Computer Security In Vernon Hills
You’ve trusted Computers Nationwide with your Managed IT services, now let us protect your network around the clock with Cyber Security solutions. We are your top choice for computer security in Vernon Hills.
Change the game with industry leading Threat Intel programs from our partners at Perch Security…
Start defending your business with cyber security featuring threat intelligence – without breaking the bank.
Perch is an industry leader in co-managed threat detection and response. Backed by their in-house Security Operations Center (SOC), Perch and Computers Nationwide will work together to launch your cyber protection program, or add depth to the visibility you already have.
DETECT, VISUALIZE and ACT on threat intelligence through three components:
See threat activity on your network and among your peers…
Perch connects you with threat intelligence sharing communities and sources, and automates intel consumption. Identify potential digital security threat activity on your network, and view everything through a user-friendly online interface.
Each time you log in, we show you what’s happened since last time you checked Perch, what our system has done for you, and new Community Intel.
Easy access straight from the dashboard:
Quick stats & Recent alerts
Network visibility
True and false positives
Boost defense, not headcount…
No need to increase analyst hours or staff. The Perch Security Operations Center investigates any alerts on your network, escalates real incidents to your attention, and helps you eliminate the threat. Customize what and how we escalate to fit your needs.
The Perch SOC Works around the clock to:
Triage every alert
Escalate real threats when detected
Support you through the response process
Detect what’s eluded your defenses…
Firewalls are a perimeter defense to protect your network; Perch detects what’s already gotten through. During your lunch break, you can start detecting threats on your network.
Your Perch sensor smashes threat intel against your network to identify potential nasties, creating alerts. You can view and interact with your alerts on the Dashboard, while the Perch SOC is at work triaging and escalating them as needed.
Perch offers 6 sensor options
Triage every alert
Escalate real threats when detected
Support you through the response process
Perchybana
Perchybana is an analytics tool to search, view, and interact with data stores for all traffic records from the IDS. Perchybana has many features to enable the analyst to become faster and efficient in their analysis of the network traffic. Preview how to use this helpful tool!
“Perch”ed on an ELK (Perch with Kibana) – Kibana is an open source data visualization plugin for Elasticsearch. It provides visualization capabilities on top of the content indexed on an Elasticsearch cluster. Users can create bar, line and scatter plots, or pie charts and maps on top of large volumes of data. The combination of Elasticsearch, Logstash, and Kibana, referred to as the “Elastic Stack” (formerly the “ELK stack”), is available as a product or service.
Reporting Made Simple
Easily access the big-picture information you need, when you need it, through Perchybana Dashboards. Build your own visualizations and add them to custom dashboards, or use these pre-built reports:
- PCI DSS v3.2.1 Compliance
- HIPPA Compliance
- Networking
- Windows Logs
- Monitored Assets
- Office 365
Tools to Consume & Detect
Take advantage of our included tier-1 alert support, reducing noise and alerting you of only real threats.
Detect threats real-time on network and generate alerts:
- Community updates on security from real threats
- SOC analyze what the alerts really mean
- Analyze indications of malicious activity, and escalates them to CN for remediation
Log Storage for your Compliance Needs
You can ingest logs from syslog and Windows Event Logs, and retain them to meet compliance requirements.
Perch also generates alerts to highlight notable log events based on log data, and enhance reporting and visualizations; and it gives our SOC extra insight into your endpoints and network traffic data.