Logo Logo Logo Logo Logo
  • PRODUCTS
    • Network Detective
      • Overview
      • Microsoft Cloud Assessment
      • Network Assessment
      • Security Assessment
      • Exchange Assessment
      • SQL Server Assessments
      • HIPAA Compliance
      • PCI Compliance
      • Reporter Appliance
    • Inspector 2
    • Compliance Manager
    • Cyber Hawk
  • SERVICES
    • Product Onboarding
    • Powered Services Pro
    • Semel Systems
  • SOLUTIONS
    • I want to…
    • Do More With My Resources
    • Offer More Services
    • Keep More Customers
    • Close More Business
  • RESOURCES
  • COMPANY
    • Contact Us
    • About Us
    • Customer Reviews
    • Blog
    • In the News
    • Press Releases
    • Subscription Info
    • Careers
    • Awards
  • REQUEST A DEMO
  • CUSTOMER LOGIN
  • Upcoming Events
  • BUY NOW
  • CUSTOMER LOGIN
  • UPCOMING EVENTS
  • PRODUCTS
    • Network Detective
      • Overview
      • Microsoft Cloud Assessment
      • Network Assessment
      • Security Assessment
      • Exchange Assessment
      • SQL Server Assessments
      • HIPAA Compliance
      • PCI Compliance
      • Reporter Appliance
    • Inspector 2
    • Compliance Manager
    • Cyber Hawk
  • SERVICES
    • Product Onboarding
    • Powered Services Pro
    • Semel Systems
  • SOLUTIONS
    • I want to…
    • Do More With My Resources
    • Offer More Services
    • Keep More Customers
    • Close More Business
  • RESOURCES
  • COMPANY
    • Contact Us
    • About Us
    • Customer Reviews
    • Blog
    • In the News
    • Press Releases
    • Subscription Info
    • Careers
    • Awards
  • REQUEST A DEMO
  • CUSTOMER LOGIN
  • Upcoming Events
  • BUY NOW

Network Detective

IT ASSESSMENTS & REPORTING

CLOUD ASSESSMENTS
Microsoft Cloud
IT ASSESSMENTS
Network Security Exchange SQL Server
COMPLIANCE ASSESSMENTS
HIPAA PCI
ADD-ONS
Reporter
OVERVIEW

Inspector 2

IV SCANNING AND REPORTING

Internal vulnerability scanning for the rest of us! Complete scans. Automated reports. Priced to scale.

OVERVIEW

Cyber Hawk

INTERNAL THREAT DETECTION

Detect anomalous activity, suspicious network changes and threats caused by vulnerabilities and misconfigurations.

OVERVIEW

Compliance Manager

COMPLIANCE PROCESS AUTOMATION

Compliance-as-a-Service your customers can trust.

COMPLIANCE STANDARDS
NIST CSF CMMC HIPAA GDPR Cyber Insurance
OVERVIEW
Network Detective
PCI Compliance
  • Summary
  • How it Works
  • Reports
  • Use Cases
  • Request A Demo
Network Detective
PCI Compliance
  • Summary
  • How it Works
  • Reports
  • Use Cases
  • Request A Demo

PCI ASSESSMENTS

ONLY AUTOMATED TOOL FOR COMPLETE PCI DOCUMENTATION

IT Services Opportunity

PCI compliance presents a huge opportunity for IT service providers and MSPs to offer a new set of IT services using the Network Detective PCI Compliance tool. Nearly 22 million businesses have merchant accounts and accept credit cards, requiring them to comply with PCI standards. Businesses that don’t follow suit are subject to significant fines, and may lose their right to accept credit cards.

 

Until now, you had to be a PCI expert to deliver these kinds of reports. But we’ve put the “smarts” into our tool by working with the leading PCI authorities to create a powerful framework for performing comprehensive PCI risk assessments, guaranteed to stand up to any review.

 

The Network Detective PCI Compliance module is, hands-down, the fastest, most affordable, and easiest way to perform a full PCI IT audit.

Provide more services with this powerful module:

PCI ASSESSMENT SERVICES

Assess their Cardholder Data Environments (CDE) and perform PCI pre-audits.

PCI REMEDIATION SERVICES

Document, prioritize, and remediate PCI related security vulnerabilities.

PCI APPROVED SCANS

Produce an ASV certified scan directly from inside the PCI Module.

PCI COMPLIANCE SERVICES

Provide ongoing compliance services and mandatory documentation to protect your client.

PCI Reports

PCI Policies & Procedures Document

PCI Risk Analysis Report

PCI Management Plan

Evidence of PCI Compliance

External Vulnerability Scan

Internal Vulnerability Scan: Requires the Network Detective Inspector

PCI Pre-scan Questionnaire

External Port Security Worksheet

Cardholder Data Environment ID Worksheet

Server Function ID Worksheet

User Identification Worksheet

Necessary Functions Worksheet

Antivirus Capability Identification Worksheet

PAN Scan Verification Worksheet

Compensating Controls Worksheet

PCI Layer 2/3 Diagram: Requires the Network Detective Inspector

ASV Certified Reports

Click here for a detailed overview of all reports

All Reports

I just closed a deal with a medical practice due to my Network Detective reporting. I gives me the upper hand when I walk in the door, especially if I am bidding against other firms. They can't produce anything near what we show up with on the first day!

Kurt Bullock, President, Bridge Technology Group

We love Network Detective because it saves us time and money while providing a ridiculously amazing value to our customers. It has replaced hours of work and correlation from our RMM tools with a simple wizard based interface. Our customers love it because it provides excellent benchmarking and documentation.

Greg Bazar, Iron Fish Technologies, LLC

Network Detective has allowed me to document a network in 30 minutes. I can show the client the Visio diagram as an initial item, and then print out the entire binded report as their network documentation. The client thinks I spent hours putting it together. In reality, it only took me an hour between collection and printing.

David Suarez, ADS Technology Corp

Network Detective has helped us find weak points for potential new clients. The information it gathers is incredible! Once new business is won, we use the Network Detective network admin report as the starting point to securing and making our client's lives easier and more productive.

Ryan Luering, Reachout Technology

ALL TESTIMONIALS

LET US SHOW YOU HOW IT WORKS!

Ready to buy now? Click on the Buy Now button. Need to know more? Request a demo and we’ll show you how it works.

BUY NOWREQUEST DEMO
RapidFire Tools - A Kaseya Company

follow us

BUY NOW
Company Information

RapidFire Tools, Inc.
1117 Perimeter Center West
Suite E-501
Atlanta, GA 30338
678.323.1300

Network Detective
  • Overview
  • Products
  • How It Works
IT Assessment Modules
  • Network
  • Security
  • SQL Server
  • Exchange
CLOUD ASSESSMENT MODULES
  • Microsoft Cloud
Compliance Modules
  • HIPAA
  • PCI
NETWORK DETECTIVE ADD-ONS
  • Inspector 2
  • Reporter
SECURITY & COMPLIANCE
  • Compliance Manager
  • Cyber Hawk
Company Links
  • About Us
  • In the News
  • Blog
  • Customer Reviews
  • Press Releases
  • Copyright © 2021 RapidFire Tools, Inc. All rights reserved.
  • |
  • Home
  • |
  • Legal
  • |
  • Privacy
  • |
  • Data Usage