The What's New At NetAlly

The What's New At NetAlly

I had the opportunity to sit down with Jeff McCullough and Brad Reinboldt of NetAlly to find out what is new. Having spent many years with my trusty Link Sprinter, I was keen to hear what evolutions of products and services they might offer to help MSPs and MSSPs in troubleshooting networks, scanning for vulnerabilities, mapping to common frameworks, and documenting and tracking their findings are part of the new reality. I truly enjoyed the discussion around what it is that NetAlly does today and how far they have come over their 30-year journey.

I had the opportunity to sit down with Jeff McCullough and Brad Reinboldt of NetAlly to find out what is new. Having spent many years with my trusty Link Sprinter, I was keen to hear what evolutions of products and services they might offer to help MSPs and MSSPs in troubleshooting networks, scanning for vulnerabilities, mapping to common frameworks, and documenting and tracking their findings are part of the new reality. I truly enjoyed the discussion around what it is that NetAlly does today and how far they have come over their 30-year journey.

[00:00:06] Welcome to MSP 1337. I'm your host, Chris Johnson, a show dedicated to cybersecurity challenges, solutions, a journey together, not alone. Welcome everybody to another episode of MSP 1337. As many of you know, it is 2025.

[00:00:29] And I have decided that there will be probably a few, one or two per month where I bring on a vendor who brings something unique to you, the audience. And for those of you that remember back in the day, a product called the Link Sprinter. Maybe it was yellow. Maybe you were, maybe you're young enough to only know the green edition.

[00:00:53] But I have brought with me today, I have two brilliant individuals from NetAlly, Jeff McCullough and Brad Reinbold. Welcome to the show. Hey Chris, thanks. Oh, thank you. Thanks for the invite, Chris. So, I bring up the candy bar, the little tiny thing that you can literally fit in your pocket, because I think it was one of the biggest game changers for my MSP. And so, when I was connected with you, I was like, yes, please.

[00:01:22] I want to know what NetAlly is doing today. And so, in setting up this show, I want, obviously, both of you to tell us a little bit about NetAlly and what they've been up to the last few years. It's been a while since I dug deep into the NetAlly product, other than to wire my house. I used my little tester to make sure things were proper. But then we know that there's two very distinct things that we want to talk about today that I think every MSP will be keen on.

[00:01:49] The first one, obviously, is the traditional, you know, every network engineer or help desk person that might be getting sent to a client site needs to have in their hands. But I'm excited then to get to, as we get into the latter part of the show, is to talk about Cyberscope. And I was actually quite impressed. And so, just to tease it a little bit, it involves CIS. It involves NIST CSF. So, stay tuned. We'll get into the cybersecurity here in a little bit.

[00:02:18] So, Brad, why don't you go ahead and kick us off? Or I guess, Jeff, if you want to go first, I don't want to, no fighting on the show, obviously. We're virtual, so it'll hurt really bad. Yeah, Jeff and I talked. We're not going to argue today, right, Jeff? That's right. And then we'll go from there. Okay, awesome. Yeah, thanks. Thanks, Chris. And again, excited to be here and give an update to everybody who might know about NetAlly or those who have never heard of NetAlly, give you a quick overview.

[00:02:47] So, NetAlly as a company is about five years old, but we actually have a 30-year history. NetAlly actually spun out of Fluke Networks. And usually when people haven't heard of NetAlly, they'll have heard of Fluke.

[00:03:01] And so we have a longstanding heritage of providing tools such as the tools you've used in the past for testing, validating, discovering network devices. Our focus is on the wired and wireless segments of the market.

[00:03:22] We offer a portfolio of handheld products that allow frontline workers to identify, troubleshoot, and resolve issues quickly and efficiently. As you noted, it's a tool everybody should have in their bag when they're being dispatched or walking into a customer's site or into a data center trying to solve a big problem.

[00:03:44] Our tools are the standard go-to to help really validate and confirm the stability or the integrity of the network, the network connection, all the way up through the network stack. So, we're a critical part of the resolution strategy that engineers use to solve their problems.

