Logo Logo Logo Logo Logo
  • PRODUCTS
    • Network Detective
      • Overview
      • Microsoft Cloud Assessment
      • Network Assessment
      • Security Assessment
      • Exchange Assessment
      • SQL Server Assessments
      • HIPAA Compliance
      • PCI Compliance
      • Inspector Appliance
      • Reporter Appliance
    • Compliance Manager
    • Cyber Hawk
  • Click Here for Internal IT Departments
  • SERVICES
    • Product Onboarding
    • Powered Services Pro
    • Semel Systems
  • SOLUTIONS
    • I want to…
    • Do More With My Resources
    • Offer More Services
    • Keep More Customers
    • Close More Business
  • RESOURCES
  • COMPANY
    • Contact Us
    • About Us
    • Customer Reviews
    • Blog
    • In the News
    • Press Releases
    • Subscription Info
    • Careers
    • Awards
  • REQUEST A DEMO
  • CUSTOMER LOGIN
  • Upcoming Events
  • BUY NOW
  • PRODUCTS
    • Network Detective
      • Overview
      • Microsoft Cloud Assessment
      • Network Assessment
      • Security Assessment
      • Exchange Assessment
      • SQL Server Assessments
      • HIPAA Compliance
      • PCI Compliance
      • Inspector Appliance
      • Reporter Appliance
    • Compliance Manager
    • Cyber Hawk
  • Click Here for Internal IT Departments
  • SERVICES
    • Product Onboarding
    • Powered Services Pro
    • Semel Systems
  • SOLUTIONS
    • I want to…
    • Do More With My Resources
    • Offer More Services
    • Keep More Customers
    • Close More Business
  • RESOURCES
  • COMPANY
    • Contact Us
    • About Us
    • Customer Reviews
    • Blog
    • In the News
    • Press Releases
    • Subscription Info
    • Careers
    • Awards
  • REQUEST A DEMO
  • CUSTOMER LOGIN
  • Upcoming Events
  • BUY NOW

Network Detective

IT ASSESSMENTS & REPORTING

CLOUD ASSESSMENTS
Microsoft Cloud
IT ASSESSMENTS
Network Security Exchange SQL Server
COMPLIANCE ASSESSMENTS
HIPAA PCI
ADD-ONS
Inspector Reporter
OVERVIEW

Cyber Hawk

INTERNAL THREAT DETECTION

Detect anomalous activity, suspicious network changes and threats caused by vulnerabilities and misconfigurations.

OVERVIEW

Compliance Manager

COMPLIANCE PROCESS AUTOMATION

Compliance-as-a-Service your customers can trust.

COMPLIANCE STANDARDS
NIST CSF CMMC HIPAA GDPR Cyber Insurance
OVERVIEW
VIEW ADDITIONAL RESOURCES

Looking for more information? Visit the Resources page for videos, eBooks, whitepapers and more!

Network Detective
  • Overview
  • Products
  • How It Works
  • Request A Demo
Network Detective
  • Overview
  • Products
  • How It Works
  • Request A Demo

Network Detective

PRODUCTS

Choose Your Weapons

Network Detective offers a wide range of software tools each designed for a specific IT discipline to produce a unique set of IT assessment reports. We have tools that evaluate internal and external network security, analyze MS Exchange and SQL Server, produce compliance assessment reports for HIPAA and PCI, and shine a light on what’s going on inside the Microsoft Cloud. The more tools you have, the more opportunities to build out and differentiate your IT service portfolio.

Network Detective Products

IT ASSESSMENT MODULES

Network Assessments

A complete set of reports touch on the broadest range of systems, network assets, settings, configuration, installed applications and endpoint security issues. It also includes a site diagram, and detailed information in Excel format that you can manipulate or integrate into your PSA.

Learn More

Security Assessments

A full set of security reports focus on network and user-related security risks, designed to allow you to offer a basic Managed Security Service. The reports reveal which users have access to what systems, and what systems are configured with what permissions. Also includes external vulnerabilities scans and Dark Web password exposure.

