Features

Features

RootSecure SOC

RootSecure’s SOC dashboard provides a single point for all your CyberRisk indicators. Aggregating all the information from the on-premise sensor and displaying the risk information in easily understood visuals. Custom reports can be generated for different stakeholders with varying levels of technical expertise.

 

  • Simple but powerful summary views of CyberRisk data
  • Intuitive workflows for quick access to detailed information
  • Custom and scheduled reports
  • Aggregate Risk Score compared to the industry
  • Triage and project management tools

RootSecure Security Analyst

RootSecure is more than just a dashboard. RootSecure Security Analysts provide another set of eyes to review your CyberRisk information. Assisting with incident consultation and providing pro-active 24×7 long analysis looking for anomalies or threat indicators.

 

  • Incident consultation to help with the what and where
  • Pro-active monitoring of CyberRisk and logs
  • General consultation on decreasing CyberRisk

RootSecure Risk Score

 

RootSecure uses the most comprehensive set of

industry approved penetration testing tools to

stress your network and identify vulnerabilities. By

aggregating this information, leveraging machine

learning technologies and identifying anomalies

we can provide an extremely accurate CyberRisk

Score that holds up over time.

 

  • Continuous risk evaluation

  • Industry risk comparison

  • Dark web brute force testing

  • Machine learning anomaly detection to reduce alarm fatigue

  • Asset classification to weight scoring criteria around critical infrastructure

Turn-key Deployment

 

RootSecure uses an on-premise sensor to collect

and scan information. Deploy the physical

appliance or virtual machine on site and it does

the rest.

 

  • Out of band deployment for stress-free deployment

  • Stateless scanning for maximum security

Stakeholder Specific Reports

 

Different stakeholders need different reports.

RootSecure lets you customize and automate

reports to different stakeholders with varying

levels of detail. From IT Administrator to CISO to

CEO; RootSecure produces reports that can be

used for different job functions to explain Risk.

RootSecure Small Business

50 IP Addresses

RootSecure Standard

500 IP Addresses

RootSecure Plus+

1000 IP Addresses
8 hours/month
Incident Response

RootSecure Premium

Unlimited IP Addresses
ProActive Monitoring
Incident Response

Download our latest datasheet below

Subscriptions

Choose one of our services to target your needs

ROOTSECURE SMALL BUSINESS
$ /
50 IPs supported
RootSecure Dashboard
ROOTSECURE STANDARD
$7,500 /year
500 IPs Supported
RootSecure Dashboard
ROOTSECURE PLUS
$ /
1000 IP Addresses
8 hours/month
Incident Response
ROOTSECURE PREMIUM
$16,000 /year
Unlimited IPs Supported
RootSecure Dashboard
Incident Report
Proactive Monitoring

Partners

Our Partners

Join our partner program and get access to preferred pricing, customized collateral, training materials, and deal registration. Click here to get started

Success story

What they say about us

Company

Our Mission & Work Philosophy

RootSecure’s CyberRisk Platform is a technology platform for cyber defense, which uses best of breed detection tools combined with machine learning to identify your CyberRisk before your digital business infrastructure is compromised. The RootSecure CyberRisk Platform works by using the industries best penetration testing tools to probe your network for vulnerabilities to assess your CyberRisk. Learning your network with data surrounding critical assets and their importance. Combined with a workflow engine to support timely mediation of the risk. The latest version of RootSecure’s CyberRisk Platform delivers an intuitive and responsive user interface, customized reports for different organization stakeholders, robust security for data management and access control, threat feeds for log analysis and dark-web detection.

“In RootSecure we receive a continuous vulnerability and risk management solution to look at and assess the security of our technology environment and we are quite happy with the service.”

J. Latimer
Hosting Services Manager, eSolutions Group

Contact

Let’s talk business risks!