Flag cyber vulnerabilities and know exactly how to remedy them
Flag cyber vulnerabilities and know exactly how to remedy them
Introducing ConnectSecure Vulnerability Management™
Dynamic threats call for a dynamic approach. So we created the only multi-tenant, all-in-one vulnerability scanning & compliance management tool designed and priced specifically for MSPs and MSSPs to support their small-to-medium-sized clients (SMBs). Best practices are built in, for your ease of use.
Flag security vulnerabilities and compliance gaps with confidence
Unlimited visibility brings optimal security. Whether ad-hoc or continuous and automated, the ConnectSecure vulnerability scans captures hardware, software, and networks, including internet-facing vulnerabilities, open ports, and exposed systems. Expert curated vulnerabilities reduce false positives.
Prioritize multiple client and asset vulnerabilities with one look
High-risk vulnerabilities require immediate action. ConnectSecure categorizes everything so you always know what should take priority. A single, multi-tenant interface for all your clients and assets gives you instant access to the information you need to activate vulnerability remediation with minimal effort.
Prove your stance to clients visually
Easy-to-understand reporting is essential to busy MSPs. With customizable client dashboards and automated reporting, ConnectSecure does the heavy lifting while you take all the credit. Helping your clients prepare for regulatory assessments has never been easier.Product Features
Discover your assets:
ConnectSecure uses several protocols to discover and probe network assets. This is useful to maintain a central asset repository and helps reduce risks and shadow IT.Continuous vulnerability detection:
ConnectSecure detects vulnerabilities in end-user devices like laptops and desktops as well as in network infrastructure, including servers, virtual machines, routers, access points, firewalls, printers, and more. ConnectSecure leverages several sources for gathering vulnerabilities including the NIST’s National Vulnerability Database (NVD) and several OEM sources.Local and Cloud Active Directory Assessments:
For many customers, AD is the cornerstone of their network, holding the “keys to the kingdom” that needs to be suitably protected. ConnectSecure helps MSPs perform AD assessments to identify misconfigurations, weak policies, and privileged user access.External IP Scans:
External scans show network weaknesses that could lead to a potential incident. External scans help detect open ports, protocols, and named vulnerabilities in public-facing network equipment such as web servers and firewalls.Compliance Scans:
ConnectSecure supports scanning a customer’s IT infrastructure for common cybersecurity compliance standards that make up the foundation of a strong cybersecurity strategy. Currently, ConnectSecure supports compliance standards like PCI DSS, HIPAA, GDPR IV, NIST 800-53, NIST 800-171, CIS, CIS 8.0, ISO 27002, Cyber Essentials, and Essential Eight.Application Patching
Just proving customers’ information on their vulnerability risk exposure is no longer sufficient. As important is having the ability to mitigate those risks. ConnectSecure includes an Application Patching feature that remediates the vulnerability by patching third-party Windows applications. This greatly reduces the risk exposure and helps safeguard the network from external actors.Application baseline
All too often users inadvertently install unauthorized applications or uninstall applications mandated by corporate policy. The disparate set of applications makes it difficult for a security practitioner to manage application vulnerabilities. ConnectSecure includes an application baseline scan to detect anomalies that the MSP can mitigate with the help of any RMM tool.Extensive reporting
ConnectSecure brings exceptionally strong reporting capabilities to the “Identify” space of the NIST CyberSecurity framework. Asset reports, Active Directory Reports, Vulnerabilities Report, Compliance Reports, Security Posture Reports, and more are supported and available in standard Microsoft office formats (Word, Excel, PowerPoint). All reports can be easily white-labeled and customized using a drag-and-drop Report Builder.Product Comparison
ConnectSecure | RapidFire Tools | Qualys | Tenable | |
---|---|---|---|---|
Asset Discovery and Scanning | ||||
Automated SSL Checks (Ciphers and Protocols) | ||||
Azure Active Directory Users and Groups Compliance | X | X | ||
External Scans | ||||
Intune | X | X | X | |
Local Active Directory Users and Groups Compliance | X | X | ||
Office 365 Assets and Secure Score | X | X | ||
Port Scans | ||||
SMB/CIFS Shares | X | X | ||
Software Inventory | X | |||
Application Baseline Scan | ||||
Web Vulnerability Scanner | X | |||
PII Scan | ||||
EPSS Scoring | X | |||
Supported Operating Systems | ||||
Linux (Ubuntu/Redhat/CentOS/AmazonLinux) | ||||
Mac OS | ||||
Windows Vulnerabilities | ||||
Dashboards and Reporting | ||||
Automated Monthly Review Presentation | X | X | X | |
Build Your Own Report | X | |||
Centralized Dashboard | ||||
Predefined Reports | ||||
Remediation | ||||
Software Patches and Updates Check | ||||
Architecture and Infrastructure | ||||
Unified Agent | X | X | ||
User and Role Based Access Control | X | X | X | |
Flexibility | ||||
Configurable Notifications | X | |||
Configurable Schedulers | X | |||
Single License covers all Assets | X | |||
Subnet Scan | ||||
Extensibility | ||||
Lightweight agent to run with RMM tools | X | |||
Rest API | X | |||
Webhooks support | X | X | X | |
Compliance | ||||
Compliance Scans (NIST, CIS, GDPR, PCI DSS, HIPAA, Cyber Essentials, Essential Eight) | X | X | X | |
Compliance Assessments | X | X | X |
Available only as an additional module
No CVE
No CVE
Vulnerability Management Pricing
Up to 2,500 Devices | Up to 5,000 Devices | Up to 10,000 Devices | Over 10,000 Devices |
---|---|---|---|
$299.00* per mo | $499.00* per mo | $999.00* per mo | Contact Us |
* Pricing subject to change without notice.