Logo Logo Logo Logo Logo
  • PRODUCTS
    • Network Detective
      • Overview
      • Microsoft Cloud Assessment
      • Network Assessment
      • Security Assessment
      • Exchange Assessment
      • SQL Server Assessments
      • HIPAA Compliance
      • PCI Compliance
      • Inspector Appliance
      • Reporter Appliance
    • Compliance Manager
    • Cyber Hawk
  • SERVICES
    • Product Onboarding
    • Powered Services Pro
    • Semel Systems
  • SOLUTIONS
    • I want to…
    • Do More With My Resources
    • Offer More Services
    • Keep More Customers
    • Close More Business
  • RESOURCES
  • COMPANY
    • Contact Us
    • About Us
    • Customer Reviews
    • Blog
    • In the News
    • Press Releases
    • Subscription Info
    • Careers
    • Awards
  • REQUEST A DEMO
  • CUSTOMER LOGIN
  • Upcoming Events
  • BUY NOW
  • PRODUCTS
    • Network Detective
      • Overview
      • Microsoft Cloud Assessment
      • Network Assessment
      • Security Assessment
      • Exchange Assessment
      • SQL Server Assessments
      • HIPAA Compliance
      • PCI Compliance
      • Inspector Appliance
      • Reporter Appliance
    • Compliance Manager
    • Cyber Hawk
  • SERVICES
    • Product Onboarding
    • Powered Services Pro
    • Semel Systems
  • SOLUTIONS
    • I want to…
    • Do More With My Resources
    • Offer More Services
    • Keep More Customers
    • Close More Business
  • RESOURCES
  • COMPANY
    • Contact Us
    • About Us
    • Customer Reviews
    • Blog
    • In the News
    • Press Releases
    • Subscription Info
    • Careers
    • Awards
  • REQUEST A DEMO
  • CUSTOMER LOGIN
  • Upcoming Events
  • BUY NOW

Network Detective

IT ASSESSMENTS & REPORTING

CLOUD ASSESSMENTS
Microsoft Cloud
IT ASSESSMENTS
Network Security Exchange SQL Server
COMPLIANCE ASSESSMENTS
HIPAA PCI
ADD-ONS
Inspector Reporter
OVERVIEW

Cyber Hawk

INTERNAL THREAT DETECTION

Detect anomalous activity, suspicious network changes and threats caused by vulnerabilities and misconfigurations.

OVERVIEW

Compliance Manager

COMPLIANCE PROCESS AUTOMATION

Compliance-as-a-Service your customers can trust.

COMPLIANCE STANDARDS
NIST CSF CMMC HIPAA GDPR Cyber Insurance
OVERVIEW
VIEW ADDITIONAL RESOURCES

Looking for more information? Visit the Resources page for videos, eBooks, whitepapers and more!

Network Detective
Inspector Appliance
  • Summary
  • How it Works
  • Reports
  • FAQ
  • Request A Demo
Network Detective
Inspector Appliance
  • Summary
  • How it Works
  • Reports
  • FAQ
  • Request A Demo

INSPECTOR APPLIANCE

DEEP-DIVE SCANS AND PREMIUM REPORTS

Layer 2/3 Discovery & Internal Vulnerability Scans

Separate yourself from other MSPs and gain even greater insight into your client’s network with Inspector for “deep dive” analysis and reporting. Inspector is an optional “add-on” appliance that can be delivered as downloadable software or as a pre-configured, ready to use, small-form physical server. With Inspector you can generate a set of reports and diagrams that add layer 2/3 discovery and internal vulnerabilities scans.

 

Completely visualize how everything is connected with layer 2/3 insight! Start with a high-level report that shows a Layer 2/3 diagram with section blow-ups that list all major network devices, and segmented diagrams of connected devices. Detailed information includes operating systems and device types found along with other information on network devices. Links to connected computers, printers, and other devices show connectivity down to the actual switch ports.  Includes Excel output and Visio versions of the layer 2/3 diagrams that can be fully manipulated (notes and links are maintained as you drag around the nodes)!

 

The Internal Vulnerability scan operates behind the firewall to identify and expose real and potential vulnerabilities inside the network. Inspector delivers a set of reports designed to prioritize and measure issues by their CVSS to ensure your technicians can patch the weaknesses and fix holes quickly and effectively.

With the Inspector add-on appliance you can:

Visualize the network with layer 2, layer 3 diagrams

Access diagrams in Excel and Visio

Perform an Internal Vulnerability Scan that measures risk by CVSS

Locate open and vulnerable ports

Prioritize issue resolution by risk score

Export data into your PSA or Service Desk software

Inspector Reports

Internal Network Vulnerabilities Summary Report

Internal Vulnerabilities Scan Detail Report

Internal Vulnerability Scan Detail by Issue Report

Layer 2/3 Diagram Report

Layer 2/3 Detail Report

Layer 2/3 Detail Excel Report

Layer 2/3 Diagram Image

I just closed a deal with a medical practice due to my Network Detective reporting. I gives me the upper hand when I walk in the door, especially if I am bidding against other firms. They can't produce anything near what we show up with on the first day!

Kurt Bullock, President, Bridge Technology Group

We love Network Detective because it saves us time and money while providing a ridiculously amazing value to our customers. It has replaced hours of work and correlation from our RMM tools with a simple wizard based interface. Our customers love it because it provides excellent benchmarking and documentation.

Greg Bazar, Iron Fish Technologies, LLC

Network Detective has allowed me to document a network in 30 minutes. I can show the client the Visio diagram as an initial item, and then print out the entire binded report as their network documentation. The client thinks I spent hours putting it together. In reality, it only took me an hour between collection and printing.

David Suarez, ADS Technology Corp

Network Detective has helped us find weak points for potential new clients. The information it gathers is incredible! Once new business is won, we use the Network Detective network admin report as the starting point to securing and making our client's lives easier and more productive.

Ryan Luering, Reachout Technology

ALL TESTIMONIALS

LET US SHOW YOU HOW IT WORKS!

Ready to buy now? Click on the Buy Now button. Need to know more? Request a demo and we’ll show you how it works.

BUY NOWREQUEST DEMO
RapidFire Tools - A Kaseya Company

follow us

BUY NOW
Company Information

RapidFire Tools, Inc.
1117 Perimeter Center West
Suite E-101
Atlanta, GA 30338
678.323.1300

Network Detective
  • Overview
  • Products
  • How It Works
IT Assessment Modules
  • Network
  • Security
  • SQL Server
  • Exchange
CLOUD ASSESSMENT MODULES
  • Microsoft Cloud
Compliance Modules
  • HIPAA
  • PCI
NETWORK DETECTIVE ADD-ONS
  • Inspector
  • Reporter
SECURITY & COMPLIANCE
  • Compliance Manager
  • Cyber Hawk
Company Links
  • About Us
  • In the News
  • Blog
  • Customer Reviews
  • Press Releases
  • Copyright © 2021 RapidFire Tools, Inc. All rights reserved.
  • |
  • Home
  • |
  • Legal
  • |
  • Privacy
  • |
  • Data Usage