IT solution providers are the first—and often only—line of defense for every kind of business in every part of the world. Whether managing mom-and-pop businesses or high-profile clients, providing preventive security measures is a must-have in today’s cybersecurity landscape. Security information and event management (SIEM) solutions offer an additional layer of security for your clients; however, most SIEM solutions are routinely difficult to manage, expensive to deploy, and require a significant amount of in-house cybersecurity expertise.
SIEM powered by Perch offers a powerful alternative to expand your security perspective to both prevention and detection. The solution includes comprehensive, flexible SIEM software that streamlines safety and security across your network without additional full-time employee costs or complicated implementations. Perch is now part of Connectwise. www.connectwise.com
Umbrella: The combined technology solution offers clear benefits for Cisco partners and their customers by correlating events from both the endpoint and network, reducing ticket counts, and lowering labor costs. Perch has integrated with Cisco Advanced Malware Protection (AMP) for Endpoints and Cisco Umbrella, ingesting their logs and feeding them into Perch’s security information and event management (SIEM) solution. Features include: Perch’s Security Operations Center (SOC) provides event correlation, alert review, and custom alert options. Perch’s Duo integration correlates Duo Multi-Factor Authentication and endpoint visibility with data from other Perch-connected cloud services, such as Office 365, Cisco Umbrella, and Cisco AMP. By combining these solutions into a single pane of glass, alerts are correlated and consolidated to reduce tool sprawl. Perch feeds data from cloud services and security products into a single data lake that is monitored by Perch SOC.
Secure Endpoint: Ingest all events from Cisco Security Endpoint into Perch’s SIEM. Perch SOC services will correlate Cisco Security Endpoint event review into threat management activity involving IDS and logs.