Qui utilise Rumble ?

Rumble a été conçu pour les entreprises qui ont besoin d'une meilleure visibilité sur les environnements réseau modernes, les services informatiques des entreprises, mais aussi les systèmes sur le cloud, hybrides, historiques, virtuels, opérationnels, industriels et cliniques.

Description de Rumble

Rumble permet aux équipes informatiques, réseau et de sécurité de cataloguer rapidement les actifs connectés au réseau sans avoir besoin d'informations d'identification ni d'accès aux ports, pour extraire les adresses MAC à partir de sous-réseaux distants et découvrir les topologies prévues et accidentelles. Rumble s'intègre facilement à d'autres plateformes via une API à distance et plusieurs formats d'exportation.

Informations sur Rumble

Critical Research

https://www.rumble.run

Fondé en 2018

Prix de Rumble

Rumble est disponible en version gratuite et propose un essai gratuit. La version payante de Rumble est disponible à partir de 99,00 $US/mois.

À partir de

99,00 $US/mois
Consulter les tarifs

Version gratuite

Oui

Essai gratuit

Déploiement

Installation (Mac)

Cloud, SaaS, web

Installation (Windows)

Formation

Documentation

Ressources d'aide

Support en horaire de bureau

En ligne

Rumble - Fonctionnalités

Logiciels de mappage réseau
Cartes à mise à jour automatique
Cartographie à la demande
Découverte automatique d'appareils
Exportation de cartes
Icônes et codes en couleur
Mappage basé sur l'emplacement
Mappage hiérarchique
Rapports et analyses
Suivi de la conformité

Avis sur Rumble

Afficher 5 avis sur 32

Note globale
4,9/5
Facilité d'utilisation
4,9/5
Service client
4,9/5
Fonctionnalités
4,8/5
Rapport qualité-prix
4,9/5
Utilisateur vérifié
Senior Director of Security & Cloud Operations
Services et technologies de l'information, 51-200 employés
Temps d'utilisation du produit: 6 à 12 mois
  • Note globale
    5/5
  • Facilité d'utilisation
    5/5
  • Fonctionnalités
    5/5
  • Support client
    Sans note
  • Rapport qualité-prix
    5/5
  • Probabilité de recommander le produit
    10/10
  • Provenance de l'utilisateur 
  • Publié le 13/03/2020

"Very happy - easy to use, provides info"

Commentaires: Rumble was very easy to roll out so that I can keep track of our AWS environment, as well as our various office networks. It's super simple to set up but gives me all the info I need. It also serves as a NIDS to some degree, and ensures that we have an eye on what's running, especially if it's surprising.

Avantages: Rumble was very easy to roll out so that I can keep track of our AWS environment, as well as our various office networks. It's super simple to set up but gives me all the info I need.

Inconvénients: I had to put it on Raspberry Pi's but that's because we are not heavy users of VMware or the like. Having it as a plug-and-play appliance (hardware) might be a nice future enhancement?

Réponse de l'éditeur

envoyé par Critical Research le 17/03/2020

Thanks for the feedback! We will look into having a standard hardware platform in the future (or at least making the documentation more clear on options).

  • Provenance de l'utilisateur 
  • Publié le 13/03/2020
Jim C.
Security Specialist
Télécommunications, 51-200 employés
Temps d'utilisation du produit: 1 à 5 mois
  • Note globale
    5/5
  • Facilité d'utilisation
    5/5
  • Fonctionnalités
    5/5
  • Support client
    5/5
  • Rapport qualité-prix
    5/5
  • Probabilité de recommander le produit
    10/10
  • Provenance de l'utilisateur 
  • Publié le 16/03/2020

"Assurance for the external attack surface"

Commentaires: We are using Rumble to provide an independent check of the services visible on our exposed external network surface, with both fast and slow/comprehensive scans. This provides assurance that network-level and server-level controls are configured appropriately.

Avantages: It was easy to use Rumble for the targeted job of asset discovery, without having to consider the impact of most products' actual scope of vulnerability detection.
By having to provide our own agent for the scanning endpoint, we remain in complete control of the source of the scans, and can integrate it into existing firewall and other protective technologies easily.

Inconvénients: Analysing the changes over time isn't very easy in the current system, it highlights changes between current and last scan just fine but other periods are much more difficult. There aren't a lot of facilities for controlling the impact or utilisation of the agent on the scanning machine; I'd like to be able to judge just 'how fast' we can effectively scan from within Rumble's management.

Réponse de l'éditeur

envoyé par Critical Research le 19/03/2020

Thanks for the feedback!

