Choose Your Weapons
Network Detective offers a wide range of modules each designed for a specific IT discipline to produce a unique set of IT assessment reports. We have tools that evaluate internal and external network security, analyse MS Exchange and SQL Server, and produce compliance reports for HIPAA and PCI.
Generate a complete set of reports for the broadest range of systems, network assets, settings, configurations, installed applications and endpoint security issues. It includes a site diagram, and detailed information in Excel format that you can manipulate or integrate into your PSA.
A full set of security reports focus on network and user-related security risks, designed to allow you to offer a basic Managed Security Service. The reports reveal which users have access to what systems, and what systems are configured with what permissions. It includes external vulnerability scans and Dark Web password exposure.
As an IT assessment tool that includes a comprehensive scan of the entire MS Exchange or Office 365 platform, it’s a great tool for pre-Exchange migration documentation and post-migration validation. It’s also a great everyday management tool that will aid you in supporting end users running MS Exchange.
SQL Server Assessments
Gives you the tools to properly manage networks that have applications running on SQL Server, including SharePoint. Non-DBA techs can easily run scans and generate all the reports needed for maintaining and reporting the status of any SQL Server database. The information delivered in the reports is powerful enough to give even the most savvy DBA insights to potential threats and gauge overall health of the databases before something critical goes wrong.
The first purpose-built IT tool to combine automated collection of network data with information collected through observations, photographs and surveys. It’s also the only software that gives you a repository to safely and securely collect all the data, and a built-in HIPAA risk assessment engine that automatically generates required compliance documents including Policies & Procedures, Risk Analysis, Management Plan, and Evidence of Compliance.
Any network where users accept credit cards including retailers and online merchants needs PCI compliance. This module combines automated collection of network data with information collected through observations, photographs and surveys. It automatically generates the official documents that comprise a comprehensive PCI data security assessment. In most cases, you will want to use Inspector (see below) to perform the Internal Vulnerabilities Scan and the Layer 2/3 Network Diagram, which are a requirement of PCI.
This easy-to-use appliance can be moved from site to site to perform “deep-dive” diagnostics including layer 2/3 network discovery and internal vulnerability scans. Scans are imported into Network Detective where you can generate the specialised reports. Inspector can be downloaded and installed in a Hyper-V or VMware environment, or purchased pre-installed on a small-form server.
Reporter is your ticket to increased productivity through pre-scheduled data collection, and automatic generation of your IT Assessment reports. Reporter can also automatically deliver your reports via email. It’s like having a skilled admin on staff dedicated to creating reports for you and your clients.