Wie gebruikt Rumble?

Rumble was built for organizations that need better visibility into modern network environments; enterprise IT, but also cloud, hybrid, legacy, virtual, operational, industrial, and clinical.

Wat is Rumble?

Rumble enables IT, network, and security teams to quickly enumerate network-connected assets without the need for credentials or tap port access, extracting MAC addresses from remote subnets and discovering intended and accidental topologies. Rumble easily integrates into other platforms through a remote API and multiple export formats.

Rumble - Details

Critical Research

https://www.rumble.run

Opgericht in 2018

Rumble - Prijsoverzicht

Rumble vanaf US$ 99,00/maand. Rumble heeft geen gratis versie maar biedt wel een gratis proefperiode. Hieronder vindt u extra prijsinformatie voor Rumble.

Beginprijs

US$ 99,00/maand
Zie de prijsinformatie

Prijsinformatie

Rumble is priced based on the number of Live Assets, that's it!

Gratis versie

Nee

Implementatie

Geïnstalleerd - Mac

Cloud, SaaS, Web

Geïnstalleerd - Windows

Training

Documentatie

Ondersteuning

Kantooruren

Online

Functies van Rumble

Network mapping software
Automatische apparaatherkenning
Compliance bijhouden
Hiërarchische toewijzing
Kaarten exporteren
Kaarten met automatische updates
Kleurcodes en -pictogrammen
Locatiegebaseerde kaartgegevens
On-demand toewijzing
Rapportage en analyse

Reviews van Rumble

5 van 29 reviews worden weergegeven

In totaal
4.9/5
Gebruiksgemak
4.9/5
Klantenservice
5/5
Functies
4.8/5
Waar voor je geld
4.9/5
Andrés S.
Information Security Manager
Bankwezen, 1.001-5.000 werknemers
Heeft de software gebruikt voor: Gratis proef
  • Totaalscore
    5/5
  • Gebruiksgemak
    5/5
  • Functies en functionaliteit
    4/5
  • Klantenondersteuning
    5/5
  • Waar voor je geld
    4/5
  • Waarschijnlijkheid van aanbeveling
    9/10
  • Bron van de reviewer 
  • Beoordeeld op 12-3-2020

"Cutting through complexity assets management and shadow IT"

Opmerkingen: Amazing

Pluspunten: Ease of use; very simple, in one shot you're able to identify Shadow IT and Network Bridges

Minpunten: I know it's not a vulnerability manager, but would be great to include a risk score, regarding the assets, due old operating system

Antwoord van de leverancier

van Critical Research op 13-3-2020

Great feedback! We will investigate additional reporting around obsolete and end of life detection product detection.

  • Bron van de reviewer 
  • Beoordeeld op 12-3-2020
Bob R.
Chief Data Scientist
Informatietechnologie en -diensten, 1.001-5.000 werknemers
Heeft de software gebruikt voor: 6-12 maanden
  • Totaalscore
    5/5
  • Gebruiksgemak
    5/5
  • Functies en functionaliteit
    5/5
  • Klantenondersteuning
    5/5
  • Waar voor je geld
    5/5
  • Waarschijnlijkheid van aanbeveling
    10/10
  • Bron van de reviewer 
  • Beoordeeld op 12-3-2020

"Gain complete visibility and control of your network"

Opmerkingen: Outstanding. Professional from the start. Does what it says on the tin. Hands-free updates. Complete network, system, and service visibility.

Pluspunten: Incredibly easy to acquire, install, and (securely) update. I have the agent installed on multiple nodes and had zero issues with any of them (even macOS Catalina systems with the new, invasive permissions structure). Via the web UX I have quick access to reports and current status. The data download makes it super easy to use in analytics environments. The service is constantly updated with new features and signatures, making it straightforward to identify new devices and services as they emerge. The alerting capability helped identify an IoT device that "went rogue" and installed a telnet service port without permission (that device is now in the town electronics recycling facility). It's one of the few IT and IT security products and services that did what it said on the tin Day 1 and continues to do so without any intervention on my part.

Minpunten: It's honestly difficult to find a serious flaw. Agent releases are paced and come with great features and bug fixes. I think, perhaps, one improvement could be to provide "prompts" or "coaxes" in the UX to help novice users (and those who do not have a steeped background in IT or security) identify ways they could use the service to better manage their infrastructure, identify issues, and be proactive.

