253 RapidFire Tools Reviews
Overall Review Sentiment for RapidFire Tools
Log in to view review sentiment.

Ease of use in general, it's easy to install on a new network and doesn't require great knownledge about networking to make it work. We did some extended trial and the product was for us game changer.
The onboarding product as any Kaseya product is great and the consultant take their time to explain every bit of information.
Don't forget to package it with Vulscan! Review collected by and hosted on G2.com.
Pricing could be a little bit challenging when implenting at first. You should already have some prospect and lead before digging into it. Review collected by and hosted on G2.com.
The flexibility to update or modify vulnerability databases according to the specific needs of the environment is a significant advantage. Review collected by and hosted on G2.com.
Like many vulnerability scanners, VulScan can generate false positives or miss certain vulnerabilities (false negatives), especially if the version information of the service is incomplete or obscured. Review collected by and hosted on G2.com.

Clean, easy to understand interface. You do need a decent understanding of compliance standards and auditing for it to provide the most value. Review collected by and hosted on G2.com.
The automatic sync of vulnerability and scanning data sync could use some ease of use work. If you actually tried to manage vulnerabilities through the GRC itself it can be tedious. Review collected by and hosted on G2.com.
The results I got back from running the tests. Review collected by and hosted on G2.com.
The learning curve to leverage all of it's abilities was a little steep. Review collected by and hosted on G2.com.
Network Detective has so many features to make scanning networks and endpoints a breeze! From the automation to easy installations, it is well worth your time. Review collected by and hosted on G2.com.
Removing a discovery agent means the endpoint must be online and it must be uninstalled. This can be frustrating when you want to remove it from an organization. If the device is lost or stolen, it seems like it may be impossible to remove. Review collected by and hosted on G2.com.
There are many detailed compliance requirements to enable and monitor, capable of granular setup. Review collected by and hosted on G2.com.
Onboarding and training could be better. Requires a lot of prior knowledge and experience to be able to fully utilize the product. Review collected by and hosted on G2.com.
Rich feature set, but not much else to praise Review collected by and hosted on G2.com.
Data is not easily exportable if the review is not complete, answering questions requires a lot of guessing and there is not as much context or details on what each question is truly asking for Review collected by and hosted on G2.com.
It has capabilities apart from vulnerability management is that the automation, efficiency and the actionable insights, where it has flexible remediation as well as the guidance for actionable steps, updates on threats and the customization for the reports. Review collected by and hosted on G2.com.
Limitations in Customization for reporting, it requires a dedicated training Review collected by and hosted on G2.com.
Easy to use, quickly gathers pertienent information needed to give potential clients best recommendation for IT hardware replacements Review collected by and hosted on G2.com.
It has some limitations like unable to grab GPU hardware info from devices, but we've met with Kaseya development team and this will be added in a later future release. Review collected by and hosted on G2.com.
it is very good at scanning issues, can detect almost everything, costumer support is very reliable too ! Review collected by and hosted on G2.com.
can be hard to use or scan sometimes, must do a bit of work like enabling wmi etc.. Review collected by and hosted on G2.com.