Logo Logo Logo Logo Logo
  • PRODUCTS
    • Network Detective
      • Overview
      • Microsoft Cloud Assessment
      • Network Assessment
      • Security Assessment
      • Exchange Assessment
      • SQL Server Assessments
      • HIPAA Compliance
      • PCI Compliance
      • Inspector Appliance
      • Reporter Appliance
    • Compliance Manager
    • Cyber Hawk
  • SERVICES
    • Product Onboarding
    • Powered Services Pro
    • Semel Systems
  • SOLUTIONS
    • I want to…
    • Do More With My Resources
    • Offer More Services
    • Keep More Customers
    • Close More Business
  • RESOURCES
  • COMPANY
    • Contact Us
    • About Us
    • Customer Reviews
    • Blog
    • In the News
    • Press Releases
    • Subscription Info
    • Careers
    • Awards
  • REQUEST A DEMO
  • CUSTOMER LOGIN
  • Upcoming Events
  • BUY NOW
  • PRODUCTS
    • Network Detective
      • Overview
      • Microsoft Cloud Assessment
      • Network Assessment
      • Security Assessment
      • Exchange Assessment
      • SQL Server Assessments
      • HIPAA Compliance
      • PCI Compliance
      • Inspector Appliance
      • Reporter Appliance
    • Compliance Manager
    • Cyber Hawk
  • SERVICES
    • Product Onboarding
    • Powered Services Pro
    • Semel Systems
  • SOLUTIONS
    • I want to…
    • Do More With My Resources
    • Offer More Services
    • Keep More Customers
    • Close More Business
  • RESOURCES
  • COMPANY
    • Contact Us
    • About Us
    • Customer Reviews
    • Blog
    • In the News
    • Press Releases
    • Subscription Info
    • Careers
    • Awards
  • REQUEST A DEMO
  • CUSTOMER LOGIN
  • Upcoming Events
  • BUY NOW

Network Detective

IT ASSESSMENTS & REPORTING

CLOUD ASSESSMENTS
Microsoft Cloud
IT ASSESSMENTS
Network Security Exchange SQL Server
COMPLIANCE ASSESSMENTS
HIPAA PCI
ADD-ONS
Inspector Reporter
OVERVIEW

Cyber Hawk

INTERNAL THREAT DETECTION

Detect anomalous activity, suspicious network changes and threats caused by vulnerabilities and misconfigurations.

OVERVIEW

Compliance Manager

COMPLIANCE PROCESS AUTOMATION

Compliance-as-a-Service your customers can trust.

COMPLIANCE STANDARDS
NIST CSF CMMC HIPAA GDPR Cyber Insurance
OVERVIEW
VIEW ADDITIONAL RESOURCES

Looking for more information? Visit the Resources page for videos, eBooks, whitepapers and more!

Network Detective
PCI Compliance
  • Summary
  • How it Works
  • Reports
  • Use Cases
  • Request A Demo
Network Detective
PCI Compliance
  • Summary
  • How it Works
  • Reports
  • Use Cases
  • Request A Demo

PCI COMPLIANCE

REPORTS

PCI Policies & Procedures

The best practices our experts have come up with to comply with the technical requirements of PCI. The policies are what your organization does while the procedures detail how you do it. In an audit, this is usually the first document request by the examiner.

Download

PCI Risk Analysis

A list of issues to remediate to ensure the security and confidentiality of Cardholder Data. Run the Risk Analysis at least once a year, or when any significant changes could affect one or more system components.

Download

PCI Management Plan

The Management Plan prioritizes tasks, by Risk Score and keeps track of closed and open items to ensure that issues identified are issues resolved.

Download

Evidence of PCI Compliance

Includes log-in files, patch analysis, user & computer information, and other source material to support your compliance activities. When all is said and done, the proof to proper documentation is in the underlying supporting information!

Download

External Vulnerability Scan

Shows security holes and warnings, and informational items including CVSS scores as scanned from outside the target network. External vulnerabilities could allow a malicious attacker access to the internal network.