[00:04:14] At the same time, we've been evolving and growing. Our portfolio has really been modernized. We've refreshed our entire portfolio from our entry-level products all the way up through our high-end products like CyberScope. And really have started to shift our value proposition while we continue to focus on supporting the network engineer.

[00:04:32] We're really trying to help executives, leadership within companies understand how they can be better at their roles, how they can hit their KPIs, how they can deliver against their biggest challenges by leveraging our products in a more aggressive way across your organization. So, when you hire a new network engineer, you typically give them a laptop. You want to make sure you're giving them a network test device as well. Give them the tools to do their jobs.

[00:05:01] And when we look at customers and we talk to our own customers, they are telling us that they're reducing the time it takes to resolve problems. They're reducing their costs by eliminating third-party support organizations. They're improving their user experience significantly. And all of those are the things that line up with what you look at CIO priorities in 2025. You're going to find all of those things, agility, customer experience, cost reduction.

[00:05:31] All of those are going to be on the list. So, we really think of ourselves as being able to not only help the frontline worker, but really help leadership deliver against their agenda in the new year. So, I think the portfolio is really interesting from our handheld products through our LinkLive platform, which is our cloud-based or private platform that gathers all of that information in an organization.

[00:05:56] Those tools, the complete portfolio, really helps, allows us to focus on simplicity for the customer, visibility in their environment, and then collaboration across the organization. So, it's an exciting time for NetAlly and a lot of expansion that we're doing. Before we go to Brad, I just want to point out, you mentioned that everyone should have it in their tool bag. I mean, this is the equivalent of a multi-tool, right?

[00:06:25] Like, there's no network engineer that's doing any sort of rack-type stuff that doesn't have, you know, the Philips, Flathead, a few other combo things in that screwdriver. And quite honestly, it's kind of shameful if they don't at least have that. This is, I would argue, the equivalent of that in the, you know, network space because it does roughly, I'd say conservatively, about a dozen things by itself.

[00:06:51] And when you guys added the web interface that took us beyond the ability for me to just look at it on my smartphone and see the things that were showing up. You created what every network engineer or MSP should be doing today, which is when you are connecting that asset to their network. You're creating the documentation that identifies what is actually plugged into that port on that switch that's getting out to, hopefully, the internet.

[00:07:20] Or not, if it's not supposed to. I just, I don't want to sugarcoat it, but I think that is probably one of the most undervalued asset that I, when I run into MSPs that are still doing, you know, build outs or troubleshooting on-prem. Why they don't, you can get it on Amazon. This is crazy. It's this 2025. Like, really, why do you not have one of these? Yeah, thanks. No, I'd agree.

[00:07:45] And I think that's the, you know, when we will, we see a lot of customers that'll buy one for the data center and they'll, they'll share it or they'll box it up and ship it across country when somebody has a need. And again, when you, you consider the, the time to resolution, you know, how do you, everybody's trying to work faster, smarter, get things done.

[00:08:08] And, you know, even if you'd next day air something, you, you, you're just talking about a lag there where they have this in their hand. You just, you, you, you just, you, you, you pay for yourself. It pays for itself immediately in those scenarios. So, yeah, I would agree. I mean, it's, it's the, it's the go-to tool and, and it, it helps network engineers just do their jobs better, which is, you know, what, what we're, what we aim to do. All right.

[00:08:36] Brad, you got anything you want to add to Jeff's monologue? Well, no, yeah, I haven't got much, you know, only in the sense that I would say that, again, kind of leveraging what he spoke to. The first thing I'd say is that, and he again alluded to it, Jeff, that, you know, we've been around in some form since 1993 with the land meter. And so our history is long. Our lineage goes way back. And all these technologies, right, Jeff?

[00:09:01] Over the years, we've been building on them, the various applications, solutions, problem-solving capabilities. Again, everything I talk about with the handhelds applies just as well with Link Live, which we'll get into in a bit. But suffice to say that over the years, we've developed a suite of tools that really allows anyone from just basic connectivity testing all the way up to layer seven testing to really understand what specifically is going on or not going on that ought to be going on in a particular network environment.

