Skip to content

Flag cyber vulnerabilities and know exactly how to remedy them

Flag cyber vulnerabilities and know exactly how to remedy them

Introducing ConnectSecure Vulnerability Management™

Dynamic threats call for a dynamic approach. So we created the only multi-tenant, all-in-one vulnerability scanning & compliance management tool designed and priced specifically for MSPs and MSSPs to support their small-to-medium-sized clients (SMBs). Best practices are built in, for your ease of use.

vulnerability-screen

Flag security vulnerabilities and compliance gaps with confidence

Unlimited visibility brings optimal security. Whether ad-hoc or continuous and automated, the ConnectSecure vulnerability scans captures hardware, software, and networks, including internet-facing vulnerabilities, open ports, and exposed systems. Expert curated vulnerabilities reduce false positives.

client-prioritization-1

Prioritize multiple client and asset vulnerabilities with one look

High-risk vulnerabilities require immediate action. ConnectSecure categorizes everything so you always know what should take priority. A single, multi-tenant interface for all your clients and assets gives you instant access to the information you need to activate vulnerability remediation with minimal effort.

visual-proof-1

Prove your stance to clients visually

Easy-to-understand reporting is essential to busy MSPs. With customizable client dashboards and automated reporting, ConnectSecure does the heavy lifting while you take  all the credit. Helping your clients prepare for regulatory assessments has never been easier.

Product Features

asset-icon

Discover your assets:

ConnectSecure uses several protocols to discover and probe network assets. This is useful to maintain a central asset repository and helps reduce risks and shadow IT.

detection-icon

Continuous vulnerability detection:

ConnectSecure detects vulnerabilities in end-user devices like laptops and desktops as well as in network infrastructure, including servers, virtual machines, routers, access points, firewalls, printers, and more. ConnectSecure leverages several sources for gathering vulnerabilities including the NIST’s National Vulnerability Database (NVD) and several OEM sources.

active-directory-icon

Active directory assessments:

For many customers, AD is the cornerstone of their network, holding the “keys to the kingdom” that needs to be suitably protected. ConnectSecure helps MSPs perform AD assessments to identify misconfigurations, weak policies, and privileged user access.

ip-icon

External IP Scans:

External scans show network weaknesses that could lead to a potential incident. External scans help detect open ports, protocols, and named vulnerabilities in public-facing network equipment such as web servers and firewalls.

compliance-icon

Compliance Scans:

ConnectSecure supports scanning a customer’s IT infrastructure for common cybersecurity compliance standards that make up the foundation of a strong cybersecurity strategy. Currently, ConnectSecure supports compliance standards like PCI DSS, HIPAA, GDPR IV, NIST 800-53, NIST 800-171, CIS, CIS 8.0, ISO 27002, Cyber Essentials, and Essential Eight.

patching-icon

Application Patching

Just proving customers’ information on their vulnerability risk exposure is no longer sufficient. As important is having the ability to mitigate those risks. ConnectSecure includes an Application Patching feature that remediates the vulnerability by patching third-party Windows applications. This greatly reduces the risk exposure and helps safeguard the network from external actors.

baseline-icon

Application baseline

All too often users inadvertently install unauthorized applications or uninstall applications mandated by corporate policy. The disparate set of applications makes it difficult for a security practitioner to manage application vulnerabilities. ConnectSecure includes an application baseline scan to detect anomalies that the MSP can mitigate with the help of any RMM tool.

reporting-icon

Extensive reporting

ConnectSecure brings exceptionally strong reporting capabilities to the “Identify” space of the NIST CyberSecurity framework. Asset reports, Active Directory Reports, Vulnerabilities Report, Compliance Reports, Security Posture Reports, and more are supported and available in standard Microsoft office formats (Word, Excel, PowerPoint). All reports can be easily white-labeled and customized using a drag-and-drop Report Builder.

