In doing our market research to develop Inspector 2, we surveyed thousands of MSPs to learn how many actually perform internal vulnerability scanning, how frequently they do it, and for which clients.
Here are the findings of our proprietary RapidFire Tools Internal Vulnerability Scanning (IVS) survey of MSPs. Please note that this is copyrighted information. You can share this information with others, providing that you cite “RapidFire Tools 2021 IVS Survey”, and provide a link back to this page):
Finding 1: Too many MSPs don’t do internal vulnerability scanning at all!
According to our survey, more than half of MSPs say they don’t do internal vulnerability scanning. Digging into this, we learned that a small percentage of these MSPs have SOCs, SEIMs, and other cybersecurity solutions that provide the necessary protection. But the majority just rely on their firewalls, and anti-malware/anti-virus software to protect their clients.
Finding 2: Most smaller clients are not protected.
Following up with the MSPs who said they do internal vulnerability scanning, less than 1 in 4 of them perform the scans for all of their clients. More than half said they only perform the scans for their larger clients. The remaining 25% give us a wide range of responses including: they only perform scans for selected clients who pay for a premium security services; clients that request it as part of a compliance requirement; clients that purchase it; only as part of an initial assessment.
Finding 3: Most MSPs that perform IV Scanning, do it at least monthly.
According to the National Institute of Standards and Technology (NIST), the recommended frequency of IV scans is monthly, and 25% of our respondents who do scans reported following that recommendation. Yet there’s a huge range of frequency of scans. About 1 in 4 MSPs scan their clients’ networks more frequently than monthly, while the remaining half less frequently.
Finding 4: Most MSPs cite cost as the primary barrier to internal vulnerability scanning.
There are a lot of obstacles that get in the way of MSPs performing regular internal vulnerability scanning on all of their client networks. Some MSPs find that the scans are too complicated and take too much time. Others have issues with the reports that come out of the scan results. But, by far, the cost is the biggest issue. MSPs told us that most of the IV scanning vendors charge so much, that it’s too expensive to absorb it as part of their general managed services fee, and costs more than their clients are willing to pay.
Finding 5: MSPs want to do more internal vulnerability scanning
How much is cost a barrier for MSPs to provide the extra layer of cybersecurity protection to every client? When asked if they would perform internal vulnerability scans more frequently and/or for more clients . . . if it were more affordable . . . almost 8 out of 10 MSPs said they would.
Meeting the need with Inspector 2
If you are among the majority of MSPs who don’t perform internal vulnerability scans — or spend so much that you have to limit which clients you do it for and how frequently — Inspector 2 is your solution. We’ve priced it so that you pay one, low fixed cost for every client . . . no matter how big or small.
The subscription is so low, you can immediately add monthly IV scanning to enhance your base managed services contract, and then use the results to sell-in additional cybersecurity services as needed.
LET US SHOW YOU HOW IT WORKS!
Ready to buy now? Click on the Buy Now button. Need to know more? Request a demo and we’ll show you how it works.