Network Detective offers a wide range of software tools, each designed to produce a unique set of specialized reports for a different type of IT assessment. The more modules you have, the broader the range of assessments you will be able to perform, and the more opportunities you will have to build out and support your IT service portfolio. We also offer specialized software appliances that will take your IT assessments to the next level.
Comes with a complete set of reports that touches on the broadest range of systems, network assets, settings, configuration, installed applications and endpoint security. It also includes a an Active Directory site diagram, and detailed information in an Excel format that you can manipulate or integrate into your PSA. More
Includes a full set of security reports that focus on network and user-related security risks, and is designed to allow you to offer a basic Managed Security Service to all of your clients. This report reveals which users have access to what systems, and what systems are configured with what permissions. This module also includes a powerful, integrated external vulnerabilities scan. More
Is a unique IT assessment tool with both specialized and generalized applications. Because it includes a comprehensive scan of the entire MS Exchange or Office 365 platform, it’s a great tool for pre-Exchange migration documentation and post migration validation. But it’s also a great everyday Exchange management tool that will aid you in supporting your clients who are running MS Exchange. More
Gives you the tools you need to properly manage the networks that have applications running on SQL Server, including SharePoint. The tool is easy enough to use that non-DBA techs can quickly and easily run the scan and generate all the reports needed for maintaining and reporting the status of any SQL Server database. Yet the information delivered in the reports is powerful enough to give even the most savvy Database Administrator insights to assess potential threats and gauge the overall health of the databases BEFORE something critical goes wrong. More
Is the first purpose-built IT tool to combine automated collection of network data with information collected through observations, photographs and surveys. It's also the only software that gives you a repository to safely and securely collect all the data, and a built-in HIPAA risk assessment engine that automatically generates the official documents that comprise a comprehensive HIPAA IT assessment including a Risk Analysis, Management Plan, and Evidence of Compliance. More
Has broad business market opportunity and should be used at any network where your clients accept credit cards – including retailers, online merchants, and mail order companies. Similar in approach to the HIPAA Compliance Module, the PCI tool combines automated collection of network data with information collected through observations, photographs and surveys. It also automatically generates the official documents that comprise a comprehensive PCI data security assessment. In most cases, you will want to use Inspector (see below) to perform the Internal Vulnerabilities Scan and the Layer 2/3 Network Diagram, which are a mandatory requirement of PCI. More
Inspector performs "deep-dive" diagnostics including layer 2/3 network discovery and internal vulnerability scans. Scans are downloaded into Network Detective where you can generate the specialized reports. The software appliance can be downloaded after purchase and installed in a Hyper-V environment, or purchased pre-installed on a small-form server. More
Traditional security technologies including firewalls, anti-malware, and anti-spam filters are focused on deterrence and prevention from EXTERNAL causes, even though 70% of security problems originate from INTERNAL sources. Detector is the only software appliance that closes this gap through a unique combination of machine learning and intelligent tagging to identify anomalous user activity, network misconfigurations, and internal vulnerabilities. More