[00:09:29] And all in the context of the edge, which is, you know, I've been in this business, well, for 30 years, but it actually working for an ally, the last three. And it's interesting, you know, the edge is a very dynamic environment. And, you know, our customers, which run the gamut from some of the largest to the smallest, they all have one thing, at least in common, is they all have an edge.

[00:09:54] And on that edge, they got people coming and going, things connecting that maybe ought not to be connecting, people coming into maybe a branch location, leaving the branch location, perhaps inadvertently or advertently leaving things behind.

[00:10:08] Whatever the case might be over the years, we've really learned that, you know, we want to sell tools that when he or she goes into that location, they can quickly get an idea of what exactly is going on in that network and how to go about rectifying any issues or problems they might see, whether it's networking and or whether it's security with the more recent CyberScope, which builds on all that 30 plus years of technology.

[00:10:33] Can you imagine trying to identify unauthorized assets in an airport on the wireless? I mean, it's the amount of noise that's there is. Yeah. Yeah. And it's interesting over the years, our various SEs and even myself, we go into environments and just, you know, just as a guest going into a network. And it's like, oh, hmm, that's up. I wonder if they know that's going on. So there is a lot of that. And it's interesting. I'll just tell a story. I won't even tell you what event it was at.

[00:11:03] But suffice to say, with respect to like CyberScope, you know, sometimes we've flagged things and actually gone and kind of told somebody, you know, kind of so to voce. Like, you know, you might want to take a look at so-and-so. And then Ken Ted Haji, you know, just believe me. Just believe me. Okay. Just go take a look at it. And we'll wait if you want. But no, absolutely. And again, it goes back to just the history that goes, you know, all these years and all this technology that we built on.

[00:11:29] And again, I'm sure many of the listeners of this podcast are familiar with it, whether it's the green NetAli colors. Right, Jeff? More going back, there's been various colors. I won't give the names, but suffice to say that it hasn't only been green over the years. Some of our tools have been various colors. But they've all helped. One thing they have in common, they've all helped, you know, get to the bottom of issues and connectivity or otherwise. So. Yeah, that's good stuff. I will say, I did find this out.

[00:11:56] If you have an old yellow device, you can get it configured to take advantage of what we wanted to talk about next, which is the web portal, or I guess it's called Link Live. And the value that that brings, which obviously goes way beyond what I was talking about at the beginning, where it's like I would look at it on my smartphone. And if I didn't do some sort of screenshot or save it off, it was essentially gone as soon as I disconnected from the Link Sprinter.

[00:12:24] So tell me more about that, because I think that's a good segue to talk about your wired and wireless solutions. First, I think on the networking side, we've kind of alluded to some of the things that you can do. And then I really want to spend the, you know, the latter half or more focusing on what you really bring to the table from the Cyberscope side of things. Sure. Yeah, I'll talk about Link Live, and then we'll dive into Cyberscope.

[00:12:52] So, yeah, so Link Live, and I joined NetAlly back in September, so still relatively new. But, you know, when I was looking through the products and the portfolio, the one product that really stood out to me is maybe the most strategic is Link Live, right? It's the, it's cloud hosted.

[00:13:10] We also sell it or make it available as an on-prem private version for customers that are, you know, security sensitive or don't want to, you know, have information out on the cloud. In a public cloud environment, we offer it as a private version. But what it does is it allows all of our devices from the, our lowest end Link Sprinter devices all the way up to Cyberscope to be able to not only capture data and look at the data on the device, but then port it up into the cloud platform.

[00:13:39] So that you can later go back and look at it or somebody at the headquarter location can bring all of that information in. We have analytics that lets you look across the portfolio and look for trends across your devices and within the data. We have the ability to take remote control of the device. So if you have an engineer who's on site, somebody back at the, at a council could actually take control of that device and actually look at themselves at what's going on or run tests on the device.

