED NETWORK IP Range
AUTHORIZED PRINTER Printer
SINGLE DESKTOP USER User

Here are some examples of how you might use the SMART-TAGS to fine-tune Cyber Hawk's alerts for a particular client:

  • You tag a particular computer as being "RESTRICTED IT ADMIN ONLY." Now when any user logs in that hasn't been tagged "IT ADMIN", Cyber Hawk will send an alert.
  • You tag a particular computer as "Locked Down" (meaning don't allow changes to this computer). If someone manages to install an application on this machine, then Cyber Hawk will pick it up and let you know. In this way, tagging can remove false positives and increase the relevance of alerts.
  • You tag a specific wireless network as a "GUEST WIRELESS NETWORK" telling Cyber Hawk it doesn't need to worry about new devices appearing on it. But if a new device shows up on any non-guest network, then the appearance is significant and Cyber Hawk will send you an alert so you can determine if it's worth looking into.

You can add to, or modify, your SMART-TAGS at any time. That allows you to see what kind of alerts Cyber Hawk is sending you and create the tags you want to "tweak" the system. And, with the Cyber Hawk solution, whenever you chose to “Ignore” a alert, the system will automatically generate a new SMART-TAG to prevent similar “false positives” from being generated. This is just another way that Cyber Hawk continually streamlines your service delivery.

TRY IT NOW

Go ahead and order Cyber Hawk to start building your security service portfolio right now. If you already have a RapidFire Tools account, login to your Network Detective application and select the Upgrade button at the top right. Otherwise, click here to order Cyber Hawk online right now.

What's more, you'll have a full month to put the system through its paces. Try creating your own plans, generate your own catalogs and comparison charts, and pitch your clients. If, during that time, you decide that this product is not for you, just tell us and we'll cancel your subscription and provide you with a 100% refund.

Want to check out the stand-alone Cyber Hawk appliance?

DAILY ALERTS AND WEEKLY NOTICES KEEP YOU AHEAD OF ANY INTERNAL THREAT

Cyber Hawk's job is to keep you posted of anything going on inside your client's network that could represent an internal security issue that you should know about. You set the time for the daily scan and when it finishes, Cyber Hawk reports back with an email alert sent to any addresses you specify, including your own ticketing system. The daily alerts aggregate the issues that were detected during the past 24 hours and can be sorted either by priority/severity (high, medium and low) of the threat, or by the type of issue (threat, anomaly, change).

There are dozens of types of network changes, anomalous end-user behaviors and misconfiguration threats that Cyber Hawk will catch. Here's a sample of the categories of alerts -- more are being added all the time.

Category ACT Alert Name
Wireless Threat Unauthorized wireless connection
Access Control Change New profile (Business Owner's computer)
Computers Change Application installed on locked down system
Computers Change Removable drive added to locked down system
Access Control Change Administrative rights granted
Access Control Threat Unauthorized access to IT restricted computer
Access Control Change New device on restricted network
Access Control Threat Unauthorized access to accounting computer
Access Control Threat Unauthorized access to CDE
Access Control Threat Unauthorized access to ePHI
Access Control Change Unauthorized printer on network
Access Control Anomaly Suspicious user logons by single desktop user
Computers Threat Internet restriction not enforced
Computers Threat Critical patches not applied timely on DMZ computer
Computers Threat Critical patches not applied timely
Access Control Change New profile
Access Control Change New user
Access Control Anomaly Unusual logon to computer by user
Access Control Anomaly Unusual logon time by user
Network Security Threat New High Severity Internal Vulnerability
Network Security Threat New Medium Severity Internal Vulnerability
Access Control Change Local User Admin User Added
CLICK HERE TO DOWNLOAD A PDF OF SAMPLE DAILY ALERTS.

The weekly notices are sent on a weekly basis after Cyber Hawk completes its internal security scan. Even though Cyber Hawk sends you alerts on a daily basis on any potential threat it finds, once a week it will send you a tight summary of ALL the changes that took place during the prior week. This gives you a quick at-a-glance summary of the changes that didn't trigger a security alert but might be worth a quick review.

Changes included in Cyber Hawk's weekly report fall into the following objects and categories.

Category Sub-Category
Network Wireless Networks
Network Devices
Domain Users
Computers
Printers
DNS
Switch Port Connections
Local Users
Security New Internal Vulnerability

CLICK HERE TO DOWNLOAD A PDF OF SAMPLE WEEKLY NOTICES.

What is the Cyber Hawk?

Cyber Hawk provides an MSP with a built-in blueprint for configuring, selling, and delivering a branded, internal cybersecurity service.  It is built around our centrally managed Cyber Hawk cyber-threat alerting appliance combining machine learning and intelligent tagging to identify anomalous user behavior, suspicious changes, and threats to your customer’s environment. Cyber Hawk's powerful analysis engine examines multiple data points and notifies you via a daily email with a list of security issues. Each discovered issue is followed by a set of dynamic Action Links that form the core of an automated process flow to Remediate, Investigate or Ignore the issue. Clicking the Action Links takes you to the brandable portal where you can review the issue forensics, automatically generate a service ticket in your favorite PSA, create a new SMART-TAG or ignore the alert to prevent the same “false-positive” from being generated again in the future.

What’s included with the Cyber Hawk?

  • Unlimited Cyber Hawk Software Appliance licenses
  • Service Plan Creator
    • Default Plans and Catalogs to match Blueprint
    • Custom Service Catalog creator
    • Plan Matrix
    • Auto-configure Cyber Hawk appliance using Service Plans
  • Branded Client Alert Management Portal
  • Alert Response Workflow
  • PSA Integration
  • Sales & Marketing Collateral
  • Auto generated dynamic Managed Security Services ageement
  • Dedicated Portal Setup and Onboarding

If I return the Cyber Hawk within 30 days, can I get the license fees refunded?

Yes. Like all our products, if Cyber Hawk is returned within 30 days of original purchase, you are entitled to a 100% money back guarantee.

Why should I get Cyber Hawk?

Every MSP client is vulnerable to internal cyber threats, and until now there has been no practical and affordable way for MSPs to offer a service to protect their clients from these threats. With Cyber Hawk, the you can affordably deploy an internal cyber security alerting appliance to all your clients to better manage their internal cyber security. Once in place, Cyber Hawk will pay for itself by:

  1. Identifying issues and providing a mechanism to get authorization for additional work, bringing in more “out of scope” service and project revenue.
  2. Providing a mechanism for upsells to a high value recurring security offering.
  3. Reducing churn through valuable enhanced security services.
  4. Reducing operating costs through timely change and drift alerting.
  5. Closing more business through security service differentiation.
  6. Providing built-in marketing and sales collateral needed to close new business and upsell new security services.

TRY IT NOW

Go ahead and add a Cyber Hawk appliance to your Network Detective toolkit right now. If you already have a RapidFire Tools account, login to your Network Detective application and select the Upgrade button at the top right. Otherwise, click here to order Cyber Hawk appliance online right now.

You'll have a full month to put the appliance through its paces. If during that time you decide this product is not for you, just tell us and we'll cancel your subscription and provide you with a 100% refund.