Browse AppStore
RocketCyber’s threat detection apps provide solutions for many cybersecurity use cases. Each use case facilitates cyber monitoring opportunities for the managed service provider. Login to your account to turn on preferred RocketApps, no separate installation required.
Each App is purposely built to detect malicious/suspicious activity spanning endpoint, network and cloud attack pillars. When threats are detected, RocketCyber provides you with an actionable triage view and the ability to receive incident tickets to your PSA.
![Card image cap](/wp-content/uploads/2023/02/appMarket-devCard-suspNetwork.jpg)
Dark Web ID Monitor
This app will ingest alerts from Kaseya's Dark Web ID Module.
![Card image cap](/wp-content/uploads/2023/02/appMarket-devCard-suspNetwork.jpg)
Datto Ransomware Detection
This app will deploy and monitor the Datto Ransomware Detection engine. This engine monitors for file ransomware encryption activity on Windows desktops and servers. When ransomware activity is detected the offending process will be terminated and the device will be automatically isolated from the network.
![Card image cap](/wp-content/uploads/2023/02/appMarket-devCard-suspNetwork.jpg)
Log4j Detector
Log4j Detector The Log4j Detector app will look for vulnerable versions of Log4j and active exploitation of CVE-2021-44228 and CVE-2021-45046 which allows remote code execution via the Apache Log4j library, a Java-based logging tool. The vulnerability allows an attacker that can control log messages to execute arbitrary code loaded from attacker-controlled servers. The Log4j Detector app will do the following: 1. Detect vulnerable versions of Log4j prior to version 2.16.0 2. Detect the attempted exploitation of Log4j using Yara scripts to scan log files.
![Card image cap](/wp-content/uploads/2023/02/appMarket-devCard-suspNetwork.jpg)
Office 365 Risk Detection
Focus on the riskiest accounts, users, and behaviors. Determined risk through a combination of industry heuristics and machine learning.
![Card image cap](/wp-content/uploads/2023/02/appMarket-devCard-suspNetwork.jpg)
IOC MONITOR
Continuous monitoring for Indicators of Compromise to address emerging and changing threats.
![Card image cap](/wp-content/uploads/2023/02/appMarket-devCard-suspNetwork.jpg)
DATTO EDR MONITOR
This app receives events from Datto EDR.
![Card image cap](/wp-content/uploads/2023/02/appMarket-devCard-defendManager.jpeg)
DEFENDER FOR BUSINESS
This app collects detection data and events from Microsoft Defender for Business.
![Card image cap](/wp-content/uploads/2023/02/appMarket-devCard-suspNetwork.jpg)
VULSCAN COLLECTOR
This app collects vulnerability scan data generated by RapidFire Tools Vulscan and feeds back details on all issues including remediation recommendations.
![Card image cap](/wp-content/uploads/2023/02/appMarket-devCard-suspNetwork.jpg)
GRAPHUS
This app collects threat telemetry from Graphus Email Security.
![Card image cap](/wp-content/uploads/2023/09/RC-Apps-Header-Image.jpg)
VSA THREAT HUNT
Detects threat artifacts and indicators for the Kaseya VSA RMM.
![Card image cap](/wp-content/uploads/2023/09/RC-Apps-Header-Image.jpg)
EXCHANGE HAFNIUM EXPLOIT
Detects threat artifacts and indicators for Microsoft Exchange on-prem.
![Card image cap](/wp-content/uploads/2023/02/appMarket-devCard-Sophos.jpeg)
SOPHOS MONITOR
Monitor Sophos NGAV threat and log activity, then leverage RocketCyber SOC for triaging and PSA incident ticketing
![Card image cap](/wp-content/uploads/2023/02/appMarket-devCard-Passly2FAMonitor.jpeg)
PASSLY MONITOR
Monitor Passly 2FA log activity, then leverage RocketCyber SOC for triaging and PSA incident ticketing.
![Card image cap](/wp-content/uploads/2023/02/appMarket-devCard-suspNetwork.jpg)
BARRACUDA EMAIL MONITOR
Monitor your Barracuda ESS or Sentinel email threats, then leverage RocketCyber SOC for triaging and PSA incident ticketing.
![Card image cap](/wp-content/uploads/2023/02/appMarket-devCard-DNSfilter.jpeg)
DNSFILTER MONITOR
Monitor DNS Filter threat and log activity, then leverage RocketCyber SOC for triaging and PSA incident ticketing.
![Card image cap](/wp-content/uploads/2023/02/appMarket-devCard-pawned.jpeg)
PWNED MONITOR
Monitor your SMB customer email and domain accounts to identify if they have been compromised in a data breach.
![Card image cap](/wp-content/uploads/2023/02/appMarket-devCard-deepInstinctMonitor.jpeg)
DEEP INSTINCT MONITOR
This app reports on Deep Instinct threat detections and brings in the results to the RocketCyber SOC Platform.
![Card image cap](/wp-content/uploads/2023/02/appMarket-devCard-suspNetwork.jpg)
PRINT NIGHTMARE HUNT
This app performs critical checks for the Windows Remote Code Execution Print Spooler Vulnerabilities.
