Extend the RocketCyber platform and enable MSPs to deliver security services.
RocketCyber's threat detection apps provide solutions for many cybersecurity use cases. Each use case facilitates cyber monitoring opportunities for the managed service provider. Login to your account to turn on preferred RocketApps, no separate installation required.
Each App is purposly built to detect malicious/suspicious activity spanning endpoint, network and cloud attack pillars. When threats are detected, RocketCyber provides the MSP operator reporting, a triage view and the ability to generate tickets to your PSA.
This app reports on Webroot threat detections and brings in the results to the RocketCyber SOC Platform.
This app reports on SentinelOne threat detections and brings in the results to the RocketCyber SOC Platform.
This app provides full multi-tenant command and control of Microsoft Defender. Now you have the power to utilize the advanced capabilities including Attack Surface Reduction, Advanced Ransomware protection and more.
This app provides multi-tenant firewall log monitoring acting as a syslog collector. Messages are parsed, analyzed and enriched with threat intel for potential threat indicators. When a threat or security event is detected, meassage details show up in the console.
Multi-tenant event log monitor for all accounts linked to Microsoft Office 365 providing visibility into users, groups, Azure Active Directory activity and more.
Detects successful and unsuccessful logins outside the expected countries, known malicious IP addresses and adversaries, exposing unauthorized authentication activity.
Overall description of cloud security posture with itemized remediation plans across all Office 365 tenants.
Continuous monitoring app for attacker Tactics, Techniques, & Procedures that circumvent security prevention defenses such as Anti-virus and Firewalls.
This app detects network connections to nation states that are known to engage in cyberterrorist activities targeting small businesses.
Monitors and detects malicious files that are written to disk or executed. This app is used as a backup for detecting malicious files that slip past your primary Anti-virus solution.
Monitors TCP & UDP services that are commonly leveraged for malicious intent and detects unnecessary services mitigating a potential backdoor.
Detects suspicious tools that should not be present on SMB networks such as hacking utilities, password crackers, etc. used for malicious intent.
Performs threat queries on all of your customer endpoints searching for common hunts; Hashes, URLs, Processes and Files.
Provides investigative capabilities to find malicious activity through 17 categories of analysis, e.g. processes, hashes, URLs, and IOCs.
This app delivers threat feeds from RocketCyber and our partner intelligence providers, delivering actionable information on attackers.
This free app service analyzes files for viruses, trojans and malicious content and responds with a verdict of malicious or benign.
Analyzes system processes for known suspicious or malicious behaviors based on various factors including disk image location, timestamp fingerprinting and Levenshtein distance calculations.
Microsoft Windows & macOS event log monitoring detects and alerts security related activities such as failed logins, clearing security logs, unauthorized activity, etc.
This app will monitor for changes to user accounts in Active Directory and synchronize changes to the Breach Secure Now Cloud. Optionally reporting changes to the RocketCyber Console.