Learn More

Exchange Assessments

A unique IT assessment tool with specialized and generalized applications. Because it includes a comprehensive scan of the entire MS Exchange or Office 365 platform, it’s a great tool for pre-Exchange migration documentation and post migration validation. But it’s also a great everyday management tool that will aid you in supporting your clients who are running MS Exchange.

Learn More

SQL Server Assessments

Gives you the tools to properly manage networks that have applications running on SQL Server, including SharePoint. The tool is easy enough to use that non-DBA techs can run scans and generate all the reports needed for maintaining and reporting the status of any SQL Server database. Yet the information delivered in the reports is powerful enough to give even the most savvy Database Administrator insights to potential threats and gauge overall health of the databases before something critical goes wrong.

Learn More

CLOUD ASSESSMENT MODULES

Microsoft Cloud Assessments

Digs into Azure AD and the Microsoft 365 (formerly Office 365) productivity cloud and generates reports to gain insights about what’s going on inside “the black box.” Includes Cloud Risk and Cloud Management Reports, a Configuration Change Report, a Cloud Security Report, plus separate assessment reports for the SharePoint, OneDrive and Teams services, plus the Outlook webmail app.

Learn More

COMPLIANCE ASSESSMENT MODULES

HIPAA Compliance

The first purpose-built IT tool to combine automated collection of network data with information collected through observations, photographs and surveys. It’s also the only software that gives you a repository to safely and securely collect all the data, and a built-in HIPAA risk assessment engine that automatically generates required compliance documents including a Policies & Procedures, Risk Analysis, Management Plan, and Evidence of Compliance.

Learn More

PCI Compliance

Should be used on any network where your clients accept credit cards including retailers and online merchants. The PCI tool combines automated collection of network data with information collected through observations, photographs and surveys. It automatically generates the official documents that comprise a comprehensive PCI data security assessment. In most cases, you will want to use Inspector (see below) to perform the Internal Vulnerabilities Scan and the Layer 2/3 Network Diagram, which are a requirement of PCI.

Learn More

NETWORK DETECTIVE ADD-ONS

Inspector Appliance

This easy-to-use appliance can be moved from site to site to perform “deep-dive” diagnostics including layer 2/3 network discovery and internal vulnerability scans. Scans are imported into Network Detective where you can generate the specialized reports. Inspector can be downloaded and installed in a Hyper-V or VMware environment, or purchased pre-installed on a small-form server.

Learn More

Reporter Appliance

Reporter is your ticket to increased productivity through pre-scheduled data collection, and automatic generation of your IT Assessment reports. Reporter can also automatically deliver your reports via email. It’s like having a skilled admin on staff dedicated to creating reports for you and your clients.

Learn More

LET US SHOW YOU HOW IT WORKS!

Ready to buy now? Click on the Buy Now button. Need to know more? Request a demo and we’ll show you how it works.

BUY NOWREQUEST DEMO
RapidFire Tools - A Kaseya Company

follow us

BUY NOW
Company Information

RapidFire Tools, Inc.
1117 Perimeter Center West
Suite E-101
Atlanta, GA 30338
678.323.1300

Network Detective
  • Overview
  • Products
  • How It Works
IT Assessment Modules
  • Network
  • Security
  • SQL Server
  • Exchange
CLOUD ASSESSMENT MODULES
  • Microsoft Cloud
Compliance Modules
  • HIPAA
  • PCI
NETWORK DETECTIVE ADD-ONS
  • Inspector
  • Reporter
SECURITY & COMPLIANCE
  • Compliance Manager
  • Cyber Hawk
Company Links
  • About Us
  • In the News
  • Blog
  • Customer Reviews
  • Press Releases
  • Copyright © 2021 RapidFire Tools, Inc. All rights reserved.
  • |
  • Home
  • |
  • Legal
  • |
  • Privacy
  • |
  • Data Usage