RocketCyber AppStore


Extend the RocketCyber platform and enable MSPs to deliver security services.

Browse AppStore

RocketCyber's threat detection apps provide solutions for many cybersecurity use cases. Each use case facilitates cyber monitoring opportunities for the managed service provider. Login to your account to turn on preferred RocketApps, no separate installation required.

Each App is purposly built to detect malicious/suspicious activity spanning endpoint, network and cloud attack pillars. When threats are detected, RocketCyber provides the MSP operator reporting, a triage view and the ability to generate tickets to your PSA.

Malicious + Suspicious
Office 365 Log Monitor Office 365 Log Monitor

Office 365 Log Monitor

Multi-tenant event log monitor for all accounts linked to Microsoft Office 365 providing visibility into users, groups, Azure Active Directory activity and more.

Malicious + Suspicious
Office 365 Login Analyzer Office 365 Login Analyzer

Office 365 Login Analyzer

Detects successful and unsuccessful logins outside the expected countries, known malicious IP addresses and adversaries, exposing unauthorized authentication activity.

Informative
Office 365 Secure Score Office 365 Secure Score

Office 365 Secure Score

Overall description of cloud security posture with itemized remediation plans across all Office 365 tenants.

Malicious + Suspicious
Microsoft Defender Manager Microsoft Defender Manager

Defender Manager

This app provides full multi-tenant command and control of Microsoft Defender. Now you have the power to utilize the advanced capabilities including Attack Surface Reduction, Advanced Ransomware protection and more.

Suspicious
cyberterrorist network cyberterrorist connection

Cyber Terrorist Network Connection

This app detects network connections to nation states that are known to engage in cyberterrorist activities targeting small businesses.

Suspicious + Malicious
Breach Detection TTPs breach Detection

Advanced Breach Detection (TTPs)

Continuous monitoring app for attacker Tactics, Techniques, & Procedures that circumvent security prevention defenses such as Anti-virus and Firewalls.

Suspicious + Malicious
Threat Hunter Threat Hunting

Threat Hunting

Provides investigative capabilities to find malicious activity through 17 categories of analysis, e.g. processes, hashes, URLs, and IOCs.

Read More

Suspicious
suspicious networks ports suspicious network tools

Suspicious Network Services

Monitors well-known services that are commonly leveraged for malicious intent and detects unnecessary services mitigating a potential backdoor.

Suspicious
Suspicious Hacker Tools Suspicious Tools

Suspicious Tools

Detects suspicious tools that should not be present on SMB networks such as hacking utilities, password crackers and other tools for malicious intent.

Suspicious + Malicious
Cryptocurrency security cryptocurrency miner security

Cryptocurrency Mining Detection

Monitors for Cryptojacking, the unauthorized use of a computer to mine cryptocurrency. Detects for endpoint presence and in-browser javascript miners.

Read More

Suspicious + Malicious
Threat Intelligence Threat intelligence Feeds

Threat Intelligence Feeds

This app delivers threat feeds from RocketCyber and our partner intelligence providers, delivering actionable information on attackers.

Malicious
Ondemand malware analyzer online malware scan

On-demand Malware Analyzer

This free app service analyzes files for viruses, trojans and malicious content and responds with a verdict of malicious or benign.

Suspicious + Malicious
Ondemand Threat Hunting Ondemand Threat scan

On-demand Threat Hunting

Performs threat queries on all of your customer endpoints searching for common hunts; Hashes, URLs, Processes and Files.

Read More

Suspicious + Malicious
Malicious windows process Suspicious windows process

System Process Verifier

Analyzes system processes for known suspicious or malicious behaviors based on various factors including disk image location, timestamp fingerprinting and Levenshtein distance calculations.

Malicious
Malicious file detect Malicious file detection

Malicious File Detection

Monitors and detects malicious files that are written to disk or executed. This app is used as a backup for detecting malicious files that slip past your primary Anti-virus solution.

Suspicious
Event log monitoring Windows / macOS event log monitoring

Suspicious Event Log Monitor

Microsoft Windows & macOS event log monitoring detects and alerts security related activities such as failed logins, clearing security logs, unauthorized activity, etc.

Read More

Do you have a RocketApp idea MSPs can benefit from?

We develop RocketApps that solve security use cases for MSPs.