Managed Cyber Security

You’ve trusted Computers Nationwide with your Managed IT services, now let us protect your network around the clock with Cyber Security solutions.

Change the game with industry leading Threat Intel programs from our partners at Perch Security

Peace of Mind

Just like a security system monitors for physical intruders, this is your monitoring for virtual intruders.  Gives you the peace of mind like a standard security system.

24/7 Detection

Threat is detected immediately and action is taken right away.  Prevent attacks before damage is done while also protecting your business reputation.

Customized Solutions

Threat solutions are your choice (or CN’s choice if you prefer). That’s right – no vendor restriction, everything is customizable with capabilities to integrate/automate in a way that works best for you!

Start defending your business with threat intelligence – without breaking the bank.

Perch is an industry leader in co-managed threat detection and response. Backed by their in-house Security Operations Center (SOC), Perch and Computers Nationwide will work together to launch your cybersecurity program, or add depth to the visibility you already have.

DETECT, VISUALIZE and ACT on threat intelligence through three components:

Perch Community Defense App
Perch Security Operations Center
Perch Sensors

Perch Community Defense App

See threat activity on your network and among your peers…

Perch connects you with threat intelligence sharing communities and sources, and automates intel consumption. Identify potential threat activity on your network, and view everything through a user-friendly online interface.

Each time you log in, we show you what’s happened since last time you checked Perch, what our system has done for you, and new Community Intel.

Easy access straight from the dashboard:

  • check Quick stats & Recent alerts
  • checkNetwork visibility
  • check True and false positives

Perch Security Operations Center

Boost defense, not headcount…

No need to increase analyst hours or staff. The Perch Security Operations Center investigates any alerts on your network, escalates real incidents to your attention, and helps you eliminate the threat. Customize what and how we escalate to fit your needs.

Analyst hours are not required. Perch Security Operations Center (SOC), included with your service, means threat analysts are working for you as soon as your sensor is installed.

The Perch SOC Works around the clock to:

  • check Triage every alert
  • check Escalate real threats when detected
  • check Support you through the response process

Perch Sensors

Detect what’s eluded your defenses…

Firewalls are a perimeter defense to protect your network; Perch detects what’s already gotten through. During your lunch break, you can start detecting threats on your network.

Your Perch sensor smashes threat intel against your network to identify potential nasties, creating alerts. You can view and interact with your alerts on the Dashboard, while the Perch SOC is at work triaging and escalating them as needed.

Perch offers 6 sensor options 

  • check Triage every alert
  • check Escalate real threats when detected
  • check Support you through the response process

Perchybana

Perchybana is an analytics tool to search, view, and interact with data stores for all traffic records from the IDS. Perchybana has many features to enable the analyst to become faster and efficient in their analysis of the network traffic. Preview how to use this helpful tool!

“Perch”ed on an ELK (Perch with Kibana) – Kibana is an open source data visualization plugin for Elasticsearch. It provides visualization capabilities on top of the content indexed on an Elasticsearch cluster. Users can create bar, line and scatter plots, or pie charts and maps on top of large volumes of data. The combination of Elasticsearch, Logstash, and Kibana, referred to as the “Elastic Stack” (formerly the “ELK stack”), is available as a product or service.

Reporting Made Simple

Easily access the big-picture information you need, when you need it, through Perchybana Dashboards. Build your own visualizations and add them to custom dashboards, or use these pre-built reports:

  • PCI DSS v3.2.1 Compliance
  • HIPPA Compliance
  • Networking
  • Windows Logs
  • Monitored Assets
  • Office 365

Tools to Consume & Detect

Take advantage of our included tier-1 alert support, reducing noise and alerting you of only real threats.

Detect threats real-time on network and generate alerts:

  • Community updates on security from real threats
  • SOC analyze what the alerts really mean
  • Analyze indications of malicious activity, and escalates them to CN for remediation

Log Storage for your Compliance Needs

You can ingest logs from syslog and Windows Event Logs, and retain them to meet compliance requirements.

Perch also generates alerts to highlight notable log events based on log data, and enhance reporting and visualizations; and it gives our SOC extra insight into your endpoints and network traffic data.

Stay connected with your ecosystem. Integrate Perch and your other tools with:
Office 365, Palo Alto, Fortinet, Firepower, ConnectWise Manage™, ConnectWise Automate™ and Demisto.

Cyber Security Q&A

My business is small, why should we care about Cyber Security? 67% of all SMBs experienced a cybersecurity attack, costing roughly an average of $400,000, causing 60% of SMBs to go out of business within 6 months of a cybersecurity attack.
Does every business (size and industry) need to invest in cyber security? Small and medium business IT Security spending will top $20B total, and a $6T loss projected from breaches by 2021! This is due to without regard of the size of the business; the company, employee, and customer data are some of the most valuable assets of a company (e.g. credit card information, price / service book information).
How does CN’s Cyber Security services differ from your Managed IT offerings? While Computers Nationwide’s Managed IT service focuses on the day to day technology related issues with basic security elements, the Cyber Security services expand on Managed IT or functions as a stand alone service. CN utilizes Perch’s co-managed threat detection and SOC (Security Operations Center) to constantly monitor and mitigate potential internal/external cyber security risks. Beyond detecting, mitigating, and responding CN takes a deep dive into firewall rules/policies, assists on policy creation (e.g. acceptable use, incident response), and end user trainings (e.g. Security Awareness Training, Email Phishing Education).
Cyber security threats are serious business. Hackers and malware can sneak in and disrupt your operations, costing you time, money AND your reputation. Worse still, hackers, malware, and ransomware can take down your business completely. We’re here to make sure that doesn’t happen.

Contact Us for Pricing and More Information

Menu