Skip to content
Webinar alert: Learn how to address cyber risk with your customers. Sign up now.

Flag cyber vulnerabilities and know exactly how to remedy them

Flag cyber vulnerabilities and know exactly how to remedy them

Introducing ConnectSecure Vulnerability Management™

Dynamic threats call for a dynamic approach. So we created the only multi-tenant, all-in-one vulnerability scanning & compliance management tool designed and priced specifically for MSPs and MSSPs to support their small-to-medium-sized clients (SMBs). Best practices are built in, for your ease of use.

Flag security vulnerabilities and compliance gaps with confidence

Unlimited visibility brings optimal security. Whether ad-hoc or continuous and automated, the ConnectSecure vulnerability scans captures hardware, software, and networks, including internet-facing vulnerabilities, open ports, and exposed systems. Expert curated vulnerabilities reduce false positives.

Prioritize multiple client and asset vulnerabilities with one look

High-risk vulnerabilities require immediate action. ConnectSecure categorizes everything so you always know what should take priority. A single, multi-tenant interface for all your clients and assets gives you instant access to the information you need to activate vulnerability remediation with minimal effort.

Prove your stance to clients visually

Easy-to-understand reporting is essential to busy MSPs. With customizable client dashboards and automated reporting, ConnectSecure does the heavy lifting while you take  all the credit. Helping your clients prepare for regulatory assessments has never been easier.

Product Features


Discover your assets:

ConnectSecure uses several protocols to discover and probe network assets. This is useful to maintain a central asset repository and helps reduce risks and shadow IT.

Continuous vulnerability detection:

ConnectSecure detects vulnerabilities in end-user devices like laptops and desktops as well as in network infrastructure, including servers, virtual machines, routers, access points, firewalls, printers, and more. ConnectSecure leverages several sources for gathering vulnerabilities including the NIST’s National Vulnerability Database (NVD) and several OEM sources.

Local and Cloud Active Directory Assessments:

For many customers, AD is the cornerstone of their network, holding the “keys to the kingdom” that needs to be suitably protected. ConnectSecure helps MSPs perform AD assessments to identify misconfigurations, weak policies, and privileged user access.

External IP Scans:

External scans show network weaknesses that could lead to a potential incident. External scans help detect open ports, protocols, and named vulnerabilities in public-facing network equipment such as web servers and firewalls.

Compliance Scans:

ConnectSecure supports scanning a customer’s IT infrastructure for common cybersecurity compliance standards that make up the foundation of a strong cybersecurity strategy. Currently, ConnectSecure supports compliance standards like PCI DSS, HIPAA, GDPR IV, NIST 800-53, NIST 800-171, CIS, CIS 8.0, ISO 27002, Cyber Essentials, and Essential Eight.

Application Patching

Just proving customers’ information on their vulnerability risk exposure is no longer sufficient. As important is having the ability to mitigate those risks. ConnectSecure includes an Application Patching feature that remediates the vulnerability by patching third-party Windows applications. This greatly reduces the risk exposure and helps safeguard the network from external actors.

Application baseline

All too often users inadvertently install unauthorized applications or uninstall applications mandated by corporate policy. The disparate set of applications makes it difficult for a security practitioner to manage application vulnerabilities. ConnectSecure includes an application baseline scan to detect anomalies that the MSP can mitigate with the help of any RMM tool.

Extensive reporting

ConnectSecure brings exceptionally strong reporting capabilities to the “Identify” space of the NIST CyberSecurity framework. Asset reports, Active Directory Reports, Vulnerabilities Report, Compliance Reports, Security Posture Reports, and more are supported and available in standard Microsoft office formats (Word, Excel, PowerPoint). All reports can be easily white-labeled and customized using a drag-and-drop Report Builder.

Product Comparison

  ConnectSecure RapidFire Tools Qualys Tenable
Asset Discovery and Scanning
Automated SSL Checks (Ciphers and Protocols)
Azure Active Directory Users and Groups Compliance X X
External Scans
Intune X X X
Local Active Directory Users and Groups Compliance X X
Office 365 Assets and Secure Score X X
Port Scans
Software Inventory X
Application Baseline Scan
Web Vulnerability Scanner X
PII Scan
EPSS Scoring X
Supported Operating Systems
Linux (Ubuntu/Redhat/CentOS/AmazonLinux)
Mac OS
Windows Vulnerabilities
Dashboards and Reporting
Automated Monthly Review Presentation X X X
Build Your Own Report X
Centralized Dashboard
Predefined Reports
Software Patches and Updates Check
Architecture and Infrastructure
Unified Agent X X
User and Role Based Access Control X X X
Configurable Notifications X
Configurable Schedulers X
Single License covers all Assets X
Subnet Scan
Lightweight agent to run with RMM tools X
Rest API X
Webhooks support X X X
Compliance Scans (NIST, CIS, GDPR, PCI DSS, HIPAA, Cyber Essentials, Essential Eight) X X X
Compliance Assessments X X X
  Available only as an additional module
  No CVE

Vulnerability Management Pricing

Up to 2,500 Devices Up to 5,000 Devices Up to 10,000 Devices Over 10,000 Devices
$299.00* per mo $499.00* per mo $999.00* per mo Contact Us
* Pricing subject to change without notice.

Flag cyber vulnerabilities—and know exactly how to remedy them

Want to see ConnectSecure in action? Sign up for a free trial!