Discover the power of ConnectSecure with a 14-day free trial.
Purpose-built for MSPs by MSPs, the ConnectSecure Vulnerability Manager helps you help your clients. Discover what your clients don’t know — and position your business as the cybersecurity expert every SMB needs. Let’s start a new era for business growth.
Sign up for a 14-day free trial today.
What is the difference between the Self Hosted vs SaaS model?
The self-hosted model is an instance hosted for the MSP in the client cloud account. ConnectSecure’s access is limited to threat information updates, bug fixes, and enhancements. Additional access needs to be granted for ConnectSecure to provide support. The server uptime is maintained by the partner and no data is transported to the ConnectSecure server except for a small set of anonymized statistics. The SaaS model shifts the burden of maintaining the uptime to ConnectSecure. Again, other than a small set of anyonymized statistics, no data is transported to the ConnectSecure server.
What are the security measures in place?
The system runs on hardened Ubuntu Linux 18.04 and with SELinux. It does not run with root privileges where not required. It has a built in DDOS (Distributed Denial-of-Service) avoidance system and WAF (Web Application Firewall) before the webserver. The penetraion-tested code has been run through SonarQube. We patch vulnerabilities on the base system within 24 hours of a patch being available. All actions on the UI and backend are audited and presented in the UI.
What ports need to be opened between the agent and the server?
Ports 4505, 4506, and 443 need to be opened inbound on the server from the agent machines. A unique key identifies every agent. Unless authenticated it cannot register with the server.
How do you backup the server?
In the self-hosted option, we can create a backup to a S3 bucket that you can restore from. One can use AWS and Azure snapshot backups to get the older version of a restored server.