Logo Logo Logo Logo Logo
  • PRODUCTS
    • Network Detective
      • Overview
      • Microsoft Cloud Assessment
      • Network Assessment
      • Security Assessment
      • Exchange Assessment
      • SQL Server Assessments
      • HIPAA Compliance
      • PCI Compliance
      • Reporter Appliance
    • Inspector 2
    • Compliance Manager
    • Cyber Hawk
  • SERVICES
    • Product Onboarding
    • Powered Services Pro
    • Semel Systems
  • SOLUTIONS
    • I want to…
    • Do More With My Resources
    • Offer More Services
    • Keep More Customers
    • Close More Business
  • RESOURCES
  • COMPANY
    • Contact Us
    • About Us
    • Customer Reviews
    • Blog
    • In the News
    • Press Releases
    • Subscription Info
    • Careers
    • Awards
  • REQUEST A DEMO
  • CUSTOMER LOGIN
  • Upcoming Events
  • BUY NOW
  • CUSTOMER LOGIN
  • UPCOMING EVENTS
  • PRODUCTS
    • Network Detective
      • Overview
      • Microsoft Cloud Assessment
      • Network Assessment
      • Security Assessment
      • Exchange Assessment
      • SQL Server Assessments
      • HIPAA Compliance
      • PCI Compliance
      • Reporter Appliance
    • Inspector 2
    • Compliance Manager
    • Cyber Hawk
  • SERVICES
    • Product Onboarding
    • Powered Services Pro
    • Semel Systems
  • SOLUTIONS
    • I want to…
    • Do More With My Resources
    • Offer More Services
    • Keep More Customers
    • Close More Business
  • RESOURCES
  • COMPANY
    • Contact Us
    • About Us
    • Customer Reviews
    • Blog
    • In the News
    • Press Releases
    • Subscription Info
    • Careers
    • Awards
  • REQUEST A DEMO
  • CUSTOMER LOGIN
  • Upcoming Events
  • BUY NOW

Network Detective

IT ASSESSMENTS & REPORTING

CLOUD ASSESSMENTS
Microsoft Cloud
IT ASSESSMENTS
Network Security Exchange SQL Server
COMPLIANCE ASSESSMENTS
HIPAA PCI
ADD-ONS
Reporter
OVERVIEW

Inspector 2

IV SCANNING AND REPORTING

Internal vulnerability scanning for the rest of us! Complete scans. Automated reports. Priced to scale.

OVERVIEW

Cyber Hawk

INTERNAL THREAT DETECTION

Detect anomalous activity, suspicious network changes and threats caused by vulnerabilities and misconfigurations.

OVERVIEW

Compliance Manager

COMPLIANCE PROCESS AUTOMATION

Compliance-as-a-Service your customers can trust.

COMPLIANCE STANDARDS
NIST CSF CMMC HIPAA GDPR Cyber Insurance
OVERVIEW
inspector2-logo
Inspector 2
  • Overview
  • Reports
  • How It Works
  • IVS For MSPs
  • Survey Results
  • Request A Demo
inspector2-logo
Inspector 2
  • Overview
  • Reports
  • How It Works
  • IVS For MSPs
  • Survey Results
  • Request A Demo

INSPECTOR 2

Internal Vulnerability Scanning & Reporting

Our Reports Help You Prioritize AND Remediate The Risks

One of the challenges of internal vulnerability scanning is that it can produce a long list of vulnerabilities that have been identified, and if the list is too long it can be overwhelming.

 

That’s why Inspector 2 includes just the reports you need to quickly review and prioritize the discovered vulnerabilities, and the details you need to remediate the most important ones.

Report Image

 

Want to download a sample of each of the brandable reports that Inspector 2 can automatically generate? Fill out the form on this page to gain access.

Fill out the form below to gain instant access to samples of each of the reports that can be generated with Inspector 2.

Our Reports Help You Prioritize AND Remediate The Risks

One of the challenges of internal vulnerability scanning is that it can produce a long list of vulnerabilities that have been identified, and if the list is too long it can be overwhelming.

 

That’s why Inspector 2 includes just the reports you need to quickly review and prioritize the discovered vulnerabilities, and the details you need to remediate the most important ones.

 

Complete the form on this page to gain access to the Inspector 2 sample reports.

Prioritize With The Summary Reports

Not all internal vulnerabilities are the same. Some are more critical than others. Some are more likely to be exploited than others. Some are easier to fix than others. And some are “false positives” that don’t need to be fixed at all.

 

That’s why Inspector 2 includes a powerful Summary Report that organizes all vulnerabilities by the level of risk, ranked using the Common Vulnerability Scoring System (CVSS).  This guidance allows you to address issues with the highest risks first, thus reducing global risk and improving the security posture of your clients’ networks.

 

For each recommendation in the Summary Report, the Inspector 2 gives you:

  • The name of the vulnerability
  • The CVSS Score
  • A summary of the vulnerability
  • A summary of the solution
  • List of notes affected.

 

Each time you run a new scan you can generate a summary report to give you a snap shot of every vulnerability in a form in a digestible format that you can use to create your management plan for the month.

 

To view a sample summary report complete the form on this page.

Remediate With The Detailed Reports

Once you’ve created your Management Plan using the Summary Report, you can use either of Inspector 2’s Vulnerability Detail reports to fix the issues you find. One report lists all the issues found on a given asset. The other lists all the vulnerabilities by issue type and includes each asset displaying that vulnerability.

Both reports include comprehensive details about each issue discovered, including:

 

  • The name of the vulnerability
  • The CVSS Score
  • A summary of the vulnerability
  • The vulnerability detection result
  • The impact on your client if the vulnerability is exploited
  • Specific details on the solution
  • The vulnerability detection method
  • Links to references for additional info on the vulnerability and remediation steps.

Both reports include detailed tables of contents with hyperlinks directly to the specific issue or asset listed, greatly streamlining navigation throughout the comprehensive detail reports.

 

Fill out the form on this page to gain access to downloadable sample forms.

LET US SHOW YOU HOW IT WORKS!

Ready to buy now? Click on the Buy Now button. Need to know more? Request a demo and we’ll show you how it works.

BUY NOWREQUEST DEMO
RapidFire Tools - A Kaseya Company

follow us

BUY NOW
Company Information

RapidFire Tools, Inc.
1117 Perimeter Center West
Suite E-501
Atlanta, GA 30338
678.323.1300

Network Detective
  • Overview
  • Products
  • How It Works
IT Assessment Modules
  • Network
  • Security
  • SQL Server
  • Exchange
CLOUD ASSESSMENT MODULES
  • Microsoft Cloud
Compliance Modules
  • HIPAA
  • PCI
NETWORK DETECTIVE ADD-ONS
  • Inspector 2
  • Reporter
SECURITY & COMPLIANCE
  • Compliance Manager
  • Cyber Hawk
Company Links
  • About Us
  • In the News
  • Blog
  • Customer Reviews
  • Press Releases
  • Copyright © 2021 RapidFire Tools, Inc. All rights reserved.
  • |
  • Home
  • |
  • Legal
  • |
  • Privacy
  • |
  • Data Usage