Network Detective offers a wide range of software tools, each designed for a specific IT discipline to produce a unique set of IT assessment reports. We have products that evaluate internal and external network security, specialty products that look at your exchange and SQL servers, as well as assessment products that focus on compliance. The more modules you have, the broader the range of assessments you will be able to perform, and the more opportunities you will have to build out and differentiate your IT service portfolio.
Network Detective Products
A complete set of reports touch on the broadest range of systems, network assets, settings, configuration, installed applications and endpoint security issues. It also includes a site diagram, and detailed information in Excel format that you can manipulate or integrate into your PSA.
A full set of security reports focus on network and user-related security risks, designed to allow you to offer a basic Managed Security Service. The reports reveal which users have access to what systems, and what systems are configured with what permissions. This module also includes integrated, external vulnerabilities scans.
A unique IT assessment tool with specialized and generalized applications. Because it includes a comprehensive scan of the entire MS Exchange or Office 365 platform, it’s a great tool for pre-Exchange migration documentation and post migration validation. But it’s also a great everyday management tool that will aid you in supporting your clients who are running MS Exchange.
Gives you the tools to properly manage networks that have applications running on SQL Server, including SharePoint. The tool is easy enough to use that non-DBA techs can run scans and generate all the reports needed for maintaining and reporting the status of any SQL Server database. Yet the information delivered in the reports is powerful enough to give even the most savvy Database Administrator insights to potential threats and gauge overall health of the databases before something critical goes wrong.
The first purpose-built IT tool to combine automated collection of network data with information collected through observations, photographs and surveys. It’s also the only software that gives you a repository to safely and securely collect all the data, and a built-in HIPAA risk assessment engine that automatically generates required compliance documents including a Policies & Procedures, Risk Analysis, Management Plan, and Evidence of Compliance.
Should be used on any network where your clients accept credit cards including retailers and online merchants. The PCI tool combines automated collection of network data with information collected through observations, photographs and surveys. It automatically generates the official documents that comprise a comprehensive PCI data security assessment. In most cases, you will want to use Inspector (see below) to perform the Internal Vulnerabilities Scan and the Layer 2/3 Network Diagram, which are a requirement of PCI.
This easy-to-use appliance can be moved from site to site to perform “deep-dive” diagnostics including layer 2/3 network discovery and internal vulnerability scans. Scans are imported into Network Detective where you can generate the specialized reports. Inspector can be downloaded and installed in a Hyper-V or VMware environment, or purchased pre-installed on a small-form server.
Reporter is your ticket to increased productivity through pre-scheduled data collection, and automatic generation of your IT Assessment reports. Reporter can also automatically deliver your reports via email. It’s like having a skilled admin on staff dedicated to creating reports for you and your clients.