Cyber Security In Northern Illinois & Southern Wisconsin
You’ve trusted Computers Nationwide with your Managed IT services, now let us protect your network around the clock with Cyber Security solutions. We are your top choice for computer security in northern Illinois and southern Wisconsin.
Change the game with industry leading Threat Intel programs from our partners at Perch Security…
Start defending your business with cyber security featuring threat intelligence – without breaking the bank.
Perch is one of the leading cyber security companies in co-managed threat detection and response. Backed by their in-house Security Operations Center (SOC), Perch and Computers Nationwide will work together to launch your cyber protection program, or add depth to the visibility you already have.
DETECT, VISUALIZE and ACT on threat intelligence through three components:
See threat activity on your network and among your peers…
Perch connects you with threat intelligence sharing communities and sources, and automates intel consumption. Identify potential digital security threat activity on your network, and view everything through a user-friendly online interface.
Each time you log in, we show you what’s happened since last time you checked Perch, what our system has done for you, and new Community Intel.
Easy access straight from the dashboard:
- Quick stats & Recent alerts
- Network visibility
- True and false positives
Boost defense, not headcount…
No need to increase analyst hours or staff. The Perch Security Operations Center investigates any alerts on your network, escalates real incidents to your attention, and helps you eliminate the threat. Customize what and how we escalate to fit your needs.
The Perch SOC Works around the clock to:
- Triage every alert
- Escalate real threats when detected
- Support you through the response process
Detect what’s eluded your defenses…
Firewalls are a perimeter defense to protect your network; Perch detects what’s already gotten through. During your lunch break, you can start detecting threats on your network.
Your Perch sensor smashes threat intel against your network to identify potential nasties, creating alerts. You can view and interact with your alerts on the Dashboard, while the Perch SOC is at work triaging and escalating them as needed.
Perch offers 6 sensor options
- Triage every alert
- Escalate real threats when detected
- Support you through the response process
Perchybana
Perchybana is an analytics tool to search, view, and interact with data stores for all traffic records from the IDS. Perchybana has many features to enable the analyst to become faster and efficient in their analysis of the network traffic. Preview how to use this helpful tool!
“Perch”ed on an ELK (Perch with Kibana) – Kibana is an open source data visualization plugin for Elasticsearch. It provides visualization capabilities on top of the content indexed on an Elasticsearch cluster. Users can create bar, line and scatter plots, or pie charts and maps on top of large volumes of data. The combination of Elasticsearch, Logstash, and Kibana, referred to as the “Elastic Stack” (formerly the “ELK stack”), is available as a product or service.
Reporting Made Simple
Easily access the big-picture information you need, when you need it, through Perchybana Dashboards. Build your own visualizations and add them to custom dashboards, or use these pre-built reports:
- PCI DSS v3.2.1 Compliance
- HIPPA Compliance
- Networking
- Windows Logs
- Monitored Assets
- Office 365
Tools to Consume & Detect
Take advantage of our included tier-1 alert support, reducing noise and alerting you of only real threats.
Detect threats real-time on network and generate alerts:
- Community updates on security from real threats
- SOC analyze what the alerts really mean
- Analyze indications of malicious activity, and escalates them to CN for remediation
Log Storage for your Compliance Needs
You can ingest logs from syslog and Windows Event Logs, and retain them to meet compliance requirements.
Perch also generates alerts to highlight notable log events based on log data, and enhance reporting and visualizations; and it gives our SOC extra insight into your endpoints and network traffic data.
Stay connected with your ecosystem. Integrate Perch and your other tools with:
Office 365, Palo Alto, Fortinet, Firepower, ConnectWise Manage™, ConnectWise Automate™ and Demisto.
Cyber Security Q&A
My business is small, why should we care about Cyber Security? 67% of all SMBs experienced a cybersecurity attack, costing roughly an average of $400,000, causing 60% of SMBs to go out of business within 6 months of a cybersecurity attack.
Does every business (size and industry) need to invest in cyber security? Small and medium business IT Security spending will top $20B total, and a $6T loss projected from breaches by 2021! This is due to without regard of the size of the business; the company, employee, and customer data are some of the most valuable assets of a company (e.g. credit card information, price / service book information).
How does CN’s Cyber Security services differ from your Managed IT offerings? While Computers Nationwide’s Managed IT service focuses on the day to day technology related issues with basic security elements, the Cyber Security services expand on Managed IT or functions as a stand alone service. CN utilizes Perch’s co-managed threat detection and SOC (Security Operations Center) to constantly monitor and mitigate potential internal/external cyber security risks. Beyond detecting, mitigating, and responding CN takes a deep dive into firewall rules/policies, assists on policy creation (e.g. acceptable use, incident response), and end user trainings (e.g. Security Awareness Training, Email Phishing Education).
Cyber security threats are serious business. Hackers and malware can sneak in and disrupt your operations, costing you time, money AND your reputation. Worse still, hackers, malware, and ransomware can take down your business completely. We’re here to make sure that doesn’t happen.
Contact Us for Pricing and More Information