Flag cyber vulnerabilities and know exactly how to remedy them
Flag cyber vulnerabilities and know exactly how to remedy them
Introducing ConnectSecure Vulnerability Management™
Dynamic threats call for a dynamic approach. So we created the only multi-tenant, all-in-one vulnerability scanning & compliance management tool designed and priced specifically for MSPs and MSSPs to support their small-to-medium-sized clients (SMBs). Best practices are built in, for your ease of use.

Flag security vulnerabilities and compliance gaps with confidence
Unlimited visibility brings optimal security. Whether ad-hoc or continuous and automated, the ConnectSecure vulnerability scans captures hardware, software, and networks, including internet-facing vulnerabilities, open ports, and exposed systems. Expert curated vulnerabilities reduce false positives.

Prioritize multiple client and asset vulnerabilities with one look
High-risk vulnerabilities require immediate action. ConnectSecure categorizes everything so you always know what should take priority. A single, multi-tenant interface for all your clients and assets gives you instant access to the information you need to activate vulnerability remediation with minimal effort.

Prove your stance to clients visually
Easy-to-understand reporting is essential to busy MSPs. With customizable client dashboards and automated reporting, ConnectSecure does the heavy lifting while you take all the credit. Helping your clients prepare for regulatory assessments has never been easier.
Product Features
Discover your assets:
ConnectSecure uses several protocols to discover and probe network assets. This is useful to maintain a central asset repository and helps reduce risks and shadow IT.
Continuous vulnerability detection:
ConnectSecure detects vulnerabilities in end-user devices like laptops and desktops as well as in network infrastructure, including servers, virtual machines, routers, access points, firewalls, printers, and more. ConnectSecure leverages several sources for gathering vulnerabilities including the NIST’s National Vulnerability Database (NVD) and several OEM sources.
Active directory assessments:
For many customers, AD is the cornerstone of their network, holding the “keys to the kingdom” that needs to be suitably protected. ConnectSecure helps MSPs perform AD assessments to identify misconfigurations, weak policies, and privileged user access.
External IP Scans:
External scans show network weaknesses that could lead to a potential incident. External scans help detect open ports, protocols, and named vulnerabilities in public-facing network equipment such as web servers and firewalls.
Compliance Scans:
ConnectSecure supports scanning a customer’s IT infrastructure for common cybersecurity compliance standards that make up the foundation of a strong cybersecurity strategy. Currently, ConnectSecure supports compliance standards like PCI DSS, HIPAA, GDPR IV, NIST 800-53, NIST 800-171, CIS, CIS 8.0, ISO 27002, Cyber Essentials, and Essential Eight.
Application Patching
Just proving customers’ information on their vulnerability risk exposure is no longer sufficient. As important is having the ability to mitigate those risks. ConnectSecure includes an Application Patching feature that remediates the vulnerability by patching third-party Windows applications. This greatly reduces the risk exposure and helps safeguard the network from external actors.
Application baseline
All too often users inadvertently install unauthorized applications or uninstall applications mandated by corporate policy. The disparate set of applications makes it difficult for a security practitioner to manage application vulnerabilities. ConnectSecure includes an application baseline scan to detect anomalies that the MSP can mitigate with the help of any RMM tool.
Extensive reporting
ConnectSecure brings exceptionally strong reporting capabilities to the “Identify” space of the NIST CyberSecurity framework. Asset reports, Active Directory Reports, Vulnerabilities Report, Compliance Reports, Security Posture Reports, and more are supported and available in standard Microsoft office formats (Word, Excel, PowerPoint). All reports can be easily white-labeled and customized using a drag-and-drop Report Builder.
Product Comparison
RapidFire Tools | Qualys | ConnectSecure | |
Asset Discovery and Tracking | ![]() |
![]() |
![]() |
---|---|---|---|
Subnet Scan | ![]() |
![]() |
![]() |
Active Directory Discovery and Tracking | ![]() |
![]() |
![]() |
Office 365 Assets and Secure Score | ![]() |
![]() |
![]() |
Intune Assets Discovery and Tracking | ![]() |
![]() |
![]() |
Azure Assets Discovery and Tracking | ![]() |
![]() |
![]() |
Windows Vulnerabilities | ![]() |
![]() |
![]() |
Linux (Ubuntu/Redhat/CentOS/AmazonLinux) | ![]() |
![]() |
![]() |
Mac OS | ![]() |
![]() |
![]() |
Active Directory Users and Groups Compliance | ![]() |
![]() |
![]() |
SMB/CIFS Shares | ![]() |
![]() |
![]() |
Software Inventory | ![]() |
![]() |
![]() |
Software Whitelist and Blacklist checks | ![]() |
![]() |
![]() |
Lightweight agent to run with RMM tools | ![]() |
![]() |
![]() |
Centralized Dashboard | ![]() |
![]() |
![]() |
Predefined Reports | ![]() |
![]() |
![]() |
Build your own Report | ![]() |
![]() |
![]() |
Automated Monthly Review Presentation | ![]() |
![]() |
![]() |
Software Patches and Updates Check | ![]() |
![]() |
![]() |
External Scans | ![]() |
![]() |
![]() |
Web Vulnerability Scanner | ![]() |
![]() |
![]() |
Multitenant | ![]() |
![]() |
![]() |
Configurable Notifications | ![]() |
![]() |
![]() |
Webhooks support | ![]() |
![]() |
![]() |
Port Scans and Reports | ![]() |
![]() |
![]() |
Automated SSL Checks (Ciphers and Protocols) | ![]() |
![]() |
![]() |
Rest API | ![]() |
![]() |
![]() |
Configurable Schedulers | ![]() |
![]() |
![]() |
Single License covers all Assets | ![]() |
![]() |
![]() |
Vulnerability Management Pricing
Up to 2,500 Devices | Up to 5,000 Devices | Up to 10,000 Devices | Over 10,000 Devices |
---|---|---|---|
$299.00* per mo | $499.00* per mo | $999.00* per mo | Contact Us |