Features

Features

RootSecure SOC

RootSecure’s SOC dashboard provides a single point for all your CyberRisk indicators. Aggregating all the information from the on-premise sensor and displaying the risk information in easily understood visuals. Custom reports can be generated for different stakeholders with varying levels of technical expertise.

 

  • Simple but powerful summary views of CyberRisk data
  • Intuitive workflows for quick access to detailed information
  • Custom and scheduled reports
  • Aggregate Risk Score compared to the industry
  • Triage and project management tools

RootSecure Security Analyst

RootSecure is more than just a dashboard. RootSecure Security Analysts provide another set of eyes to review your CyberRisk information. Assisting with incident consultation and providing pro-active 24×7 long analysis looking for anomalies or threat indicators.

 

  • Incident consultation to help with the what and where
  • Pro-active monitoring of CyberRisk and logs
  • General consultation on decreasing CyberRisk

RootSecure Risk Score

RootSecure uses the most comprehensive set of

industry approved penetration testing tools to

stress your network and identify vulnerabilities. By

aggregating this information, leveraging machine

learning technologies and identifying anomalies

we can provide an extremely accurate CyberRisk

Score that holds up over time.

 

  • Continuous risk evaluation
  • Industry risk comparison
  • Dark web brute force testing
  • Machine learning anomaly detection to reduce alarm fatigue
  • Asset classification to weight scoring criteria around critical infrastructure

Turn-key Deployment

RootSecure uses an on-premise sensor to collect

and scan information. Deploy the physical

appliance or virtual machine on site and it does

the rest.

 

  • Out of band deployment for stress-free deployment
  • Stateless scanning for maximum security

Stakeholder Specific Reports

 

Different stakeholders need different reports.

RootSecure lets you customize and automate

reports to different stakeholders with varying

levels of detail. From IT Administrator to CISO to

CEO; RootSecure produces reports that can be

used for different job functions to explain Risk.

Download our latest datasheet below

Products

Learn more about the RootSecure Products

Reach

RootSecure Reach arms you with actionable insight from continuous risk assessment of network vulnerabilities, gained by combining external and onsite vulnerability scanning with log analysis.

 

Reach continuously scans your network, cataloging your core infrastructure, equipment/peripherals, workstations, Internet of Things (IoT) and personal (i.e., BYOD) devices – anything IP-connected – and looking for vulnerabilities resulting from misconfigurations, outdated software, and other risk vectors. Reach can also take in logs from other equipment (e.g., firewalls), broadening your visibility into other potential risks.

 

Reach allows you to:

  • Understand your cyber risk posture
  • Take informed, prioritized action to reduce exposure
  • Meet industry compliance requirements

Scout

RootSecure Scout extends visibility inside devices, with continuous host-based monitoring to reveal threats and user behavior that put your organization at risk.

 

A host-based agent monitors hardware and software, system logs, peripheral activity, visible wireless networks, privilege escalations, file modification history – and much more – to reveal risks that can only be detected through careful on-device observation. All information is securely transferred to the RootSecure Cloud for analysis, where you can explore the findings in your RootSecure Dashboard

 

Scout provides you with a more complete understanding of your cyber risk, by:

  • Extending visibility inside devices, to see what’s invisible to Layer-2                and Layer-3 network scans
  • Continuously monitoring an enormous range of device                                              characteristics and behaviours
  • Predicting risks, to let you take proactive intervention

Echo

RootSecure Echo is a turnkey social engineering simulator that measures your organization’s susceptibility to human fallibility and risky behavior.

 

Echo makes running simulated social engineering campaigns effortless through simple – but powerful –management and configuration utilities that let you choose from templates and even add personalization. The results, which are easy to interpret, are showcased in the RootSecure Dashboard and let you know exactly where you need to take action to lower your organization’s risk.

 

Echo allows you to:

  • Conduct ongoing campaigns to catch people in moments of weakness
  • Leverage both broad and targeted strategies
  • Configure and customize campaigns for maximum relevance

Subscriptions

Choose one of our services to target your business needs

ROOTSECURE SMALL BUSINESS
$ /
50 User Seats
RootSecure Dashboard
Reach
Scout
Echo
ROOTSECURE STANDARD
$7,500 /year
500 User Seats
RootSecure Dashboard
Reach
Scout
Echo
ROOTSECURE PLUS
$ /
1000 User Seats
RootSecure Dashboard
8 hours/month
Incident Response
Reach
Scout
Echo
ROOTSECURE PREMIUM
$16,000 /year
Unlimited User Seats
RootSecure Dashboard
Incident Report
Proactive Monitoring
Reach
Scout
Echo

Success story

Hear what our clients think about us

Company

Who We Are & What We Do

RootSecure quantifies cyber and data risk, arming information technology and security teams with real-time, actionable insight from comprehensive and continuous vulnerability assessment of networks, devices, and people.

 

The RootSecure Dashboard shows an organization’s risk posture across a diverse range of threats. Clear and meaningful risk scores, developed by cyber security analysts working in tandem with machine learning algorithms and advanced analytics, let busy professionals prioritize their risk management activities.

 

Detailed reports inform stakeholders, show progress, compare to industry averages, and can be used to better allocate risk management investments.

“In RootSecure we receive a continuous vulnerability and risk management solution to look at and assess the security of our technology environment and we are quite happy with the service.”

J. Latimer
Hosting Services Manager, eSolutions Group

Partners

Contact

Let’s talk business risks!

CAPTCHA image

* These fields are required.

RootSecure CyberRisk Platform is a technology platform for cyber defense, which uses best of breed detection tools combined with machine learning to identify your CyberRisk before your digital business infrastructure is compromised.

Toll Free: 1 833 ROOTSEC
sales@rootsecure.com
1244 Victoria Street North, Kitchener, ON N2B 3C9