[00:14:07] If they want to run a specific test or modify a script. So Link Live really creates, it's really what is the key to the collaboration value that we bring to the table, letting customers, you know, capture data locally, store it in the repository, look at it later. And we have an API set as well that lets you export that data if you want to use it for other purposes.

[00:14:31] So it's a nice extensible tool, but most importantly, it brings together, whether you have five of our devices or a hundred of our devices, bring it all together in a central repository and be able to look at it all as a, as an organization, which is, which is super powerful. It's the requirements, right? Like we're, we're seeing the shift and what is allowed to be, you know, not tracked is, is shifting dramatically and not knowing what is happening in your own environment

[00:14:59] or documenting the proof that it is configured the way it's, you've said it's configured is, it's game changer for, you know, evidence gathering that quite honestly, without expensive infrastructure can be, you know, taxing and, and, and out, out of reach for many MSPs. Yes. Yes. Let me just add to what Jeff said, you know, specifically for MSPs or MSSPs, you know, the report generation capability, the ability to share information, you can give log on to different clients, right, Jeff?

[00:15:28] So you might have, you know, a set of 10, 15, 20 customers you go to, they can all go out and look again, it's highly secure for their particular results. They can go out and kind of see like, okay, so they went out to this branch or this location. You know, what'd they do? They did a wifi server. They did a, they did a cybersecurity, you know, assessment. They can kind of look at those results. You can format PDFs, right, Jeff? You can output results, but you know, we can get that information to the right stakeholders. And Jeff spoke earlier to it.

[00:15:56] And again, we're really, we're strategic. And I think we're, you know, that's the one thing, Jeff, I think we as a company really have to speak to. When it comes to the edge, we are really strategic. There's so much going on there. And we're so very good at the edge in terms of discovery and finding those vulnerabilities that can, under certain circumstances, be missed by other tools. And so, you know, as part of their overall, I'm speaking now specifically of their cybersecurity posture. Sure.

[00:16:24] The cyberscope is definitely something that, again, MSPs, MSSPs, to their customers of all sizes and say, hey, we're already in here doing wifi surveys. You know, I've got this tool. I can find some vulnerabilities, you know, maybe some unsecured printers. Jeff said earlier, maybe an access point that's not authorized, especially like, say, in a campus environment, lots of people coming and going. Yeah. Most good people, sometimes perhaps, well, anyway.

[00:16:50] And again, our tool can come in, again, and it's also ongoing. You know, everybody listening to this podcast, you don't just go into a client once and leave for a year. Right. You're going back. And with our tools, including Cyberscope, you can go back and periodically check again and say, here's what you had on June 1st. Here's what you have on August 1st. You want to talk about these deltas? Yeah, I think that's a really good point to bring up is, you know, when we do go on site to troubleshoot something

[00:17:16] and you identify things like the IoT devices that weren't there before Christmas, but suddenly are now unpacked and in places that they probably shouldn't be. Or the second one is, you know, everything seems to be normal with the exception of what we fixed, which was something got plugged in and spanning tree hadn't been something stupid. And we identify, but we captured information that's valuable. And then, like you said, yeah, maybe it's maybe it is a year later.

[00:17:43] And they're like, all of a sudden, they've got a random problem to be able to go back and look and go, hey, when we were here, this is what it looked like. We have not physically been there since. Look at the changes we found that you have made or someone else has made. And here's the proof, which I think many in many cases, we didn't capture evidence that we could take back.

[00:18:06] And if we did, it'd be hard to say that it was definitively from that environment just because of the way in which it was, you know, recorded. Yeah. Why don't you give it like a quick high level overview of Cyberscope? We've been talking about it, but it'd be great to frame out what it is. Yeah, absolutely. So to begin, it's built on this long history of Etherscope, AirCheck G3, which, again, many of the folks on this listening to this podcast will appreciate, but may even have.

[00:18:36] Right. And so we took that and, you know, essentially like three or four years ago, we found that a number of MSPs and just general customers were essentially using our networking tools for cybersecurity. So, for instance, they might do a Wi-Fi survey and then say, hmm, it's interesting. I see these 38 access points. That's all copacetic. Right. But what are these other two? Right. Or, you know, other examples might be like, you know, we're supposed to be running the latest security. That's interesting. For whatever reason, you know, this particular, it's back level. It's only WPA or something. Right.

