Quem usa Rumble?

Rumble was built for organizations that need better visibility into modern network environments; enterprise IT, but also cloud, hybrid, legacy, virtual, operational, industrial, and clinical.

O que é Rumble?

Rumble enables IT, network, and security teams to quickly enumerate network-connected assets without the need for credentials or tap port access, extracting MAC addresses from remote subnets and discovering intended and accidental topologies. Rumble easily integrates into other platforms through a remote API and multiple export formats.

Rumble - Informação

Critical Research

https://www.rumble.run

Fundada em 2018

Rumble - Preços

Rumble a partir de 99,00 US$/mês. Rumble não possui uma versão gratuita, mas oferece versão de teste grátis. Veja mais informações sobre preços do Rumble abaixo.

Preço inicial

99,00 US$/mês
Veja detalhes de preços

Detalhes dos preços

Rumble is priced based on the number of Live Assets, that's it!

Versão gratuita

Não

Implantação

Instalado - Mac

Nuvem, SaaS, web

Instalado - Windows

Formação

Documentos

Assistência

Horário comercial

Online

Recursos do Rumble

Software para Mapeamento de Rede
Códigos/ícones com cores
Descoberta automática de dispositivos
Exportação de mapas
Mapas com atualização automática
Mapeamento baseado na localização
Mapeamento hierárquico
Mapeamento sob demanda
Rastreamento de conformidade
Relatórios e análise de dados

Rumble - Avaliações

Exibindo 5 de 29 avaliações

Geral
4.9/5
Praticidade
4.9/5
Atendimento ao cliente
5/5
Recursos
4.8/5
Relação qualidade/preço
4.9/5
Andrés S.
Information Security Manager
Bancos, 1001-5000 funcionários
Usou o software para: Avaliação gratuita
  • Classificação geral
    5/5
  • Praticidade
    5/5
  • Recursos e funcionalidades
    4/5
  • Atendimento ao cliente
    5/5
  • Relação qualidade/preço
    4/5
  • Probabilidade de recomendação
    9/10
  • Fonte da avaliação 
  • Avaliado em 12/03/2020

"Cutting through complexity assets management and shadow IT"

Comentários: Amazing

Vantagens: Ease of use; very simple, in one shot you're able to identify Shadow IT and Network Bridges

Desvantagens: I know it's not a vulnerability manager, but would be great to include a risk score, regarding the assets, due old operating system

Resposta dos fornecedores

por Critical Research em 13/03/2020

Great feedback! We will investigate additional reporting around obsolete and end of life detection product detection.

  • Fonte da avaliação 
  • Avaliado em 12/03/2020
Bob R.
Chief Data Scientist
Serviços e tecnologia da informação, 1001-5000 funcionários
Usou o software para: 6 a 12 meses
  • Classificação geral
    5/5
  • Praticidade
    5/5
  • Recursos e funcionalidades
    5/5
  • Atendimento ao cliente
    5/5
  • Relação qualidade/preço
    5/5
  • Probabilidade de recomendação
    10/10
  • Fonte da avaliação 
  • Avaliado em 12/03/2020

"Gain complete visibility and control of your network"

Comentários: Outstanding. Professional from the start. Does what it says on the tin. Hands-free updates. Complete network, system, and service visibility.

Vantagens: Incredibly easy to acquire, install, and (securely) update. I have the agent installed on multiple nodes and had zero issues with any of them (even macOS Catalina systems with the new, invasive permissions structure). Via the web UX I have quick access to reports and current status. The data download makes it super easy to use in analytics environments. The service is constantly updated with new features and signatures, making it straightforward to identify new devices and services as they emerge. The alerting capability helped identify an IoT device that "went rogue" and installed a telnet service port without permission (that device is now in the town electronics recycling facility). It's one of the few IT and IT security products and services that did what it said on the tin Day 1 and continues to do so without any intervention on my part.

Desvantagens: It's honestly difficult to find a serious flaw. Agent releases are paced and come with great features and bug fixes. I think, perhaps, one improvement could be to provide "prompts" or "coaxes" in the UX to help novice users (and those who do not have a steeped background in IT or security) identify ways they could use the service to better manage their infrastructure, identify issues, and be proactive.

