Security News > 2020 > July > Perch Security offers MSPs managed cybersecurity monitoring for ConnectWise Automate
In the continuing war against threat actors intent on breaching networks and stealing private data for their own ill-gotten financial gains, the latest water-cooler chatter centers around the vulnerable Remote Monitoring and Management platforms used by every managed service provider.
Unmitigated, that is, until Perch Security built RMM monitoring - starting with ConnectWise Automate.
Still expanding the list of technical capabilities, Perch can monitor Automate to detect things like compromised users and computers as well as unauthorized activity within the RMM. "Monitoring the security of the products we buy has been commonplace in the financial services industry. We're just bringing that into the MSP industry," commented Aharon Chernin, Perch founder and CEO. "Automate is the first, but it won't be the last," he added, holstering finger-guns and securing an invisible white hat over his brow.
"CPI Solutions experienced early benefits from Automate Monitoring during the beta."Perch gives us the ability to correlate agent activity and alert on potential outside threats targeting our Automate system.
"Perch's 24/7 SOC gives us the peace of mind that we have always hoped for knowing our systems are being monitored by their top-notch team," said James Oberhaus, a Senior Partner at CPI. ConnectWise Automate advanced monitoring is available immediately for all Perch Security customers.
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/VTFldRo09Q4/
Related news
- A closer look at the 2023-2030 Australian Cyber Security Strategy (source)
- The vCISO Academy: Transforming MSPs and MSSPs into Cybersecurity Powerhouses (source)
- The ROI of Security Investments: How Cybersecurity Leaders Prove It (source)
- Australia Passes Groundbreaking Cyber Security Law to Boost Resilience (source)
- Top 5 Cyber Security Trends for 2025 (source)
- Shape the future of UK cyber security (source)
- Strengthening security posture with comprehensive cybersecurity assessments (source)
- Overlooking platform security weakens long-term cybersecurity posture (source)