"IoT - Silent but Deadly" Webinar - September 24th 10am EST
It is no question that technology is becoming more embedded in our lives. From Nest thermostats to ANOVA Sous Vide cookers, D-Link Security Cameras to Fitbit WiFi enabled scales. Internet of Things technology is invading our homes, offices, and everywhere in-between; and we are sacrificing our security willingly for the promise of convenience, comfort, and fun.IoT technology has huge potential but also requires us to learn about growing risks surrounding the IoT and cybersecurity space.
RootSecure
RootSecure's risk assessment products constantly probe your network, monitor your connected devices and test your organization's social engineering resilience, providing a qualified, real-time view into your cyber risks and letting you focus your actions.

RootSecure quantifies cyber and data risk, arming information technology and security teams with real-time, actionable insight from comprehensive and continuous vulnerability assessment of networks, devices, and people.
RootSecure Reach
With Reach, you can understand your cyber security posture and risk profile, make informed decisions, and meet your compliance requirements.

Reach continuously scans your network, cataloging your core infrastructure, equipment/peripherals, workstations, Internet of Things (IoT) and personal (i.e., BYOD) devices – anything IP-connected – and looking for vulnerabilities resulting from misconfigurations, outdated software, and other risk vectors.
RootSecure Scout
With Scout, you gain authoritative, firsthand knowledge of exactly what is happening on your devices.

A host-based agent monitors hardware and software, system logs, peripheral activity, visible wireless networks, privilege escalations, file modification history - and much more - to reveal risks that can only be detected through careful on-device observation. All information is securely transferred to the RootSecure Cloud for analysis, where you can explore the findings in your RootSecure Dashboard.
RootSecure Echo
Echo puts your people to the test and quantifies how vulnerable your organization is to social engineering attacks, both broad and targeted.

Echo makes running simulated social engineering campaigns effortless through simple – but powerful –management and configuration utilities that let you choose from templates and even add personalization. The results, which are easy to interpret, are showcased in the RootSecure Dashboard and let you know exactly where you need to take action to lower your organization’s risk.
Main products

Risk. Managed.
Take advantage of a series of risk assessment capabilities.

01
RootSecure Reach

RootSecure Reach arms you with actionable insight from continuous risk assessment of network vulnerabilities, gained by combining external and onsite vulnerability scanning with log analysis.

Learn More
02
RootSecure Scout

RootSecure Scout extends visibility inside devices, with continuous host-based monitoring to reveal threats and user behaviour that put your organization at risk.

Learn More
03
RootSecure Echo

RootSecure Echo is a turnkey social engineering simulator that measures your organization’s susceptibility to human fallibility and risky behaviour.

Learn More
Product Features

RootSecure Reach

Take informed, prioritized action to reduce exposure.

RootSecure Reach arms you with actionable insight from continuous risk assessment of network vulnerabilities, gained by combining external and onsite vulnerability scanning with log analysis.

Continuous Risk Scanning

Ongoing scans, rather than occasional ones, avoid risky delays in security awareness by keeping constant watch utilizing multiple scanning engines and internal/external scanning.

Proactive Risk Monitoring

Information provided by Reach is constantly analyzed in the RootSecure Cloud with threat analysis, anomaly detection and machine learning algorithms that proactively alert you to new risks.

Dynamic Asset Identification

Automatic and continuous mapping, profiling and classification of your network assets builds a comprehensive inventory to enable risk assessment, action prioritization and anomaly detection.

Log Consumption and Monitoring

Collect and analyze device logs; for instance, firewall logs let you monitor inbound and outbound connection to detect unauthorized access and understand attack traffic your firewall is successfully discarding.

Automatic Updates

Software and vulnerability feeds update automatically, for zero - maintenance management.

Stateless Scanning & Secure Transfer

To maximize security, scanning results are not store locally.

Deployment Flexibility

The on-premise sensor is quickly and easily deployed out-of-brand as either a physical appliance or virtual machine.

"I find that every time we need help, RootSecure is there for us and they are willing to dig into your network, they are willing to learn about your business, and learn what your needs are to really make the product come alive into your environment."

// David Boyle, City of Guelph
Product Features

RootSecure Scout

Predicting risks, to let you take proactive intervention.

RootSecure Scout extends visibility inside devices, with continuous host-based monitoring to reveal threats and user behaviour that put your organization at risk.

Scout Agent

On-device software continuously monitors logs, systems and user activity to identify risk and build up a baseline of audit data that can used in anomaly detection and machine learning-enabled predictive algorithms.

Proactive Risk Monitoring

Information provided by Scout is constantly analyzed in the RootSecure Cloud with threat analysis, anomaly detection and machine learning algorithms that proactively alert you to new risks.

Audit Reporting

Reports audit information to the RootSecure Cloud to establish system baselines, which are subsequently used for anomaly detection, and to power machine learning, risk prediction algorithms.

Are you confident in the security of your network, connected devices and personelle?

Put your organization to the test!
Request a Demo
Product Features

RootSecure Echo

Letting you configure and customize campaigns for maximum relevance.

RootSecure Echo is a turnkey social engineering simulator that measures your organization’s susceptibility to human fallibility and risky behaviour.

People Risk Score

Aggregate score (out of ten) indicating an organization's risk due to the cyber behaviour of its personnel.

Email Phishing Simulation

Everything needed to test an organization's resilience to phishing attacks by managing simulated email phishing campaigns.

Crowdsourced Templates

Contribute and benefit from a community of security professionals when developing effective phishing campaigns.

Intelligent Landing Pages

Custom landing pages for maximum impact with your audience. Redirect to custom pages or educational content.

Dave Mitton

“The Dashboard allowed us to see what was actually on our network - it was a wake up call to what security threats actually existed. ”

// Manager, IT Operations & infrastructure
Watch the Testimonial
Jeff Latimer

“In RootSecure we receive a continuous vulnerability and risk management solution to look at and assess the security of our technology environment and we are quite happy with the service.”

// hosting services manager, esolutions
Watch the Testimonial
David Boyle

“99% of the time, RootSecure is contacting us before we even know there is an issue. That's one of the most invalueable things... it's almost like having another employee."

// IT Department, city of guelph
Watch the Testimonial
Dan Amyot

“RootSecure has enabled Guelph Hydro to do two things; 1. Quantifying where we stand on risk mitigation, 2. Exposing where our existing holes are. If you're looking for a solution that is low cost with high value, this is what youre looking for."

// director of information systems, guelph hydro
Watch the Testimonial

RootSecure Partners

Dedicated partnerships aimed towards mutual growth and success.
Committed to assisting companies manage, measure and reduce their cyber risk.

Contact Us

Get in Touch

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.