These Managed Security tools quantifies cyber and data risk, and arms your information technology and security teams with real-time, actionable insight from comprehensive and continuous vulnerability assessment of networks, devices, and people.
Learn more below about our three-pronged approach to risk assessment that includes Reach, Scout, and Echo. Provide us a little information about your business to sign up for your 30-day free trial.
Reach continuously scans your network, cataloging your core infrastructure, equipment/peripherals, workstations, Internet of Things (IoT) and personal (i.e., BYOD) devices – anything IP-connected – and looking for vulnerabilities resulting from misconfigurations, outdated software, and other risk vectors. Reach can also take in logs from other equipment (e.g., firewalls), broadening your visibility into other potential risks.
Continuous Risk Scanning
Ongoing scans, rather than occasional ones, avoid risky delays in security awareness by keeping constant watch utilizing multiple scanning engines and internal/external scanning.
Proactive Risk Monitoring
Information provided by Reach is constantly analyzed in the RootSecure Cloud with threat analysis, anomaly detection and machine learning algorithms that proactively alert you to new risks.
Automatic Updates and Deployment Flexibility
Software and vulnerability feeds update automatically, for zero- maintenance management. The on premise sensor is quickly and easily deployed out-of-band as either a physical appliance or virtual machine.
A host-based agent monitors hardware and software, system logs, peripheral activity, visible wireless networks, privilege escalations, file modification history – and much more – to reveal risks that can only be detected through careful on-device observation. All information is securely transferred to the RootSecure Cloud for analysis, where you can explore the findings in your RootSecure Dashboard.
On-device software agent that continuously monitors logs, system, and user activity to identify risk and build up a baseline of audit data that can be used in anomaly detection and machine learning-enabled predictive algorithms.
Proactive Risk Monitoring
Information provided by Scout is constantly analyzed in the RootSecure Cloud with threat analysis, anomaly detection, and machine learning algorithms that proactively alert you to new risks; risks are assigned a score based on the industry standard CVSS (Common Vulnerability Scoring System).
Information Audit Reporting
Reports audit information to the RootSecure Cloud to establish system baselines, which are subsequently used for anomaly detection, and to power machine learning risk prediction algorithms.
Echo makes running simulated social engineering campaigns effortless through simple – but powerful –management and configuration utilities that let you choose from templates and even add personalization. The results, which are easy to interpret, are showcased in the RootSecure Dashboard and let you know exactly where you need to take action to lower your organization’s risk.
Create target groups for focused campaigns. For example, groups can be separated into executive team, sales team, support staff, etc or by entire departments.
Choose from existing sending profiles or create customizable new profiles.
Choose from existing templates or create new customizable templates.