Logo Logo Logo Logo Logo
  • PRODUCTS
    • Network Detective
      • Overview
      • Microsoft Cloud Assessment
      • Network Assessment
      • Security Assessment
      • Exchange Assessment
      • SQL Server Assessments
      • HIPAA Compliance
      • PCI Compliance
      • Inspector Appliance
      • Reporter Appliance
    • Compliance Manager
    • Cyber Hawk
  • SERVICES
    • Product Onboarding
    • Powered Services Pro
    • Semel Systems
  • SOLUTIONS
    • I want to…
    • Do More With My Resources
    • Offer More Services
    • Keep More Customers
    • Close More Business
  • RESOURCES
  • COMPANY
    • Contact Us
    • About Us
    • Customer Reviews
    • Blog
    • In the News
    • Press Releases
    • Subscription Info
    • Careers
    • Awards
  • REQUEST A DEMO
  • CUSTOMER LOGIN
  • Upcoming Events
  • BUY NOW
  • PRODUCTS
    • Network Detective
      • Overview
      • Microsoft Cloud Assessment
      • Network Assessment
      • Security Assessment
      • Exchange Assessment
      • SQL Server Assessments
      • HIPAA Compliance
      • PCI Compliance
      • Inspector Appliance
      • Reporter Appliance
    • Compliance Manager
    • Cyber Hawk
  • SERVICES
    • Product Onboarding
    • Powered Services Pro
    • Semel Systems
  • SOLUTIONS
    • I want to…
    • Do More With My Resources
    • Offer More Services
    • Keep More Customers
    • Close More Business
  • RESOURCES
  • COMPANY
    • Contact Us
    • About Us
    • Customer Reviews
    • Blog
    • In the News
    • Press Releases
    • Subscription Info
    • Careers
    • Awards
  • REQUEST A DEMO
  • CUSTOMER LOGIN
  • Upcoming Events
  • BUY NOW

Network Detective

IT ASSESSMENTS & REPORTING

CLOUD ASSESSMENTS
Microsoft Cloud
IT ASSESSMENTS
Network Security Exchange SQL Server
COMPLIANCE ASSESSMENTS
HIPAA PCI
ADD-ONS
Inspector Reporter
OVERVIEW

Cyber Hawk

INTERNAL THREAT DETECTION

Detect anomalous activity, suspicious network changes and threats caused by vulnerabilities and misconfigurations.

OVERVIEW

Compliance Manager

COMPLIANCE PROCESS AUTOMATION

Compliance-as-a-Service your customers can trust.

COMPLIANCE STANDARDS
NIST CSF CMMC HIPAA GDPR Cyber Insurance
OVERVIEW
VIEW ADDITIONAL RESOURCES

Looking for more information? Visit the Resources page for videos, eBooks, whitepapers and more!

Cyber Hawk
  • Overview
  • Features
  • Alerting
  • How it Works
  • Request A Demo
Cyber Hawk
  • Overview
  • Features
  • Alerting
  • How it Works
  • Request A Demo

CYBER HAWK

FEATURES

Better Security for Your Clients

Take a closer look at what makes Cyber Hawk so valuable for both you and your clients:

FeatureDescriptionBenefit
Automated Scans with Minimum ConfigurationThe initial configuration is minimal and Cyber Hawk will perform scans virtually out of the gate.Get started immediately with minimum configuration. And, with the Cyber Hawk solution, ongoing adjustments are automatic!
Smart TagsAdds world knowledge that systems without this meta-information could never get.Gets "smarter" as you tag more items. "Learns" over time the customer’s environment. Make information connections to discover issues that robotic systems like RMMs can’t.
Scanning EngineScans user, asset, and configuration data that monitoring systems don’t. Discovers threats that anti-virus/anti-spyware/firewalls don’t.It’s always "on patrol" scanning the network at pre-set scheduled times.
Marketing CollateralDynamically generate Catalogs with any combination of security service plans you pick. Create a professional one-page Plan Comparison Matrix to show your client an at-a-glance summary of plan differences. Use our internal cyber threat brochure to sell your offering.Customized and branded marketing materials are included in this package, helping you sell your new offerings to both existing clients and new prospects.
Pre-built Plans and CatalogsCyber Hawk comes with four levels of pre-configured services plans that are ready for use. Service plan catalogs, plan comparison brochures and more can be immediately printed out with your branding and used to sell.Get started selling as soon as you subscribe.
Service Plan CreatorCyber Hawk gives you the ability to modify the pre-built plans to create unique offerings, or start from scratch building completely unique and customized plans for each of your clients, to meet their needs and budget.Complete flexibility to create unique offerings that will differentiate you from other MSPs.
Daily AlertsTimely (daily) emails that contain a list of Anomalies, Changes, and Threats prioritized by Severity. Alerts include interactive hyperlinks to start the actions to "remediate" "investigate" or "ignore" the alert.Increase awareness and catch security affecting events that traditional approaches miss, including user behavior and misconfigurations. Replace having a Security Engineer review and analyze logs and data all the time looking for potential security issues. Now they can focus on investigation and remediation.
Weekly NoticesWeekly email that lists all changes. Compact format allows easy viewing of many changes in a single email.Allows a human to review the changes for possible anomalies and threats that could warrant further investigation.
Branded Alerts and Cloud PortalUse a custom gateway and use custom "FROM" email addresses. Cyber Hawk also includes branded sub-domain and branded client alert management portal.Works well with mobile environments and email integration to PSAs. Keeps your company brand top-of-mind with clients.
Expanded FormatHTML formatted email.Friendly readable format for alerts that includes recommendations and formatting. Ideal for users with email readers.
Sort by ACT then SEVERITYGroups content in Security Alerts by Anomalies, Changes, and Threats first then by Security.Allow easily filtering and getting to issues based on the categorization of the issue.
Sort by SEVERITY then ACTGroups content by SeverityAllows users the flexibility to see the higher severity items first.
Recommended TagsA set of tags that are recommended for every Site.Provides guidance to the most popular tags that will give the most benefit in terms of alerting.
Direct PSA IntegrationUse the "Action Links" included with Cyber Hawk to turn individual (or grouped) alerts into service tickets inside of Kaseya, Autotask, ConnectWise, or Tigerpaw One.Approve productivity and efficiency by working issues within your PSA of choice.

Create Your Own Cyber Security Offerings

We’ve pre-configured four levels of internal cyber security services so you can begin offering as soon as you purchase your subscription to Cyber Hawk. We’ve also prepared a white paper giving you step-by-step instructions on how to deliver these services, along with a suggested pricing model.

Bronze Level Cyber Security Service

 

Bronze Level is an introductory security service that you can provide to any and all your clients for free to build stickiness.  Our unlimited appliance subscription license makes this possible.  The Bronze plan directs alerts to your client, like anomalous login activity, so there’s no ongoing costs to you.  When internal threats start showing up, your client will be glad to pay you extra to investigate and remediate.

Silver Level Cyber Security Service

 

Add Silver Level service to your baseline MSP contract, helping you differentiate yourself from the competition.  This level of security scans looks for network misconfigurations and unauthorized hardware and software changes.

Gold Level Comprehensive Internal Cyber Security Service

 

Gold Level provides an important upsell opportunity, and defines a level of service that you should be providing to your more important clients. The built-in configurations for this service plan cover a more comprehensive set of scans,  including internal vulnerabilities scans.

Platinum Level Cyber Security Service

 

Platinum Level offers top end internal cyber security services to those clients with highly sensitive data and mandatory compliance reporting including covered entities in the healthcare field, any client involved with financial services, with an e-commerce site, retail operation, or where financial transactions pass through the organization’s networks.

LET US SHOW YOU HOW IT WORKS!

Ready to buy now? Click on the Buy Now button. Need to know more? Request a demo and we’ll show you how it works.

BUY NOWREQUEST DEMO
RapidFire Tools - A Kaseya Company

follow us

BUY NOW
Company Information

RapidFire Tools, Inc.
1117 Perimeter Center West
Suite E-101
Atlanta, GA 30338
678.323.1300

Network Detective
  • Overview
  • Products
  • How It Works
IT Assessment Modules
  • Network
  • Security
  • SQL Server
  • Exchange
CLOUD ASSESSMENT MODULES
  • Microsoft Cloud
Compliance Modules
  • HIPAA
  • PCI
NETWORK DETECTIVE ADD-ONS
  • Inspector
  • Reporter
SECURITY & COMPLIANCE
  • Compliance Manager
  • Cyber Hawk
Company Links
  • About Us
  • In the News
  • Blog
  • Customer Reviews
  • Press Releases
  • Copyright © 2021 RapidFire Tools, Inc. All rights reserved.
  • |
  • Home
  • |
  • Legal
  • |
  • Privacy
  • |
  • Data Usage