Antwoord van de leverancier

van Critical Research op 13-3-2020

Thanks for the feedback! We will look into UX improvements to help guide new users.

  • Bron van de reviewer 
  • Beoordeeld op 12-3-2020
Jim C.
Security Specialist
Telecommunicatie, 51-200 werknemers
Heeft de software gebruikt voor: 1-5 maanden
  • Totaalscore
    5/5
  • Gebruiksgemak
    5/5
  • Functies en functionaliteit
    5/5
  • Klantenondersteuning
    5/5
  • Waar voor je geld
    5/5
  • Waarschijnlijkheid van aanbeveling
    10/10
  • Bron van de reviewer 
  • Beoordeeld op 16-3-2020

"Assurance for the external attack surface"

Opmerkingen: We are using Rumble to provide an independent check of the services visible on our exposed external network surface, with both fast and slow/comprehensive scans. This provides assurance that network-level and server-level controls are configured appropriately.

Pluspunten: It was easy to use Rumble for the targeted job of asset discovery, without having to consider the impact of most products' actual scope of vulnerability detection.
By having to provide our own agent for the scanning endpoint, we remain in complete control of the source of the scans, and can integrate it into existing firewall and other protective technologies easily.

Minpunten: Analysing the changes over time isn't very easy in the current system, it highlights changes between current and last scan just fine but other periods are much more difficult. There aren't a lot of facilities for controlling the impact or utilisation of the agent on the scanning machine; I'd like to be able to judge just 'how fast' we can effectively scan from within Rumble's management.

Antwoord van de leverancier

van Critical Research op 19-3-2020

Thanks for the feedback!

  • Bron van de reviewer 
  • Beoordeeld op 16-3-2020
Andrew D.
Security Analyst
Hoger onderwijs, 1.001-5.000 werknemers
Heeft de software gebruikt voor: 1-5 maanden
  • Totaalscore
    4/5
  • Gebruiksgemak
    4/5
  • Functies en functionaliteit
    4/5
  • Klantenondersteuning
    Zonder beoordeling
  • Waar voor je geld
    4/5
  • Waarschijnlijkheid van aanbeveling
    7/10
  • Bron van de reviewer 
  • Beoordeeld op 13-3-2020

"Drew's Review"

Opmerkingen: It's a solid product for quickly getting a manifest of hosts, services and accompanying metadata and leveraging that information into something useful.

Pluspunten: For my organization we use it to keep a handle on what hosts are on the network (both ones that are in our catalog and those we do not know about). We also use it to get an idea on what kind of services are running and version information and to do so quickly. That is one area where this app really excels, it's crazy fast compared to doing common NMAP scans.

Minpunten: I'd like recurring scans to get queued if their time comes and there is another scan in progress (or at least have the option to have them queued). Trying to schedule scans to completely turn over a 10.x.x.x space when you're doing a couple class b subnets at a time is on par with air traffic control as far as difficulty.

Antwoord van de leverancier

van Critical Research op 17-3-2020

Thanks for the feedback! On the scan queue side, this is partially implemented, but limited to a four-hour window, and could definitely be more configurable.

  • Bron van de reviewer 
  • Beoordeeld op 13-3-2020
Mikel G.
Owner
Informatietechnologie en -diensten, Zelfstandig ondernemer
Heeft de software gebruikt voor: 1+ jaar
  • Totaalscore
    5/5
  • Gebruiksgemak
    5/5
  • Functies en functionaliteit
    5/5
  • Klantenondersteuning
    5/5
  • Waar voor je geld
    5/5
  • Waarschijnlijkheid van aanbeveling
    10/10
  • Bron van de reviewer 
  • Beoordeeld op 13-3-2020

"Rumble is the way"

Opmerkingen: I can always see the inventory and when things are not being used. I can save on licensing and resources if the tools or software are not being turned on at all.

Pluspunten: I like the simple interface and the speed with witch it discovers items on the network.

Minpunten: There could be some functionality added to allow easier interacting with the discovered devices. One click remote desktop or some way to add tools like NMap to a menu to further explore devices.

Antwoord van de leverancier

van Critical Research op 16-3-2020

Thanks for the feedback! We have added one-click RDP to the Services Inventory (for port 3389) and will look into additional tool and service integrations.

  • Bron van de reviewer 
  • Beoordeeld op 13-3-2020