Audience
MSPs, VARs, and IT security teams
About ConnectWise SIEM
ConnectWise SIEM (formerly Perch) offers threat detection and response backed by an in-house Security Operations Center (SOC). Defend against business email compromise, account takeovers, and see beyond your network traffic. Our team of threat analysts does all the tedium for you, eliminating the noise and sending only identified and verified treats to action on. Built with multi-tenancy, ConnectWise SIEM helps you keep clients safe with the best threat intel on the market.
Integrations
API:
            Yes, ConnectWise SIEM offers API access
        No integrations listed.
        
    Company Information
ConnectWise
Founded: 1982
    
    United States
    
    
        
    
    
    
    
    
Product Details
Platforms Supported
            
                            
 Cloud
                        
                    
                        
                            
 Windows
                        
                    
                        
                            
 Mac
                        
                    
                        
                            
 Linux
                        
                    
                
            Training
            
 Documentation 
                
                    
 Live Online 
                
                    
 Videos 
                
            Support
            
 Phone Support 
                
                    
 24/7 Live Support 
                
                    
 Online 
                
            ConnectWise SIEM Frequently Asked Questions
ConnectWise SIEM Product Features
Cloud Security
                    
                    Antivirus
                
                
                
                    
                    Application Security
                
                
                
                    
                    Behavioral Analytics
                
                
                
                    
                    Encryption
                
                
                
                    
                    Endpoint Management
                
                
                
                    
                    Incident Management
                
                
                
                    
                    Intrusion Detection System
                
                
                
                    
                    Threat Intelligence
                
                
                
                    
                    Two-Factor Authentication
                
                
                
                    
                    Vulnerability Management
                
            
            Cybersecurity
                    
                    AI / Machine Learning
                
                
                
                    
                    Behavioral Analytics
                
                
                
                    
                    Endpoint Management
                
                
                
                    
                    IOC Verification
                
                
                
                    
                    Incident Management
                
                
                
                    
                    Tokenization
                
                
                
                    
                    Vulnerability Scanning
                
                
                
                    
                    Whitelisting / Blacklisting
                
            
            Endpoint Detection and Response (EDR)
                    
                    Behavioral Analytics
                
                
                
                    
                    Blacklisting/Whitelisting
                
                
                
                    
                    Continuous Monitoring
                
                
                
                    
                    Malware/Anomaly Detection
                
                
                
                    
                    Prioritization
                
                
                
                    
                    Remediation Management
                
                
                
                    
                    Root Cause Analysis
                
            
            Endpoint Protection
                    
                    Activity Log
                
                
                
                    
                    Antivirus
                
                
                
                    
                    Application Security
                
                
                
                    
                    Behavioral Analytics
                
                
                
                    
                    Device Management
                
                
                
                    
                    Encryption
                
                
                
                    
                    Signature Matching
                
                
                
                    
                    Web Threat Management
                
                
                
                    
                    Whitelisting / Blacklisting
                
            
            Incident Management
                    
                    Audit Trail
                
                
                
                    
                    Corrective Actions (CAPA)
                
                
                
                    
                    Disaster Recovery
                
                
                
                    
                    IT Incident Management
                
                
                
                    
                    Incident Reporting
                
                
                
                    
                    OSHA Compliance
                
                
                
                    
                    Root-Cause Diagnosis
                
                
                
                    
                    Safety Management
                
                
                
                    
                    Task Management
                
                
                
                    
                    Ticket Management
                
            
            Log Management
                    
                    Archiving
                
                
                
                    
                    Audit Trails
                
                
                
                    
                    Compliance Reporting
                
                
                
                    
                    Consolidation
                
                
                
                    
                    Data Visualization
                
                
                
                    
                    Event Logs
                
                
                
                    
                    Network Logs
                
                
                
                    
                    Remediation
                
                
                
                    
                    Syslogs
                
                
                
                    
                    Thresholds
                
                
                
                    
                    Web Logs
                
            
            MSP
                    
                    Backup Management
                
                
                
                    
                    Billing & Invoicing
                
                
                
                    
                    CRM
                
                
                
                    
                    Dashboard
                
                
                
                    
                    Help Desk
                
                
                
                    
                    Issue Management
                
                
                
                    
                    Live Chat
                
                
                
                    
                    Patch Management
                
                
                
                    
                    Privileged Access Management (PAM)
                
                
                
                    
                    Project Management
                
                
                
                    
                    Remote Access
                
                
                
                    
                    Remote Systems Monitoring
                
                
                
                    
                    Scheduling
                
            
            SIEM
                    
                    Application Security
                
                
                
                    
                    Behavioral Analytics
                
                
                
                    
                    Compliance Reporting
                
                
                
                    
                    Endpoint Management
                
                
                
                    
                    File Integrity Monitoring
                
                
                
                    
                    Forensic Analysis
                
                
                
                    
                    Log Management
                
                
                
                    
                    Network Monitoring
                
                
                
                    
                    Real Time Monitoring
                
                
                
                    
                    Threat Intelligence
                
                
                
                    
                    User Activity Monitoring