![Card image cap](/wp-content/uploads/2023/02/appMarket-devCard-ironScalesMonitor.jpeg)
IRONSCALES EMAIL SECURITY ANALYZER
This app reports on IronScales email threats and brings in the results to the RocketCyber SOC Platform.
![Card image cap](/wp-content/uploads/2023/02/appMarket-devCard-bitDefenderMonitor.jpeg)
BITDEFENDER MONITOR
This app reports on BitDefender threat detections and brings in the results to the RocketCyber SOC Platform.
![Card image cap](/wp-content/uploads/2023/02/appMarket-devCard-breach.jpeg)
CYLANCE MONITOR
This app reports on Cylance threat detections and brings in the results to the RocketCyber SOC Platform.
![Card image cap](/wp-content/uploads/2023/02/appMarket-devCard-breach.jpeg)
WEBROOT MONITOR
This app reports on Webroot threat detections and brings in the results to the RocketCyber SOC Platform.
![Card image cap](/wp-content/uploads/2023/02/appMarket-devCard-sentineloneMonitor.jpeg)
SENTINELONE MONITOR
This app reports on SentinelOne threat detections and brings in the results to the RocketCyber SOC Platform. This app supports remediation actions and whitelisting.
![Card image cap](/wp-content/uploads/2023/02/appMarket-devCard-defendManager.jpeg)
DEFENDER MANAGER
This app provides full multi-tenant command and control of Microsoft Defender. Now you have the power to utilize the advanced capabilities including Attack Surface Reduction, Advanced Ransomware protection and more.
![Card image cap](/wp-content/uploads/2023/02/appMarket-devCard-firewallLogMonitor.jpeg)
FIREWALL LOG ANALYZER
This app provides multi-tenant firewall log monitoring acting as a syslog collector. Messages are parsed, analyzed and enriched with threat intel for potential threat indicators. When a threat or security event is detected, meassage details show up in the console.
![Card image cap](/wp-content/uploads/2023/02/appMarket-devCard-Off365LoginAnalyzer-02.jpeg)
OFFICE 365 LOG MONITOR
Multi-tenant event log monitor for all accounts linked to Microsoft Office 365 providing visibility into users, groups, Azure Active Directory activity and more.
![Card image cap](/wp-content/uploads/2023/02/appMarket-devCard-Off365LogMonitor-02.jpeg)
OFFICE 365 LOGIN ANALYZER
Detects successful and unsuccessful logins outside the expected countries, known malicious IP addresses and adversaries, exposing unauthorized authentication activity.
![Card image cap](/wp-content/uploads/2023/02/appMarket-devCard-Off365SecureScore-02.jpeg)
OFFICE 365 SECURE SCORE
Overall description of cloud security posture with itemized remediation plans across all Office 365 tenants.
![Card image cap](/wp-content/uploads/2023/02/appMarket-devCard-advBreach.jpeg)
ADVANCED BREACH DETECTION (TTPS)
Continuous monitoring app for attacker Tactics, Techniques, & Procedures that circumvent security prevention defenses such as Anti-virus and Firewalls.
![Card image cap](/wp-content/uploads/2023/02/appMarket-devCard-cyberTerror.jpeg)
CYBER TERRORIST NETWORK CONNECTION
This app detects network connections to nation states that are known to engage in cyberterrorist activities targeting small businesses.
![Card image cap](/wp-content/uploads/2023/02/appMarket-devCard-maliciousFileDetect.jpeg)
MALICIOUS FILE DETECTION
Monitors and detects malicious files that are written to disk or executed. This app is used as a backup for detecting malicious files that slip past your primary Anti-virus solution.
![Card image cap](/wp-content/uploads/2023/02/appMarket-devCard-suspNetwork.jpg)
SUSPICIOUS NETWORK SERVICES
Monitors TCP & UDP services that are commonly leveraged for malicious intent and detects unnecessary services mitigating a potential backdoor.
![Card image cap](/wp-content/uploads/2023/02/appMarket-devCard-suspTools.jpeg)
SUSPICIOUS TOOLS
Detects suspicious tools that should not be present on SMB networks such as hacking utilities, password crackers, etc. used for malicious intent.
![Card image cap](/wp-content/uploads/2023/02/appMarket-devCard-cryptoCurrency.jpeg)
CRYPTO MINING DETECTION
Monitors for Cryptojacking, the unauthorized use of a computer to mine cryptocurrency. Detects for endpoint presence and in-browser javascript miners.
Read More![Card image cap](/wp-content/uploads/2023/02/appMarket-devCard-systemProcess.jpeg)
SYSTEM PROCESS VERIFIER
Analyzes system processes for known suspicious or malicious behaviors based on various factors including disk image location, timestamp fingerprinting and Levenshtein distance calculations.
![Card image cap](/wp-content/uploads/2023/02/appMarket-devCard-eventLog.jpeg)
ENDPOINT EVENT LOG MONITOR
Microsoft Windows & macOS event log monitoring detects and alerts security related activities such as failed logins, clearing security logs, unauthorized activity, etc.
Read More![Card image cap](/wp-content/uploads/2023/02/AD-Sync-RocketCyber-App.png)
ACTIVE DIRECTORY MONITOR AND SYNC
This app will monitor for changes to user accounts in Active Directory and synchronize changes to the Breach Secure Now Cloud. Optionally reporting changes to the RocketCyber Console