Our Tools Give You
X-RAY IT VISION.

Our Ongoing Committment To Innovation

As part of the growing Kaseya family of companies, RapidFire Tools continues to deliver innovative features that give IT professionals more visibility into their network environments. Take a peek at some of our latest new features:

    • VulScan Custom Scan Profiles

      Target specific TCP and/or UDP ports, IP ranges, and other critical parameters to refine your vulnerability scans

    • Network Detective Pro Discovery Agents

      Install enhanced data collection agents directly onto any workstation or server, including Work-From-Home machines.

    • Workflow Integrated Infographic Reports

      Pull data directly from VulScan and Compliance Manager GRC to generate executive summary reports in Network Detective Pro.

    • VulScan CVE ID Filter

      Quickly search VulScan search results for specific vulnerabilities and use CVE IDs to refine your exclusion rules

    • Network Detective Pro + AWS Cloud Assessments

      Automated AWS Infrastructure discovery and reporting made easy. 

    • Network Detective Pro Online Dashboard

      Get an at-a-glance update on the risks and issues of every site from anywhere with the Network Detective Pro online dashboard. 

    • VulScan Discovery Agents

      Install vulnerability discovery agents directly onto any workstation or server, including Workgroups and Work-From-Home machines.  

networkpro-homepage
IT Assessments & Reporting

Discover & Report IT issues Before they become big problems

  • Automatically collect data from every device
  • Prioritize remediation based on objective risk scores
  • Generate reports and presentations at the push of a button
  • Trouble-shoot issues faster
insp2

Identify IT vulnerabilities before the hackers do

  • Schedule automated scans for ongoing protection
  • Prioritize remediation using severity-based alerts
  • Respond faster with built-in technical guidance
  • Reduce risk with every scan
insp2
IT Assessments & Reporting
hawk
Change & Internal Threat Detection
hawk

Detect Changes and Anomalous Activity Before They Take You Down

  • Catch unauthorized log-in attempts
  • Track suspicious changes to network settings
  • Discover accidental misconfigurations that create risk
  • Identify anomalous user behavior

Stay compliant with any IT security requirement

  • Manage and automate compliance for any standard
  • Simplify IT policy manual creation and tracking
  • Identify risk and monitor corrective actions
  • Engage end-users the compliance process
  • Efficiently manage third-party vendor risk
audit2
Compliance Process Management

Network Detective is one of the best tools we have. We use it for a quick evaluation before any proposal goes out. It is fantastic.

Wes Boggs, Lseven Solutions

It gives me the upper hand when I walk in the door especially if I am bidding against other firms.

Kurt Bullock, President, Bridge Technology Group

Network Detective helps us better service existing clients as we run the reports quarterly and the information gathered is invaluable.

Mike Hawort, Binatech System Solutions

I ran Network Detective and was able to map out their network. Guess who their provider is now? We are!

Alex Rodrigues, On Time Technology Solutions

With Network Detective I am able to go in and offer a free network audit with no strings attached and the customers love it.

Michael Edde, Alpha and Omega Computer