Logo Logo Logo Logo Logo
Assessment & Compliance Tools For Every IT Professional
  • PRODUCTS
    • Product Line Overview
    • Network Detective Pro
    • VulScan
    • Cyber Hawk
    • Compliance Manager GRC
  • SOLUTIONS
    • For MSPs
    • FOR IT DEPTs
  • SERVICES
    • Product Onboarding
    • Powered Services Pro
    • Semel Systems
  • RESOURCES
  • COMPANY
    • Contact Us
    • About Us
    • Customer Reviews
    • Blog
    • In the News
    • Press Releases
    • Subscription Info
    • Careers
    • Awards
    • Community
  • REQUEST A DEMO
  • CUSTOMER LOGIN
  • Upcoming Events
  • REQUEST A QUOTE
  • CUSTOMER LOGIN
  • UPCOMING EVENTS
  • PRODUCTS
    • Product Line Overview
    • Network Detective Pro
    • VulScan
    • Cyber Hawk
    • Compliance Manager GRC
  • SOLUTIONS
    • For MSPs
    • FOR IT DEPTs
  • SERVICES
    • Product Onboarding
    • Powered Services Pro
    • Semel Systems
  • RESOURCES
  • COMPANY
    • Contact Us
    • About Us
    • Customer Reviews
    • Blog
    • In the News
    • Press Releases
    • Subscription Info
    • Careers
    • Awards
    • Community
  • REQUEST A DEMO
  • CUSTOMER LOGIN
  • Upcoming Events
  • REQUEST A QUOTE
inspector2-logo
VulScan™
  • Overview
  • Features
  • How It Works
  • For IT Departments
  • For MSPS
  • Reports
  • Request A Demo
inspector2-logo
VulScan™
  • Overview
  • Features
  • How It Works
  • For IT Departments
  • For MSPS
  • Reports
  • Request A Demo

VulScan

Features

Better Security for Everyone

Take a closer look at what makes VulScan so powerful, versatile, and easy-to-use!

Highlighted Features

Internal Vulnerability Management

Description: Automate internal vulnerability scans to run at whatever schedule makes sense based on your maturity model. Get alerts with summary info upon scan completion. Access results in web portal to drill in and take action.

Benefits: MSPs can create and deliver recurring internal vulnerability management services. Internal IT departments can insure that all network locations are being continuously scanned and managed to reduce risk.

Other Features

FeatureDescriptionBenefit
External Vulnerability Management Set up a scanner on any machine outside the target network to use it to perform vulnerability scanning on any site(s) you perform internal scanning on. Enjoy all the same functionality as internal vulnerability management, included in the software.MSPs can create and deliver recurring external vulnerability management services. Internal IT departments can insure that all network locations are being continuously scanned and managed to reduce risk.
Scheduled Internal Vulnerability ScanningA virtual appliance performs automated, scheduled scans of the systems on a network behind the firewall. Scans can be customized to specific IP addresses or address ranges.Scans are performed on a regular basis to save the technician time. They are also only performed on the desired IP addresses to save scan time, or to avoid scanning specific systems (eg - printer).
Scheduled External Vulnerability ScanningA virtual appliance is installed on a system outside the firewall which can be programmed to scan different public-facing IP addresses, typically a firewall of a computer network or a web or other public facing server.Identifies issues on public facing systems for remediation to prevent hackers from gaining access through a firewall.
Unlimited Scanner AppliancesMultiple scanners can be used to perform internal vulnerability scanning of a network, with the results of the scans combined into a single "site" for overall management of the systems in the network. Multiple scanners may be deployed within a single building/network or can be deployed to different locations/offices. Multiple scanners for a site only consume a single license.Using multiple scanners on a large network speeds up the scanning process, and allows disparate locations to be scanned and managed as a single site.
Auto Email AlertingNotification of scan results are automatically emailed to the technician. These results can be filtered by IP range or by severity.The technician only receives desired alerts, and saves the technician time by not having to login to the dashboard to retrieve results.
Automatic Service Ticket CreationVulScan can automatically create tickets for discovered issues/vulnerabilities. The results can be filtered by IP range or by severity.Saves time and ensures remediation is tracked in PSA system.
False Positive Management (Exclusion Rules)Timely (daily) emails that contain a list of Anomalies, Changes, and Threats prioritized by Severity. Alerts include interactive hyperlinks to start the actions to "remediate" "investigate" or "ignore" the alert.Reduces "noise" so that only important and desired vulnerabilities are presented in the dashboard, reports and notifications.
VulScan PVS - Add OnA Vulscan license to create a portable vulnerability scanner that can be used to perform one-off scans. Use cases include prospecting and project work.Enables temporary internal vulnerability scanning of a network without having to perform an installation of a virtual appliance on a network, and does not consume a base license of the product. Easily support multiple locations with a single device.
Brandable and Customizable Report GeneratorQuickly and easily generate reports that provide information on the vulnerabilities discovered that can be filtered using criteria like CVSS score and scan date range. The reports can be customized with your logo and colors.Reports can be provided to management to show results of the vulnerability issues and effectiveness of vulnerability management.
Multi-tenant DashboardSinge dashboard view that displays all organizations being managed with drill down to manage the individual site or sites contained within that organization.Easily and effectively manage multiple organizations and sites.
Custom Scan ProfilesCustom Scan Profiles allow you to customize your VulScan tasks. Specifically, you can create scan profiles to target specific TCP and/or UDP ports. Allows you to perform low impact scans that address only those ports with which you are concerned to speed up scan durations and/or avoid scanning specific IPs/systems.
Authenticated Scans / Credentialed ScansUsing credentialed/authenticated scans allows VulScan to access an account on a network endpoint - this can be a computer system or network device via SNMP.Enables a more thorough internal vulnerability scan which can help detect a wider range of security issues.
Common Vulnerabilities and Exposures SupportAdds the ability to search Scan Results for discovered vulnerabilities by Common Vulnerabilities (CVE) ID.Allows users to research and respond to specific vulnerability issues using the universal labeling convention for any potential and verified vulnerability.

