Rumble

Rumble

by Critical Research

Who Uses Rumble?

Rumble was built for organizations that need better visibility into modern network environments; enterprise IT, but also cloud, hybrid, legacy, virtual, operational, industrial, and clinical.

What Is Rumble?

Rumble enables IT, network, and security teams to quickly enumerate network-connected assets without the need for credentials or tap port access, extracting MAC addresses from remote subnets and discovering intended and accidental topologies. Rumble easily integrates into other platforms through a remote API and multiple export formats.

Rumble Details

Critical Research

https://www.rumble.run

Founded 2018

Rumble Pricing Overview

Rumble starts at US$99.00/month. Rumble does not have a free version but does offer a free trial. See additional pricing details for Rumble below.

Starting Price

US$99.00/month

Pricing Details

Rumble is priced based on the number of Live Assets, that's it!

Free Version

No

Free Trial

Yes

Deployment

Installed - Mac

Cloud, SaaS, Web

Installed - Windows

Training

Documentation

Support

Business Hours

Online

Rumble Features

Network Mapping Software
Color Codes/Icons
Compliance Tracking
Device Auto Discovery
Hierarchical Mapping
Location-Based Mapping
Map Exporting
On-Demand Mapping
Reporting/Analytics
Self-Updating Maps

Rumble Reviews

Showing 5 of 29 reviews

Overall
4.9/5
Ease of Use
4.9/5
Customer Service
5/5
Features
4.8/5
Value for Money
4.9/5
Andrés S.
Information Security Manager
Banking, 1,001-5,000 Employees
Used the Software for: Free Trial
  • Overall Rating
    5/5
  • Ease of Use
    5/5
  • Features & Functionality
    4/5
  • Customer Support
    5/5
  • Value for Money
    4/5
  • Likelihood to Recommend
    9/10
  • Reviewer Source 
  • Reviewed on 12/03/2020

"Cutting through complexity assets management and shadow IT"

Comments: Amazing

Pros: Ease of use; very simple, in one shot you're able to identify Shadow IT and Network Bridges

Cons: I know it's not a vulnerability manager, but would be great to include a risk score, regarding the assets, due old operating system

Vendor Response

by Critical Research on 13/03/2020

Great feedback! We will investigate additional reporting around obsolete and end of life detection product detection.

  • Reviewer Source 
  • Reviewed on 12/03/2020
Bob R.
Chief Data Scientist
Information Technology & Services, 1,001-5,000 Employees
Used the Software for: 6-12 months
  • Overall Rating
    5/5
  • Ease of Use
    5/5
  • Features & Functionality
    5/5
  • Customer Support
    5/5
  • Value for Money
    5/5
  • Likelihood to Recommend
    10/10
  • Reviewer Source 
  • Reviewed on 12/03/2020

"Gain complete visibility and control of your network"

Comments: Outstanding. Professional from the start. Does what it says on the tin. Hands-free updates. Complete network, system, and service visibility.

Pros: Incredibly easy to acquire, install, and (securely) update. I have the agent installed on multiple nodes and had zero issues with any of them (even macOS Catalina systems with the new, invasive permissions structure). Via the web UX I have quick access to reports and current status. The data download makes it super easy to use in analytics environments. The service is constantly updated with new features and signatures, making it straightforward to identify new devices and services as they emerge. The alerting capability helped identify an IoT device that "went rogue" and installed a telnet service port without permission (that device is now in the town electronics recycling facility). It's one of the few IT and IT security products and services that did what it said on the tin Day 1 and continues to do so without any intervention on my part.

Cons: It's honestly difficult to find a serious flaw. Agent releases are paced and come with great features and bug fixes. I think, perhaps, one improvement could be to provide "prompts" or "coaxes" in the UX to help novice users (and those who do not have a steeped background in IT or security) identify ways they could use the service to better manage their infrastructure, identify issues, and be proactive.

Vendor Response

by Critical Research on 13/03/2020

Thanks for the feedback! We will look into UX improvements to help guide new users.

  • Reviewer Source 
  • Reviewed on 12/03/2020
Jim C.
Security Specialist
Telecommunications, 51-200 Employees
Used the Software for: 1-5 months
  • Overall Rating
    5/5
  • Ease of Use
    5/5
  • Features & Functionality
    5/5
  • Customer Support
    5/5
  • Value for Money
    5/5
  • Likelihood to Recommend
    10/10
  • Reviewer Source 
  • Reviewed on 16/03/2020

"Assurance for the external attack surface"

Comments: We are using Rumble to provide an independent check of the services visible on our exposed external network surface, with both fast and slow/comprehensive scans. This provides assurance that network-level and server-level controls are configured appropriately.

Pros: It was easy to use Rumble for the targeted job of asset discovery, without having to consider the impact of most products' actual scope of vulnerability detection.
By having to provide our own agent for the scanning endpoint, we remain in complete control of the source of the scans, and can integrate it into existing firewall and other protective technologies easily.

Cons: Analysing the changes over time isn't very easy in the current system, it highlights changes between current and last scan just fine but other periods are much more difficult. There aren't a lot of facilities for controlling the impact or utilisation of the agent on the scanning machine; I'd like to be able to judge just 'how fast' we can effectively scan from within Rumble's management.

Vendor Response

by Critical Research on 19/03/2020

Thanks for the feedback!

  • Reviewer Source 
  • Reviewed on 16/03/2020
Andrew D.
Security Analyst
Higher Education, 1,001-5,000 Employees
Used the Software for: 1-5 months
  • Overall Rating
    4/5
  • Ease of Use
    4/5
  • Features & Functionality
    4/5
  • Customer Support
    Unrated
  • Value for Money
    4/5
  • Likelihood to Recommend
    7/10
  • Reviewer Source 
  • Reviewed on 13/03/2020

"Drew's Review"

Comments: It's a solid product for quickly getting a manifest of hosts, services and accompanying metadata and leveraging that information into something useful.

Pros: For my organization we use it to keep a handle on what hosts are on the network (both ones that are in our catalog and those we do not know about). We also use it to get an idea on what kind of services are running and version information and to do so quickly. That is one area where this app really excels, it's crazy fast compared to doing common NMAP scans.

Cons: I'd like recurring scans to get queued if their time comes and there is another scan in progress (or at least have the option to have them queued). Trying to schedule scans to completely turn over a 10.x.x.x space when you're doing a couple class b subnets at a time is on par with air traffic control as far as difficulty.

Vendor Response

by Critical Research on 17/03/2020

Thanks for the feedback! On the scan queue side, this is partially implemented, but limited to a four-hour window, and could definitely be more configurable.

  • Reviewer Source 
  • Reviewed on 13/03/2020
Mikel G.
Owner
Information Technology & Services, Self Employed
Used the Software for: 1+ year
  • Overall Rating
    5/5
  • Ease of Use
    5/5
  • Features & Functionality
    5/5
  • Customer Support
    5/5
  • Value for Money
    5/5
  • Likelihood to Recommend
    10/10
  • Reviewer Source 
  • Reviewed on 13/03/2020

"Rumble is the way"

Comments: I can always see the inventory and when things are not being used. I can save on licensing and resources if the tools or software are not being turned on at all.

Pros: I like the simple interface and the speed with witch it discovers items on the network.

Cons: There could be some functionality added to allow easier interacting with the discovered devices. One click remote desktop or some way to add tools like NMap to a menu to further explore devices.

Vendor Response

by Critical Research on 16/03/2020

Thanks for the feedback! We have added one-click RDP to the Services Inventory (for port 3389) and will look into additional tool and service integrations.

  • Reviewer Source 
  • Reviewed on 13/03/2020