Introducing ConnectSecure Vulnerability Management™
Dynamic threats call for a dynamic approach. So we created the only multi-tenant, all-in-one vulnerability scanning & compliance management tool designed and priced specifically for MSPs and MSSPs to support their small-to-medium-sized clients (SMBs). Best practices are built in, for your ease of use.
Flag security vulnerabilities and compliance gaps with confidence
Unlimited visibility brings optimal security. Whether ad-hoc or continuous and automated, the ConnectSecure vulnerability scans captures hardware, software, and networks, including internet-facing vulnerabilities, open ports, and exposed systems. Expert curated vulnerabilities reduce false positives.
Prioritize multiple client and asset vulnerabilities with one look
High-risk vulnerabilities require immediate action. ConnectSecure categorizes everything so you always know what should take priority. A single, multi-tenant interface for all your clients and assets gives you instant access to the information you need to activate vulnerability remediation with minimal effort.
Prove your stance to clients visually
Easy-to-understand reporting is essential to busy MSPs. With customizable client dashboards and automated reporting, ConnectSecure does the heavy lifting while you take all the credit. Helping your clients prepare for regulatory assessments has never been easier.
Discover your assets:
ConnectSecure uses several protocols to discover and probe network assets. This is useful to maintain a central asset repository and helps reduce risks and shadow IT.
Continuous vulnerability detection:
ConnectSecure detects vulnerabilities in end-user devices like laptops and desktops as well as in network infrastructure, including servers, virtual machines, routers, access points, firewalls, printers, and more. ConnectSecure leverages several sources for gathering vulnerabilities including the NIST’s National Vulnerability Database (NVD) and several OEM sources.
Active directory assessments:
For many customers, AD is the cornerstone of their network, holding the “keys to the kingdom” that needs to be suitably protected. ConnectSecure helps MSPs perform AD assessments to identify misconfigurations, weak policies, and privileged user access.
External IP Scans:
External scans show network weaknesses that could lead to a potential incident. External scans help detect open ports, protocols, and named vulnerabilities in public-facing network equipment such as web servers and firewalls.
ConnectSecure supports scanning a customer’s IT infrastructure for common cybersecurity compliance standards that make up the foundation of a strong cybersecurity strategy. Currently, ConnectSecure supports compliance standards like PCI DSS, HIPAA, GDPR IV, NIST 800-53, NIST 800-171, CIS, CIS 8.0, ISO 27002, Cyber Essentials, and Essential Eight.
Just proving customers’ information on their vulnerability risk exposure is no longer sufficient. As important is having the ability to mitigate those risks. ConnectSecure includes an Application Patching feature that remediates the vulnerability by patching third-party Windows applications. This greatly reduces the risk exposure and helps safeguard the network from external actors.
All too often users inadvertently install unauthorized applications or uninstall applications mandated by corporate policy. The disparate set of applications makes it difficult for a security practitioner to manage application vulnerabilities. ConnectSecure includes an application baseline scan to detect anomalies that the MSP can mitigate with the help of any RMM tool.
ConnectSecure brings exceptionally strong reporting capabilities to the “Identify” space of the NIST CyberSecurity framework. Asset reports, Active Directory Reports, Vulnerabilities Report, Compliance Reports, Security Posture Reports, and more are supported and available in standard Microsoft office formats (Word, Excel, PowerPoint). All reports can be easily white-labeled and customized using a drag-and-drop Report Builder.
|Asset Discovery and Tracking||No Tracking|
|Active Directory Discovery and Tracking|
|Office 365 Assets and Secure Score||Separate Module|
|Intune Assets Discovery and Tracking|
|Azure Assets Discovery and Tracking||Separate Module|
|Windows Vulnerabilities||No CVE|
|Linux (Ubuntu/Redhat/CentOS/AmazonLinux)||No CVE|
|Mac OS||No CVE|
|Active Directory Users and Groups Compliance|
|Software Whitelist and Blacklist checks|
|Lightweight agent to run with RMM tools|
|Centralized Dashboard||Separate Module|
|Predefined Reports||Separate Module|
|Build your own Report|
|Automated Monthly Review Presentation|
|Software Patches and Updates Check||Separate Module|
|Web Vulnerability Scanner|
|Port Scans and Reports|
|Automated SSL Checks (Ciphers and Protocols)|
|Single License covers all Assets|
Vulnerability Management Pricing
|Up to 2,500 Devices||Up to 5,000 Devices||Up to 10,000 Devices||Over 10,000 Devices|
|$299.00* per mo||$499.00* per mo||$999.00* per mo||Contact Us|