Logo Logo Logo Logo Logo
  • PRODUCTS
    • Network Detective Pro
    • VulScan
    • Compliance Manager
    • Cyber Hawk
  • SERVICES
    • Product Onboarding
    • Powered Services Pro
    • Semel Systems
  • RESOURCES
  • COMPANY
    • Contact Us
    • About Us
    • Customer Reviews
    • Blog
    • In the News
    • Press Releases
    • Subscription Info
    • Careers
    • Awards
    • Community
  • REQUEST A DEMO
  • CUSTOMER LOGIN
  • Upcoming Events
  • CUSTOMER LOGIN
  • UPCOMING EVENTS
  • PRODUCTS
    • Network Detective Pro
    • VulScan
    • Compliance Manager
    • Cyber Hawk
  • SERVICES
    • Product Onboarding
    • Powered Services Pro
    • Semel Systems
  • RESOURCES
  • COMPANY
    • Contact Us
    • About Us
    • Customer Reviews
    • Blog
    • In the News
    • Press Releases
    • Subscription Info
    • Careers
    • Awards
    • Community
  • REQUEST A DEMO
  • CUSTOMER LOGIN
  • Upcoming Events

Network Detective Pro

IT ASSESSMENTS MADE EASY

CLOUD ASSESSMENTS
Microsoft Cloud
IT ASSESSMENTS
Network Security Exchange SQL Server
COMPLIANCE ASSESSMENTS
HIPAA PCI
ADD-ONS
Reporter

Fully automated IT Assessments for ongoing discovery and reporting.

OVERVIEW

VulScan

NETWORK VULNERABILITY SCANNING

The vulnerability management platform for the rest of us.

OVERVIEW

Cyber Hawk

INTERNAL THREAT DETECTION

Create, sell & deliver your own branded insider threat detection service.  

OVERVIEW

Compliance Manager GRC

GOVERNANCE, RISK & COMPLIANCE FOR ALL

Prove your IT security systems are working and generate essential evidence of compliance for any standard.

COMPLIANCE STANDARDS
OVERVIEW
Network Detective
Security Assessment
  • Summary
  • Reports
  • Product Benefits
  • Use Cases
Network Detective
Security Assessment
  • Summary
  • Reports
  • Product Benefits
  • Use Cases

SECURITY ASSESSMENT

REPORTS

Security Risk Report

A proprietary Risk Score and chart show the relative health of the network security, along with a summary of the number of computers with issues. This powerful lead generation and sales development tool also reports outbound protocols, system control protocols, user access controls, external vulnerabilities summary, and dark web password and credential breaches.

Download

Security Management Plan

Helps prioritize remediation based on the issue risk score. A listing of all security related risks are provided along with recommended actions.

Download

Consolidated Security Report Card

The Consolidated Security Report Card assesses individual computers based on security criteria. Devices discovered on the network are assigned an overall score, as well as a specific score for each of the assessment categories detailed in the report card.

Download

Client Progress Report

The Progress Report allows MSPs to showcase the value of their service offerings to their clients. Information is delivered through easy-to-follow charts that illustrate the continuous improvements to the client’s security profile and can validate the need for additional resources. MSPs can customize the documents by including or excluding sections, changing text, and adding boilerplates.
*The Progress Report requires subscriptions to the Network & Security Modules as well as Reporter.

Download

Security PowerPoint

Use this PowerPoint presentation as a basis for presenting your findings from the Network Detective. General summary information along with the risk and issue score are presented along with specific issue recommendations and next steps.

Download

Anomalous Login Report

Expand your security knowledge and easily identify anomalous user logins with a value-add report that methodically analyzes login history from the security event logs. The report uses mathematical modeling and proprietary pattern recognition to highlight potential unauthorized users who log into machines they normally do not access and at times they normally do not log in.

Download

External Vulnerabilities Scan Detail Report

A comprehensive output including security holes and warnings, informational items that can help make better network security decisions, plus a full NMap Scan which checks all 65,535 ports and reports which are open. This is an essential item for many standard security compliance reports.