[00:19:06] Sure. So what we thought was, how can we simplify for MSPs and our customers and make it even better and easier? So we took, again, Etherscope. And on top of that, by the way, you get all the technology that comes with Etherscope. So if you want to do standard cable testing, it's all there. But on top of that, we offer various types of vulnerability assessments. And it allows you to, like, for instance, validate the edge infrastructure hardening of your environment.

[00:19:35] Confirm wired and Wi-Fi security. Are specific ports open on a switch that don't need to be open? They are. Close them. You can automate. We spoke to this earlier. We can automate the discovery process and vulnerability scanning. So, again, with a CyberScope, for example, you could leave it at a client's, maybe periodically go back in and do snapshots of it. And, again, see over time how things are changing. Frequently, especially at the edge, I understand we added those printers or what have you. Right.

[00:20:04] But it very quickly allows you to differentiate. It actually highlights for you what's changed. And all this information starts at CyberScope or any of their other tools. And gets pushed up into LinkLive, mostly automatically. With AutoTest, you can push them up. And from there, you can see snapshots over time. Things that are changing. Get a baseline. Build on that. And we find both our customers and our MSPs or MSSPs, they really like to see changes. Right. You're going along fine. It's like your automobile.

[00:20:33] You're going along fine. And there's a new noise. It's like, hmm, right? Same thing with network. Right. It's like, yep, yep, those changes. Yep, we did all those things. What's that? And then be able to very quickly locate it. Again, our tool, one of the things we're really trying to focus on, too, is that we have a very distinct perspective. And maybe it's obvious. Our tool connects at the network edge. And it's like, well, duh.

[00:20:58] But a lot of tools, like when we go to trade shows now, we're one of the only tools that's like, here, Chris, look at it. Hold it. A lot of those tools are centralized. It's great. It's brilliant that they're all centralized. But as they come in. But as they come in and go down towards the edge of the network, there are potential obstacles, segmentation errors, what have you, that might make it such that they can't discover everything on the network. We are connecting directly to the edge of the network.

[00:21:23] And in doing so, we offer a perspective that can augment many of those other centralized tools that really fill out exactly what's going on at time T when you go into that environment. Yeah, I think what's interesting is you guys have talked about it actually quite a bit, not in the context of cybersecurity, but in the amount of time that we really have to make a decision about next steps.

[00:21:49] And I think that's what's really interesting here is the evolution over the 30-year timeline hasn't been about continuing to diversify your product portfolio. It has been to continuously layer that which is important to the CIO or the CISOs, those that are making strategic decisions around business, financial risk, non-IT specific things.

[00:22:16] And then going, wait a second, you mean there's a tool that can help us make better decisions about the environments we're responsible for without being a FTE or some other ongoing reoccurring cost that maybe we can't afford, especially when it uncovers what some of these we've seen uncovering. That's going to cost a lot to fix and that will solve the problem. So glad I invested in this tool, right?

[00:22:44] Absolutely. Part of that strategy too, the strategicness of our tool is that right from the get-go, we realize that many of the people on this call, their clients and customers on this podcast, they're responsible to mapping to various security frameworks. Yeah. And so if you're going to really be serious about this business, you just can't come in in kind of an abstract way saying, well, we help bolster your security. Well, that's all kind of interesting, but it's like all specifically.

[00:23:10] So for example, not limited to this only, but the CIS critical controls, there are specific areas where we can help. We can't do all 18, but there's specific ones, 1, 4, 7, 12, 13, and 18, where we can augment a lot of the other tools that are in the environment, especially at the edge, to help build out that confidence at that enterprise level that you're complying with, again, in this particular case, CIS, but you could substitute NIST. Sure.

[00:23:38] You have NIST 2 going on in Europe. It's just, that's just bubbling up now. But to be strategic and really be valuable as a strategic partner and add business value, you need to kind of speak that greater language. And again, one example would be these various frameworks that we map directly to specific ones at the edge. Yes. And for everybody listening, every one of you is going to get something. No, just kidding. It's there.