Download

Internal Vulnerability Scan: Requires the Network Detective Inspector

Report shows security holes and warnings, and informational items including CVSS scores as scanned from inside the target network. Closing internal vulnerabilities helps prevent external attackers and internal users from exploiting weaknesses typically protected by firewalls.

Download

PCI Pre-scan Questionnaire

A list of questions about physical and technical security that cannot be gathered automatically. The survey includes questions ranging from facility access to firewall information to application development to authentication and change management standards.

Download

External Port Security Worksheet

Document business justifications for all allowed ports, the protocol configured to use a specific port, and any insecure configurations implemented and in use for a given protocol.

Download

Cardholder Data Environment ID Worksheet

This worksheet takes the list of computers gathered by the Data Collector and lets you identify those that store or access Cardholder Data. This is an effective tool in developing data management strategies including secure storage and encryption.

Download

Server Function ID Worksheet

Only one function per server can be implemented to prevent functions that require different security levels from coexisting on the same server. The Service Function Identification documents server roles (web server, database server, DNS server, etc.) and the functions activated on each server (real/physical or virtual) within the Cardholder Data Environment (CDE).

Download

User Identification Worksheet

The User Identification Worksheet takes the list of users gathered by the Data Collector and lets you identify whether they are an employee or vendor. Users who should have had their access terminated can also be identified. Determine whether unauthorized users have access to protected information.

Download

Necessary Functions Worksheet

For each server in the Cardholder Data Environment (CDE), this worksheet presents startup applications, services, and other functions, allowing you to identify functions which are unnecessary for the server to fulfill its primary function.

Download

Antivirus Capability Identification Worksheet

This worksheet enables the PCI readiness specialist to inspect and document the features and capabilities Antivirus Software deployed on computers throughout network both in and out of the Cardholder Data Environment (CDE).

Download

PAN Scan Verification Worksheet

The Deep Scan includes a Personal Account Number (PAN) scanner. The results of the PAN scan are presented in this worksheet, allowing you the opportunity to investigate and verify if the detected numbers are truly an identifying account number/credit card.

Download

Compensating Controls Worksheet

PCI allows compensating controls to be put in place to mitigate potential security issues in the environment. All discovered issues are presented in this worksheet to allow you to document the compensating controls that may be in place.

Download

PCI Layer 2/3 Diagram: Requires the Network Detective Inspector

This diagram shows the various components discovered along with their Layer 2 and Layer 3 connections. Systems and devices that are part of the Cardholder Data Environment (CDE) are highlighted. Having a representation of the components in the CDE along with their connectivity to the global network is a requirement of PCI.

Download

ASV Certified Reports

Generated by an Approved Scan Vendor, the PCI Attestation serves as your certificate or proof that the Host/IP address has passed the PCI-DSS standards for external vulnerabilities. The Attestation is available for a small, additional charge.

Download

LET US SHOW YOU HOW IT WORKS!

Ready to buy now? Click on the Buy Now button. Need to know more? Request a demo and we’ll show you how it works.

BUY NOWREQUEST DEMO
RapidFire Tools - A Kaseya Company

follow us

BUY NOW
Company Information

RapidFire Tools, Inc.
1117 Perimeter Center West
Suite E-101
Atlanta, GA 30338
678.323.1300

Network Detective
  • Overview
  • Products
  • How It Works
IT Assessment Modules
  • Network
  • Security
  • SQL Server
  • Exchange
CLOUD ASSESSMENT MODULES
  • Microsoft Cloud
Compliance Modules
  • HIPAA
  • PCI
NETWORK DETECTIVE ADD-ONS
  • Inspector
  • Reporter
SECURITY & COMPLIANCE
  • Compliance Manager
  • Cyber Hawk
Company Links
  • About Us
  • In the News
  • Blog
  • Customer Reviews
  • Press Releases
  • Copyright © 2021 RapidFire Tools, Inc. All rights reserved.
  • |
  • Home
  • |
  • Legal
  • |
  • Privacy
  • |
  • Data Usage