RootSecure
RootSecure's risk assessment products constantly probe your network, monitor your connected devices and test your organization's social engineering resilience, providing a qualified, real-time view into your cyber risks and letting you focus your actions.

RootSecure quantifies cyber and data risk, arming information technology and security teams with real-time, actionable insight from comprehensive and continuous vulnerability assessment of networks, devices, and people.
RootSecure Reach
With Reach, you can understand your cyber security posture and risk profile, make informed decisions, and meet your compliance requirements.

Reach continuously scans your network, cataloging your core infrastructure, equipment/peripherals, workstations, Internet of Things (IoT) and personal (i.e., BYOD) devices – anything IP-connected – and looking for vulnerabilities resulting from misconfigurations, outdated software, and other risk vectors.
RootSecure Scout
With Scout, you gain authoritative, firsthand knowledge of exactly what is happening on your devices.

A host-based agent monitors hardware and software, system logs, peripheral activity, visible wireless networks, privilege escalations, file modification history - and much more - to reveal risks that can only be detected through careful on-device observation. All information is securely transferred to the RootSecure Cloud for analysis, where you can explore the findings in your RootSecure Dashboard.
RootSecure Echo
Echo puts your people to the test and quantifies how vulnerable your organization is to social engineering attacks, both broad and targeted.

Echo makes running simulated social engineering campaigns effortless through simple – but powerful –management and configuration utilities that let you choose from templates and even add personalization. The results, which are easy to interpret, are showcased in the RootSecure Dashboard and let you know exactly where you need to take action to lower your organization’s risk.
Main products

Risk. Managed.
Take advantage of a series of risk assessment capabilities.

01
RootSecure Reach iVA

RootSecure Reach iVA arms you with actionable insight from continuous risk assessment of network vulnerabilities and onsite vulnerability scanning with log analysis.

Learn More
02
RootSecure Reach eVA

RootSecure Reach eVA arms you with actionable insight from continuous risk assessment of network vulnerabilities gained by  external vulnerability scanning with log analysis.

Learn More
03
RootSecure Scout

RootSecure Scout extends visibility inside devices, with continuous host-based monitoring to reveal threats and user behaviour that put your organization at risk.

Learn More
04
RootSecure Echo

RootSecure Echo is a turnkey social engineering simulator that measures your organization’s susceptibility to human fallibility and risky behaviour.

Learn More

RootSecure Reach iVA

Take informed, prioritized action to reduce exposure.

RootSecure Reach arms you with actionable insight from continuous risk assessment of network vulnerabilities, gained by onsite vulnerability scanning with log analysis.

Continuous Risk Scanning

Ongoing scans, rather than occasional ones, avoid risky delays in security awareness by keeping constant watch utilizing multiple scanning engines and internal/external scanning.

Proactive Risk Monitoring

Information provided by Reach is constantly analyzed in the RootSecure Cloud with threat analysis, anomaly detection and machine learning algorithms that proactively alert you to new risks.

Dynamic Asset Identification

Automatic and continuous mapping, profiling and classification of your network assets builds a comprehensive inventory to enable risk assessment, action prioritization and anomaly detection.

Log Consumption and Monitoring

Collect and analyze device logs; for instance, firewall logs let you monitor inbound and outbound connection to detect unauthorized access and understand attack traffic your firewall is successfully discarding.

Automatic Update

Software and vulnerability feeds update automatically, for zero - maintenance management.

Stateless Scanning & Secure Transfer

To maximize security, scanning results are not store locally.

Deployment Flexibility

The on-premise sensor is quickly and easily deployed out-of-brand as either a physical appliance or virtual machine.

"The product is designed to do what a user is expecting from the system. They (RootSecure) seem to take feedback from the users and apply it into improvements in the product so it continues to meet our requirements today as well as new ones that may emerge tomorrow."

// Jeff Latimer, eSolutions

Reach eVA

Put Your Network to the Test

With Reach eVA, you can understand your company's digital footprint

External Vulnerability Assessment

Dynamically detect and automatically scan your digital footprint. Allows you to know exactly what hackers see.

Web Server Scan

Put your website to the test with in-depth application scanning

Automatic Sub-Domain Detection

Know how your domain is being used with automatic sub-domain scanning

Darkweb Scan

3rd party APIs into the darkweb identify what hackers know about your external IPs and domains

Continuous Scanning

Get the RootSecure advantage with continuous scanning so you never miss new risks in your network

"I find that every time we need help, RootSecure is there for us and they are willing to dig into your network, they are willing to learn about your business, and learn what your needs are to really make the product come alive into your environment."

// David Boyle, City of Guelph

RootSecure Scout

Predicting risks, to let you take proactive intervention.

RootSecure Scout extends visibility inside devices, with continuous host-based monitoring to reveal threats and user behaviour that put your organization at risk.

Scout Agent

On-device software continuously monitors logs, systems and user activity to identify risk and build up a baseline of audit data that can used in anomaly detection and machine learning-enabled predictive algorithms.

Proactive Risk Monitoring

Information provided by Scout is constantly analyzed in the RootSecure Cloud with threat analysis, anomaly detection and machine learning algorithms that proactively alert you to new risks.

Audit Reporting

Reports audit information to the RootSecure Cloud to establish system baselines, which are subsequently used for anomaly detection, and to power machine learning, risk prediction algorithms.

Are you confident in the security of your network, connected devices and personelle?

Put your organization to the test!
Request a Demo

RootSecure Echo

Letting you configure and customize campaigns for maximum relevance

RootSecure Echo is a turnkey social engineering simulator that measures your organization’s susceptibility to human fallibility and risky behaviour.

People Risk Score

Aggregate score (out of ten) indicating an organization's risk due to the cyber behaviour of its personnel.

Email Phishing Simulation

Everything needed to test an organization's resilience to phishing attacks by managing simulated email phishing campaigns.

Crowdsourced Templates

Contribute and benefit from a community of security professionals when developing effective phishing campaigns.

Intelligent Landing Pages

Custom landing pages for maximum impact with your audience. Redirect to custom pages or educational content.

Dave Mitton

“The Dashboard allowed us to see what was actually on our network - it was a wake up call to what security threats actually existed. ”

// Manager, IT Operations & infrastructure
Watch the Testimonial
Jeff Latimer

“In RootSecure we receive a continuous vulnerability and risk management solution to look at and assess the security of our technology environment and we are quite happy with the service.”

// hosting services manager, esolutions
Watch the Testimonial
David Boyle

“99% of the time, RootSecure is contacting us before we even know there is an issue. That's one of the most invalueable things... it's almost like having another employee."

// IT Department, city of guelph
Watch the Testimonial
Dan Amyot

“RootSecure has enabled Guelph Hydro to do two things; 1. Quantifying where we stand on risk mitigation, 2. Exposing where our existing holes are. If you're looking for a solution that is low cost with high value, this is what you're looking for."

// director of information systems, guelph hydro
Watch the Testimonial

RootSecure Partners

Dedicated partnerships aimed towards mutual growth and success.
Committed to assisting companies manage, measure and reduce their cyber risk.

Contact Us

Get in Touch

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.