[00:24:07] You can go to our website and get a picture of it for sure. That's right. No charge. You can get pictures from our website for free. Like screenshots are totally. All you want. All you can eat. Yeah. Yeah. So if I was providing guidance to anybody that's not familiar with any of the products, where would you encourage them to start? If I was to evaluate today, whether it's the Lynx printer or maybe I'm getting all the way into the Cyberscope space, where would you recommend starting? Especially in today's world.

[00:24:37] I'm not trying to put words in your mouth, but I was thinking about like the different products you have. Like you mentioned that there's the wired wireless combo, but so many environments anymore. Like there is a several assets that are wired. It's the server room firewall internet, right? Like there's not a ton of wired assets in many cases anymore. It's become quite a bit less. Is there a place that you recommend someone starting as far as evaluating your devices? Jeff, do you want to think about that?

[00:25:06] Well, yeah. Yeah. You start with NetLi.com, right? I think that's the best place to go. We have a lot of content there. If you're a partner, our partner portal also has a wealth of information for partners to take training, white papers, guys, et cetera. So there's a lot of information that you can get online, readily available for customers and partners.

[00:25:37] So I would start there. I don't know, Brad, if there's maybe some white papers that you would recommend. Yeah, if you just go out to look at NetLi. You can also go to the Cyberscope website as well, and I can give you the URL. I'll pull that up in a second and provide that.

[00:25:54] But suffice to say that there's a lot of great information that talks about the CIS critical controls, for example, but also speaks to some of the use cases, again, that we already spoke to in terms of being able to address specific needs, whether it's on the networking side or on the security side and or both, right? Depending upon your specific needs. And again, as I said earlier, once you get to that point, we have a number of different, the ones that people would know, partners that can work with you.

[00:26:20] And we are more than willing to get on that call, NetLi folks like myself, like the SEs, like our sales reps, and kind of talk to you about your specific use cases. There may be places, right, Jeff, where maybe you just need link spreaders. Fine, great. There's places for those basic connectivity. Maybe other situations for different people, staff members that may need a little bit stronger tools, like with Etherscope or what have you, with more capabilities.

[00:26:45] And, you know, we've got a number of people within your organization and the resellers and so forth that we've empowered to help you make the best decision for your specific needs. Well, I think you mentioned the evolution of the products was in large tied to how the devices were being used. Like I'm using this link spreader as part of my cybersecurity review or survey of your environment.

[00:27:11] You know, I was looking through some of the white papers earlier and two things came to mind for me. And please correct me if this is wrong, but it would seem that from when it comes to networking, there's two things that stand out probably more than any other potential problem in their environment. Number one is misconfigured networks or misconfigured devices.

[00:27:33] And then the second one would be assets that shouldn't be present that obviously are difficult to find because those that want assets that are convenient tend to have, you know, good ideas of hiding them. Or like, hey, guess what? Guess who's coming tomorrow to check on our environment? Like quick, unplug your personal printer and put it in your desk drawer or that access point or echo or echo show or fill in the blank. Right.

[00:28:00] Like, but if you can put something on there and you can at least, you know, see the data from what's maybe been the last 30 days or some of that information that gets captured through a scan of a switch, those kind of things. Is that fair? Like, is it more often than not that there's actual just problems with the way it's been configured? Then yeah, Bobby, so you got malware running on here. So we should probably do something about that. Yeah. I mean, I think it runs, you know, it runs the gamut. It includes that. But, you know, for every one of those, it can just be kind of benign things.

[00:28:26] And we have many examples, you know, some at some local universities where, you know, a professor, he or she just brings a printer and a little like the one I got upstairs, a little HP 3900. You buy it for 150 bucks, right? You know, and every port in the world is open. It's just like out of the box. They bring it in. Well, I just didn't want to walk down the hall. It's like, you've got to shut that down. You know, right. There's like, oh, I didn't realize it. You know, I just want to get a little bit of better Wi-Fi, you know, coverage. So did I should not have brought that gate? Oh, I didn't realize. You know, right.