Download

External Vulnerability Scan Detail by Issue Report

A compact version of the External Vulnerability Scan Detail report that is organized by issues. Devices that are affected are listed within an issue. This report is useful for technicians that are looking to resolve issues, rather than performing remediation on a particular system.

Download

External Network Vulnerabilities Summary Report

This report provides a prioritized listing of issues by CVSS so your technicians can work more efficiently. Its compact view lets a tech quickly survey the various issues that were detected in an environment.

Download

Outbound Security Report

Highlights deviation from industry standards compared to outbound port and protocol accessibility, lists available wireless networks as part of a wireless security survey, and provides information on Internet content accessibility.

Download

Security Policy Assessment Report

A detailed overview of the security policies which are in place on both a domain wide and local machine basis.

Download

Share Permission Report by Computer

Comprehensive lists of all network “shares” by computer, detailing which users and groups have access to which devices and files, and what level of access they have.

Download

Share Permission Report by User

Organizes permissions by user, showing all shared computers and files to which they have access.

Download

User Behavior Analysis Report

Shows all logins, successful and failure, by user. Report allows you to find service accounts which are not properly configured (and thus failing to login) as well as users who may be attempting (and possibly succeeding) in accessing resources (computers) which they should not be.

 

Download

Login History by Computer Report

Same data as User Behavior but inverted to show you by computer. Quite useful, in particular, for looking at a commonly accessed machines (file server, domain controller, etc.) – or a particularly sensitive machine for failed login attempts. An example would be CEO’s laptop – or the accounting computer where you want to be extra diligent in checking for users trying to get in.

Download

Login Failures by Computer Report

Report identifies users who have succeeded in logging in to another machine. Great for auditing/logging purposes to know of all attempts.

Download

Data Breach Liability Report

Identifies specific and detailed instances of personal identifiable information (PII) and cardholder data throughout a computer network that could be the target of hackers and malicious insiders. It also calculates the potential monetary liability and exposure based upon industry published research. 

 

Download

RSOP Computer Settings Report

This report analyzes the various Resulting Sets of Policy (RSOP) based on computer policy settings on computers in the environment and can be used to assess how many variants of settings exist in a network.  Small variants might be a result of misconfiguration of misapplication of Group Policies at the computer level. Use this report to demonstrate how you might be able to create consistent policies or avoid one-off settings and misconfigurations that lead to inconsistent security policy application.

Download

RSOP User Settings Report

This report analyzes the various Resulting Sets of Policy (RSOP) based on user policy settings on computers in the environment and can be used to assess how many variants of settings exist in a network.  Small variants might be a result of misconfiguration of misapplication of Group Policies at the user level. Use this report to demonstrate how you might be able to create consistent policies or avoid one-off settings and misconfigurations that lead to inconsistent security policy application.

Download

LET US SHOW YOU HOW IT WORKS!

Want to learn more or get pricing? Use the GET A QUOTE button and on the Contact Us form, tell us what you need. If you’re ready for a customized one-on-one demo, use the REQUEST DEMO button below.

GET A QUOTEREQUEST DEMO
RapidFire Tools - A Kaseya Company

follow us

Request A Demo
Company Information

RapidFire Tools, Inc.
1117 Perimeter Center West
Suite E-501
Atlanta, GA 30338
678.323.1300

PRODUCTS
  • Network Detective Pro
  • VulScan
  • Cyber Hawk
  • Compliance Manager GRC
SERVICES
  • Product Onboarding
  • Semel Systems
  • Powered Services Pro
QUICK LINKS
  • Blog
  • Resource Center
  • Customer Reviews
  • Awards
  • Events
  • Community
Company Links
  • About Us
  • Press Releases
  • Careers
  • Contact Us
  • In the News
  • Copyright © 2022 RapidFire Tools, Inc. All rights reserved.
  • |
  • Home
  • |
  • Legal
  • |
  • Privacy
  • |
  • Data Usage