  • Provenance de l'utilisateur 
  • Publié le 16/03/2020
Lance H.
Manager Cybersecurity
Recrutement, 1 001-5 000 employés
Temps d'utilisation du produit: 6 à 12 mois
  • Note globale
    5/5
  • Facilité d'utilisation
    5/5
  • Fonctionnalités
    4/5
  • Support client
    5/5
  • Rapport qualité-prix
    5/5
  • Probabilité de recommander le produit
    10/10
  • Provenance de l'utilisateur 
  • Publié le 10/04/2020

"Rumble Asset Discovery"

Commentaires: We’ve been incredibly impressed with what Rumble is able to deliver considering how easy it is deploy and how little resources it requires. Our organization has around 10,000 assets across 50 locations and the complete configuration and deployment took about one day of work. One other item to mention is how incredible support is. We’ve had a few questions and issues along the way and support has been the most responsive I’ve ever experienced. We regularly get not only responses but actual deployed product updates quicker than it sometimes takes to get a response from my own staff. I’m talking hours and in some cases minutes.

Avantages: Ease of use and speed of deployment are standout features. Prior to Rumble we did not have a comprehensive network based asset identification tool. We used a home grown set of bash scripts and scheduled tasks to identify devices as they connected to the network. While this gave us point in time changes it lacked any sense of historical view of our network. Rumble uses bleeding edge techniques for identifying network connected devices, many of which the team itself has created, which provides two huge benefits. First, it provides extremely accurate asset identification. Second, and probably even more important, is that all of the data gathered by scanning an asset is added to the database and can be queried. This data is extremely useful for our security operations team when attempting to quantify the impact of a newly published vulnerability. The web interface is also incredibly quick to search render. Very impressive considering the amount of data generated by the scanners.

Inconvénients: What makes Rumble so good could also been seen as a slight drawback, its laser focus on asset identification. Rumble is by no means an asset management tool, nor does it claim to be, but what it provides is the foundation of all asset management systems. It would be nice to expand it into that type of system.

Réponse de l'éditeur

envoyé par Critical Research le 21/04/2020

Thanks for the feedback!

  • Provenance de l'utilisateur 
  • Publié le 10/04/2020
Andrew D.
Security Analyst
Enseignement supérieur, 1 001-5 000 employés
Temps d'utilisation du produit: 1 à 5 mois
  • Note globale
    4/5
  • Facilité d'utilisation
    4/5
  • Fonctionnalités
    4/5
  • Support client
    Sans note
  • Rapport qualité-prix
    4/5
  • Probabilité de recommander le produit
    7/10
  • Provenance de l'utilisateur 
  • Publié le 13/03/2020

"Drew's Review"

Commentaires: It's a solid product for quickly getting a manifest of hosts, services and accompanying metadata and leveraging that information into something useful.

Avantages: For my organization we use it to keep a handle on what hosts are on the network (both ones that are in our catalog and those we do not know about). We also use it to get an idea on what kind of services are running and version information and to do so quickly. That is one area where this app really excels, it's crazy fast compared to doing common NMAP scans.

Inconvénients: I'd like recurring scans to get queued if their time comes and there is another scan in progress (or at least have the option to have them queued). Trying to schedule scans to completely turn over a 10.x.x.x space when you're doing a couple class b subnets at a time is on par with air traffic control as far as difficulty.

Réponse de l'éditeur

envoyé par Critical Research le 17/03/2020

Thanks for the feedback! On the scan queue side, this is partially implemented, but limited to a four-hour window, and could definitely be more configurable.

  • Provenance de l'utilisateur 
  • Publié le 13/03/2020
Bob R.
Chief Data Scientist
Services et technologies de l'information, 1 001-5 000 employés
Temps d'utilisation du produit: 6 à 12 mois
  • Note globale
    5/5
  • Facilité d'utilisation
    5/5
  • Fonctionnalités
    5/5
  • Support client
    5/5
  • Rapport qualité-prix
    5/5
  • Probabilité de recommander le produit
    10/10
  • Provenance de l'utilisateur 
  • Publié le 12/03/2020

"Gain complete visibility and control of your network"

Commentaires: Outstanding. Professional from the start. Does what it says on the tin. Hands-free updates. Complete network, system, and service visibility.

Avantages: Incredibly easy to acquire, install, and (securely) update. I have the agent installed on multiple nodes and had zero issues with any of them (even macOS Catalina systems with the new, invasive permissions structure). Via the web UX I have quick access to reports and current status. The data download makes it super easy to use in analytics environments. The service is constantly updated with new features and signatures, making it straightforward to identify new devices and services as they emerge. The alerting capability helped identify an IoT device that "went rogue" and installed a telnet service port without permission (that device is now in the town electronics recycling facility). It's one of the few IT and IT security products and services that did what it said on the tin Day 1 and continues to do so without any intervention on my part.

Inconvénients: It's honestly difficult to find a serious flaw. Agent releases are paced and come with great features and bug fixes. I think, perhaps, one improvement could be to provide "prompts" or "coaxes" in the UX to help novice users (and those who do not have a steeped background in IT or security) identify ways they could use the service to better manage their infrastructure, identify issues, and be proactive.

Réponse de l'éditeur

envoyé par Critical Research le 13/03/2020

Thanks for the feedback! We will look into UX improvements to help guide new users.

  • Provenance de l'utilisateur 
  • Publié le 12/03/2020