[00:28:55] So for every one of those kind of nefarious ones, it's just as much, right, Jeff, misconfigured. Someone brings in a device completely benignly. Sure. They hook it up. But when they do that, they're opening a door for someone to pull up in front of that building. It's like he or she can gain access. Yeah. Move laterally. So I would agree. It's it's absolutely, you know, the the intentions are all, you know, virtuous.

[00:29:21] But the implementation is troublesome. Right. It creates gaps. And, you know, in the and the nefarious people are out there looking for the gaps. Right. They're looking for the issues. You know, we've one of one of the markets that we're really strong in is is conventions and casinos. Right. Because in casinos you have, you know, when you look at casino floors, you're talking a bunch of a ton of IP connected devices. Right.

[00:29:49] All the slot machines, all these devices are connected. And, you know, for some casinos, they're moving stuff around all the time. And so you start to lose track of what ports are active, what ports, you know. And so it's easy for someone to slip in and plug in a access point and all of a sudden get an entry. Right. Yeah. So, you know, there's lots of scenarios where it's the unintended consequences that are the biggest risk.

[00:30:15] And I think that's where, again, we we've we've shined a light on those things, both physical, the physical infrastructure and then the security infrastructure. I feel like that's where the proof comes in. Right. Like I remember doing some experiments with leave a data cable not plugged in to the wall, even though it doesn't need to be like. So if it's a phone that's got a second port, put a six foot patch cable on that port and just see what happens.

[00:30:41] If it's visible, inevitably someone sees, hey, that looks like it matches to that. I should plug that back in. Right. And all of a sudden you have a problem. Well, that's not a very useful way to explain to the client that there's a bunch of idiots plugging cables in because they were there and they needed to be plugged in. This gives real evidence. Right.

[00:31:02] Like this shows that, hey, no, you plug something in that is actually causing a problem to the efficiency or maybe it's compromising the entire environment because now it's broadcasting out to the Internet, creating a homing beacon for someone who is a nefarious actor. That's yeah. Yes. If I were to say anything about what I get from looking at your products is just the proof.

[00:31:23] I think proof is so hard to come by in our space, especially when you're trying to explain to those that are not tech savvy or really, you know, no one wants to have an acronym explained to them, especially if it's a doctor, because there's a good chance you're both using the same acronym and it means two completely different things. Yeah. And, you know, I was just jumping with the link live where you could communicate that with, I didn't even mention the dashboards. Yeah. You can communicate, give them access.

[00:31:52] Like here's, here's the result. It's just, it's here it is. I mean, you want a PDF, you want to show it right, Jeff, we have dashboards. Here's exactly the access points. I mean, you can, it's just very easy for, again, the people listening to this podcast to, to make it, you know, monetize it to, or enable it for your customers to, to really see, went out to these sites. You did this. This is the results. You went out T plus Delta T. This is the result. They're all up there. They're all available.

[00:32:19] You can make it directly or indirectly available to their clients and, and really make it a win-win both for the MSPs and MSSPs as well as their customers and clients. Yeah. We're running out of time. Is there any last thing you would like to share with the audience before we go? Go ahead. I'll just say really first.

[00:32:42] To me, you want to really, if I, you know, if you get, you said, give me one thing I would say, and you're asking me, our ability to discover is fantastic. If you want to really know what's going on in an environment at the edge, our tool is really great at discovery, which can help your, your, your clients and your customers really understand what's happening at the edge. If you, if you found everything, you know, what you can't see can hurt you. Right.

[00:33:11] When you see everything, that's the foundation. Everything else, we could talk about vulnerability scans and all that. So my takeaway is that if you really want to give your customer confidence that he or she, or they know what's going on in that particular environment, our cyber scope or one of our many other tools, fantastic tool to, to trust, but verify. Got it. Awesome. Great way to end. All right. Well, for those of you listening, this has been an episode of MSP 1337. Thanks and have a great week. Thank you.