Resposta dos fornecedores

por Critical Research em 13/03/2020

Thanks for the feedback! We will look into UX improvements to help guide new users.

  • Fonte da avaliação 
  • Avaliado em 12/03/2020
Jim C.
Security Specialist
Telecomunicações, 51-200 funcionários
Usou o software para: 1 a 5 meses
  • Classificação geral
    5/5
  • Praticidade
    5/5
  • Recursos e funcionalidades
    5/5
  • Atendimento ao cliente
    5/5
  • Relação qualidade/preço
    5/5
  • Probabilidade de recomendação
    10/10
  • Fonte da avaliação 
  • Avaliado em 16/03/2020

"Assurance for the external attack surface"

Comentários: We are using Rumble to provide an independent check of the services visible on our exposed external network surface, with both fast and slow/comprehensive scans. This provides assurance that network-level and server-level controls are configured appropriately.

Vantagens: It was easy to use Rumble for the targeted job of asset discovery, without having to consider the impact of most products' actual scope of vulnerability detection.
By having to provide our own agent for the scanning endpoint, we remain in complete control of the source of the scans, and can integrate it into existing firewall and other protective technologies easily.

Desvantagens: Analysing the changes over time isn't very easy in the current system, it highlights changes between current and last scan just fine but other periods are much more difficult. There aren't a lot of facilities for controlling the impact or utilisation of the agent on the scanning machine; I'd like to be able to judge just 'how fast' we can effectively scan from within Rumble's management.

Resposta dos fornecedores

por Critical Research em 19/03/2020

Thanks for the feedback!

  • Fonte da avaliação 
  • Avaliado em 16/03/2020
Andrew D.
Security Analyst
Educação superior, 1001-5000 funcionários
Usou o software para: 1 a 5 meses
  • Classificação geral
    4/5
  • Praticidade
    4/5
  • Recursos e funcionalidades
    4/5
  • Atendimento ao cliente
    Não avaliado
  • Relação qualidade/preço
    4/5
  • Probabilidade de recomendação
    7/10
  • Fonte da avaliação 
  • Avaliado em 13/03/2020

"Drew's Review"

Comentários: It's a solid product for quickly getting a manifest of hosts, services and accompanying metadata and leveraging that information into something useful.

Vantagens: For my organization we use it to keep a handle on what hosts are on the network (both ones that are in our catalog and those we do not know about). We also use it to get an idea on what kind of services are running and version information and to do so quickly. That is one area where this app really excels, it's crazy fast compared to doing common NMAP scans.

Desvantagens: I'd like recurring scans to get queued if their time comes and there is another scan in progress (or at least have the option to have them queued). Trying to schedule scans to completely turn over a 10.x.x.x space when you're doing a couple class b subnets at a time is on par with air traffic control as far as difficulty.

Resposta dos fornecedores

por Critical Research em 17/03/2020

Thanks for the feedback! On the scan queue side, this is partially implemented, but limited to a four-hour window, and could definitely be more configurable.

  • Fonte da avaliação 
  • Avaliado em 13/03/2020
Mikel G.
Owner
Serviços e tecnologia da informação, Profissional autônomo
Usou o software para: Mais de um ano
  • Classificação geral
    5/5
  • Praticidade
    5/5
  • Recursos e funcionalidades
    5/5
  • Atendimento ao cliente
    5/5
  • Relação qualidade/preço
    5/5
  • Probabilidade de recomendação
    10/10
  • Fonte da avaliação 
  • Avaliado em 13/03/2020

"Rumble is the way"

Comentários: I can always see the inventory and when things are not being used. I can save on licensing and resources if the tools or software are not being turned on at all.

Vantagens: I like the simple interface and the speed with witch it discovers items on the network.

Desvantagens: There could be some functionality added to allow easier interacting with the discovered devices. One click remote desktop or some way to add tools like NMap to a menu to further explore devices.

Resposta dos fornecedores

por Critical Research em 16/03/2020

Thanks for the feedback! We have added one-click RDP to the Services Inventory (for port 3389) and will look into additional tool and service integrations.

  • Fonte da avaliação 
  • Avaliado em 13/03/2020