Logo Logo Logo Logo Logo
  • PRODUCTS
    • Compliance Manager
    • Network Detective
      • Overview
      • Network Assessment
      • Security Assessment
      • Exchange Assessment
      • SQL Server Assessments
      • HIPAA Compliance
      • PCI Compliance
      • Inspector Appliance
      • Reporter Appliance
      • Dark Web ID
    • Cyber Hawk
  • Click Here for Internal IT Departments
  • SOLUTIONS
    • I want to…
    • Do More With My Resources
    • Offer More Services
    • Keep More Customers
    • Close More Business
  • RESOURCES
  • COMPANY
    • About Us
    • Awards
    • Blog
    • Careers
    • Customer Reviews
    • In the News
    • Press Releases
  • CUSTOMER LOGIN
  • Upcoming Events
  • CONTACT US
  • BUY NOW
  • PRODUCTS
    • Compliance Manager
    • Network Detective
      • Overview
      • Network Assessment
      • Security Assessment
      • Exchange Assessment
      • SQL Server Assessments
      • HIPAA Compliance
      • PCI Compliance
      • Inspector Appliance
      • Reporter Appliance
      • Dark Web ID
    • Cyber Hawk
  • Click Here for Internal IT Departments
  • SOLUTIONS
    • I want to…
    • Do More With My Resources
    • Offer More Services
    • Keep More Customers
    • Close More Business
  • RESOURCES
  • COMPANY
    • About Us
    • Awards
    • Blog
    • Careers
    • Customer Reviews
    • In the News
    • Press Releases
  • CUSTOMER LOGIN
  • Upcoming Events
  • CONTACT US
  • BUY NOW

Network Detective

IT ASSESSMENTS & REPORTING

IT ASSESSMENTS
Network Security Exchange SQL Server
COMPLIANCE ASSESSMENTS
HIPAA PCI
ADD-ONS
Inspector Reporter Dark Web ID
OVERVIEW

Cyber Hawk

INTERNAL THREAT DETECTION

Detect anomalous activity, suspicious network changes and threats caused by vulnerabilities and misconfigurations.

LEARN MORE

Compliance Manager

COMPLIANCE PROCESS AUTOMATION

Compliance-as-a-Service your customers can trust.

COMPLIANCE STANDARDS
GDPR HIPAA Cyber Insurance
OVERVIEW
VIEW ADDITIONAL RESOURCES

Looking for more information? Visit the Resources page for videos, eBooks, whitepapers and more!

Network Detective
HIPAA Compliance
  • Summary
  • How it Works
  • Reports
  • Use Cases
Network Detective
HIPAA Compliance
  • Summary
  • How it Works
  • Reports
  • Use Cases

HIPAA COMPLIANCE

REPORTS

HIPAA Policies & Procedures

Policy & Procedures describe the best practices to comply with the requirements of the HIPAA Security Rule. The policies spell out what your organization does.  The procedures detail how you do it referencing HIPAA code sections.

Download

HIPAA Risk Analysis

The HIPAA security framework mandates a risk assessment as a primary document requirement of the Administrative Safeguards. In fact, a Risk Analysis is the foundation for the entire security program.

Download

HIPAA Risk Profile

Whether performed monthly or quarterly, the Risk Profile updates the Risk Analysis and documents progress in addressing previously identified risks, and finds new ones that pop-up.

Download

HIPAA Management Plan

The Management Plan prioritizes issues resolution based upon risk score with tasks required to minimize, avoid, or respond to risks. The Risk Management plan defines the strategies and tactics the organization uses to address its risks.

Download

Evidence of HIPAA Compliance

Crucial Evidence of Compliance includes log-in files, patch analysis, user & computer information, and other source material to support your compliance activities. The details included in this report are necessary to satisfy an auditor or investigator.

Download

External Network Vulnerability Scan

Detailed reports show security holes and warnings, informational items including CVSS scores as scanned from outside the target network.

Download

HIPAA Compliance PowerPoint

Use the HIPAA PowerPoint presentation to clearly deliver your findings. Summary information with risk and issue score are presented and include specific recommendations and next steps.

Download

HIPAA On-Site Survey

The On-site Survey is an extensive list of questions about physical and technical security that cannot be gathered automatically. The survey ranges from how facility doors are locked to firewall information, and whether servers are on-site, in a data center, or in the Cloud and more.

Download

Disk Encryption Report

Encryption is so effective at protecting data that if an encrypted device is lost, it does not have to be reported as a data breach. The Disk Encryption Report identifies each drive and volume across the network, whether it is fixed or removable, and if Encryption is active.

Download

File Scan Report

This report is useful to identify local data files that may not be protected. Based on this information, the risk of a breach could be avoided if the data was moved to a more secure location, or mitigated by encrypting the device to protect the data and avoid a data breach investigation.

Download

User Identification Worksheet

The User Identification Worksheet takes the list of users gathered by the Data Collector and lets you identify whether they are an employee or vendor. Users who are terminated, should have their access terminated. Also, identify generic logins, such as Nurse@ or Billing@ which are not permitted by HIPAA.

Download

Computer Identification Worksheet

The Computer Identification Worksheet takes the list of computers gathered by the Data Collector and lets you identify those that store or access ePHI. This is an effective tool in developing data management strategies including secure storage and encryption.

Download

Network Share Identification Worksheet

The Network Share Identification Worksheet takes the list of network shares gathered by the Data Collector and lets you identify those that store or access ePHI. This is an effective tool in developing data management strategies including secure storage and encryption.

Download

HIPAA Supporting Worksheets

A set of additional documents provides detailed information and the raw data that backs up the Evidence of Compliance. These includes the various interviews and worksheets, as well as detailed data collections on shares and login analysis.

Download

No Risk Purchasing

With our 30-day, 100% satisfaction guarantee there’s absolutely no risk to you. You have everything to gain and nothing to lose.

LEARN MORE
RapidFire Tools - A Kaseya Company

follow us

BUY NOW
Company Information

RapidFire Tools, Inc.
1117 Perimeter Center West
Suite E-101
Atlanta, GA 30338
678.323.1300

Network Detective
  • Overview
  • Products
  • How It Works
IT Assessment Modules
  • Network
  • Security
  • SQL Server
  • Exchange
Compliance Modules
  • HIPAA
  • PCI
NETWORK DETECTIVE ADD-ONS
  • Inspector
  • Reporter
  • Dark Web ID
SECURITY & COMPLIANCE
  • Compliance Manager
  • Cyber Hawk
Company Links
  • About Us
  • In the News
  • Blog
  • Customer Reviews
  • Press Releases
  • Copyright © 2019 RapidFire Tools, Inc. All rights reserved.
  • |
  • Home
  • |
  • Legal
  • |
  • Privacy
  • |
  • Data Usage
  • |
  • Guarantee