Cyber Security In Northern Illinois & Southern Wisconsin

You’ve trusted Computers Nationwide with your Managed IT services, now let us protect your network around the clock with Cyber Security solutions. We are your top choice for computer security in northern Illinois and southern Wisconsin.

Change the game with industry leading Threat Intel programs from our partners at Perch Security…

Start defending your business with cyber security featuring threat intelligence – without breaking the bank.

Perch is one of the leading cyber security companies in co-managed threat detection and response. Backed by their in-house Security Operations Center (SOC), Perch and Computers Nationwide will work together to launch your cyber protection program, or add depth to the visibility you already have.
Managed Cyber Security

Peace of Mind

Just like a security system monitors for physical intruders, this IT security is your monitoring for virtual intruders.  Gives you the peace of mind like a standard security system.

24/7 Detection

Threat is detected immediately and action is taken right away.  Prevent attacks before damage is done while also protecting your business reputation.

Customized Solutions

Threat solutions are your choice (or CN’s choice if you prefer). That’s right – no vendor restriction, everything is customizable with capabilities to integrate/automate in a way that works best for you!

DETECT, VISUALIZE and ACT on threat intelligence through three components:

Perchybana

Perchybana is an analytics tool to search, view, and interact with data stores for all traffic records from the IDS. Perchybana has many features to enable the analyst to become faster and efficient in their analysis of the network traffic. Preview how to use this helpful tool!

“Perch”ed on an ELK (Perch with Kibana) – Kibana is an open source data visualization plugin for Elasticsearch. It provides visualization capabilities on top of the content indexed on an Elasticsearch cluster. Users can create bar, line and scatter plots, or pie charts and maps on top of large volumes of data. The combination of Elasticsearch, Logstash, and Kibana, referred to as the “Elastic Stack” (formerly the “ELK stack”), is available as a product or service.

Reporting Made Simple

Easily access the big-picture information you need, when you need it, through Perchybana Dashboards. Build your own visualizations and add them to custom dashboards, or use these pre-built reports:

  • PCI DSS v3.2.1 Compliance
  • HIPPA Compliance
  • Networking
  • Windows Logs
  • Monitored Assets
  • Office 365

Tools to Consume & Detect

Take advantage of our included tier-1 alert support, reducing noise and alerting you of only real threats.

Detect threats real-time on network and generate alerts:

  • Community updates on security from real threats
  • SOC analyze what the alerts really mean
  • Analyze indications of malicious activity, and escalates them to CN for remediation

Log Storage for your Compliance Needs

You can ingest logs from syslog and Windows Event Logs, and retain them to meet compliance requirements.

Perch also generates alerts to highlight notable log events based on log data, and enhance reporting and visualizations; and it gives our SOC extra insight into your endpoints and network traffic data.

Stay connected with your ecosystem. Integrate Perch and your other tools with:
Office 365, Palo Alto, Fortinet, Firepower, ConnectWise Manage™, ConnectWise Automate™ and Demisto.

Cyber Security Q&A

My business is small, why should we care about Cyber Security? 67% of all SMBs experienced a cybersecurity attack, costing roughly an average of $400,000, causing 60% of SMBs to go out of business within 6 months of a cybersecurity attack.
Does every business (size and industry) need to invest in cyber security? Small and medium business IT Security spending will top $20B total, and a $6T loss projected from breaches by 2021! This is due to without regard of the size of the business; the company, employee, and customer data are some of the most valuable assets of a company (e.g. credit card information, price / service book information).
How does CN’s Cyber Security services differ from your Managed IT offerings? While Computers Nationwide’s Managed IT service focuses on the day to day technology related issues with basic security elements, the Cyber Security services expand on Managed IT or functions as a stand alone service. CN utilizes Perch’s co-managed threat detection and SOC (Security Operations Center) to constantly monitor and mitigate potential internal/external cyber security risks. Beyond detecting, mitigating, and responding CN takes a deep dive into firewall rules/policies, assists on policy creation (e.g. acceptable use, incident response), and end user trainings (e.g. Security Awareness Training, Email Phishing Education).
Cyber security threats are serious business. Hackers and malware can sneak in and disrupt your operations, costing you time, money AND your reputation. Worse still, hackers, malware, and ransomware can take down your business completely. We’re here to make sure that doesn’t happen.

Contact Us for Pricing and More Information

 

Menu