“Right-Size” Your Vulnerability Management Program

Every organization’s risk profile is different. That’s why you need a vulnerability scanning tool that’s flexible and scalable. You want complete control over the number of scanners you want to set up, frequency of the scans, range of assets, and depth of scan. With VulScan, you got it!

Inspector2_eye_color

Eliminate “Alert Fatigue”

 

You want a vulnerability scanner with a huge database of known vulnerabilities to identify every weakness in the IT environments you manage. But you also want the ability to filter out alerts for vulnerabilities that present little to no risk to your specific situation. VulScan delivers!

Manage Internal AND External Vulnerabilties

 

Most vulnerability scanners are set up to just handle internal vulnerability scanning. Separate services are available to check for external vulnerabilities but the proprietary ones add to your costs, and the free ones take forever and are less reliable. With VulScan, you get both at no extra charge.

Inspector2_eye_color
Inspector2_eye_color

Easy Access To Scan Results

 

As soon as your vulnerability scans are completed,  you’ll want to access and manage the results from anywhere on the web-based portal.  You want to be able to have scan result alerts selectively emailed to anyone with summary or detailed information. You also need the ability to generate reports for documentation and internal sharing. Get it all with VulScan

Get Helping Hands When You Need Them

 

Sometimes it makes more economic sense to have an outsourced team take over monitoring your systems so you can focus on bigger picture projects. VulScan has an exclusive workflow integration that can optionally send VulScan alerts directly to the RocketCyber SOC for an affordable extra fee.

Inspector2_eye_color

LET US SHOW YOU HOW IT WORKS!

Want to learn more or get pricing? Use the GET A QUOTE button and on the Contact Us form, tell us what you need. If you’re ready for a customized one-on-one demo, use the REQUEST DEMO button below.

GET A QUOTEREQUEST DEMO
RapidFire Tools - A Kaseya Company

follow us

Request A Demo
Request A Quote
Company Information

RapidFire Tools, Inc.
1117 Perimeter Center West
Suite E-501
Atlanta, GA 30338
678.323.1300

PRODUCTS
  • Network Detective Pro
  • VulScan
  • Cyber Hawk
  • Compliance Manager GRC
SERVICES
  • Product Onboarding
  • Semel Systems
  • Powered Services Pro
QUICK LINKS
  • Blog
  • Resource Center
  • Customer Reviews
  • Awards
  • Events
  • Community
Company Links
  • About Us
  • Press Releases
  • Careers
  • Contact Us
  • In the News
Read VulScan reviews on G2
  • Copyright © 2023 RapidFire Tools, Inc. All rights reserved.
  • |
  • Home
  • |
  • Legal
  • |
  • Privacy
  • |
  • Data Usage
  • |
  • Terms Of Use
  • |
  • Cookies Settings