Product Comparison

  RapidFire Tools Qualys ConnectSecure
Asset Discovery and Tracking Feature Included Blue Star IconNo Tracking Blue Star Icon - Feature Included Feature Included Blue Star Icon
Subnet Scan Feature Included Blue Star Icon Feature Included Blue Star Icon Feature Included Blue Star Icon
Active Directory Discovery and Tracking Feature Included Blue Star Icon Feature Included Blue Star Icon Feature Included Blue Star Icon
Office 365 Assets and Secure Score Feature Included Blue Star IconSeparate Module Feature Not Included Red X Feature Included Blue Star Icon
Intune Assets Discovery and Tracking Feature Not Included Red X Feature Not Included Red X Feature Included Blue Star Icon
Azure Assets Discovery and Tracking Feature Included Blue Star IconSeparate Module Feature Not Included Red X Feature Included Blue Star Icon
Windows Vulnerabilities Feature Included Blue Star IconNo CVE Feature Included Blue Star Icon Feature Included Blue Star Icon
Linux (Ubuntu/Redhat/CentOS/AmazonLinux) Feature Included Blue Star IconNo CVE Feature Included Blue Star Icon Feature Included Blue Star Icon
Mac OS Feature Included Blue Star IconNo CVE Feature Included Blue Star Icon Feature Included Blue Star Icon
Active Directory Users and Groups Compliance Feature Included Blue Star Icon Feature Not Included Red X Feature Included Blue Star Icon
SMB/CIFS Shares Feature Included Blue Star Icon Feature Not Included Red X Feature Included Blue Star Icon
Software Inventory Feature Not Included Red X Feature Included Blue Star Icon Feature Included Blue Star Icon
Software Whitelist and Blacklist checks Feature Not Included Red X Feature Not Included Red X Feature Included Blue Star Icon
Lightweight agent to run with RMM tools Feature Not Included Red X Feature Included Blue Star Icon Feature Included Blue Star Icon
Centralized Dashboard Feature Included Blue Star IconSeparate Module Feature Included Blue Star Icon Feature Included Blue Star Icon
Predefined Reports Feature Included Blue Star IconSeparate Module Feature Included Blue Star Icon Feature Included Blue Star Icon
Build your own Report Feature Not Included Red X Feature Included Blue Star Icon Feature Included Blue Star Icon
Automated Monthly Review Presentation Feature Not Included Red X Feature Not Included Red X Feature Included Blue Star Icon
Software Patches and Updates Check Feature Included Blue Star IconSeparate Module Feature Included Blue Star Icon Feature Included Blue Star Icon
External Scans Feature Included Blue Star Icon Feature Included Blue Star Icon Feature Included Blue Star Icon
Web Vulnerability Scanner Feature Not Included Red X Feature Included Blue Star Icon Feature Included Blue Star Icon
Multitenant Feature Not Included Red X Feature Not Included Red X Feature Included Blue Star Icon
Configurable Notifications Feature Not Included Red X Feature Included Blue Star Icon Feature Included Blue Star Icon
Webhooks support Feature Not Included Red X Feature Not Included Red X Feature Included Blue Star Icon
Port Scans and Reports Feature Included Blue Star Icon Feature Included Blue Star Icon Feature Included Blue Star Icon
Automated SSL Checks (Ciphers and Protocols) Feature Included Blue Star Icon Feature Included Blue Star Icon Feature Included Blue Star Icon
Rest API Feature Not Included Red X Feature Included Blue Star Icon Feature Included Blue Star Icon
Configurable Schedulers Feature Not Included Red X Feature Included Blue Star Icon Feature Included Blue Star Icon
Single License covers all Assets Feature Not Included Red X Feature Included Blue Star Icon Feature Included Blue Star Icon

Vulnerability Management Pricing

Up to 2,500 Devices Up to 5,000 Devices Up to 10,000 Devices Over 10,000 Devices
$299.00* per mo $499.00* per mo $999.00* per mo Contact Us
* Pricing subject to change without notice.

Flag cyber vulnerabilities—and know exactly how to remedy them

Want to see ConnectSecure in action? Sign up for a free trial!