ConnectWise SIEM

ConnectWise SIEM

ConnectWise
+
+

Related Products

  • ManageEngine Log360
    157 Ratings
    Visit Website
  • Guardz
    109 Ratings
    Visit Website
  • ManageEngine EventLog Analyzer
    203 Ratings
    Visit Website
  • ThreatLocker
    502 Ratings
    Visit Website
  • Graylog
    405 Ratings
    Visit Website
  • DriveLock
    1 Rating
    Visit Website
  • Safetica
    409 Ratings
    Visit Website
  • Site24x7
    1,143 Ratings
    Visit Website
  • ManageEngine Endpoint Central
    2,683 Ratings
    Visit Website
  • Iru
    1,488 Ratings
    Visit Website

About

ConnectWise SIEM (formerly Perch) offers threat detection and response backed by an in-house Security Operations Center (SOC). Defend against business email compromise, account takeovers, and see beyond your network traffic. Our team of threat analysts does all the tedium for you, eliminating the noise and sending only identified and verified treats to action on. Built with multi-tenancy, ConnectWise SIEM helps you keep clients safe with the best threat intel on the market.

About

Sumo Logic, Inc. helps make the digital world secure, fast, and reliable by unifying critical security and operational data through its Intelligent Operations Platform. Built to address the increasing complexity of modern cybersecurity and cloud operations challenges, we empower digital teams to move from reaction to readiness—combining agentic AI-powered SIEM and log analytics into a single platform to detect, investigate, and resolve modern challenges. Customers around the world rely on Sumo Logic for trusted insights to protect against security threats, ensure reliability, and gain powerful insights into their digital environments. Sumo Logic Cloud SIEM helps your team detect, investigate, and respond to threats with faster behavioral analytics and automation—powered by real-time data and logs-first intelligence. Sumo Logic UEBA baselines user and entity behavior in minutes—training models on historical data to reduce false positives and surface high-risk anomalies.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

MSPs, VARs, and IT security teams

Audience

IT Security and Development departments looking for a solution for cloud log management and TDIR

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

$10 per month
Free Version
Free Trial

Pricing

$270.00 per month
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 5.0 / 5
ease 5.0 / 5
features 4.5 / 5
design 5.0 / 5
support 4.5 / 5

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

ConnectWise
Founded: 1982
United States
www.connectwise.com/platform/security-management/siem

Company Information

Sumo Logic
Founded: 2009
United States
www.sumologic.com

Alternatives

Alternatives

Zulu Embedded

Zulu Embedded

Azul Systems

Categories

Categories

Cloud Security Features

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Log Management Features

Archiving
Audit Trails
Compliance Reporting
Consolidation
Data Visualization
Event Logs
Network Logs
Remediation
Syslogs
Thresholds
Web Logs

SIEM Features

Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring

Cybersecurity Features

AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Endpoint Detection and Response (EDR) Features

Behavioral Analytics
Blacklisting/Whitelisting
Continuous Monitoring
Malware/Anomaly Detection
Prioritization
Remediation Management
Root Cause Analysis

Endpoint Protection Features

Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting

Incident Management Features

Audit Trail
Corrective Actions (CAPA)
Disaster Recovery
Incident Reporting
IT Incident Management
OSHA Compliance
Root-Cause Diagnosis
Safety Management
Task Management
Ticket Management

MSP Features

Backup Management
Billing & Invoicing
CRM
Dashboard
Help Desk
Issue Management
Live Chat
Patch Management
Privileged Access Management (PAM)
Project Management
Remote Access
Remote Systems Monitoring
Scheduling

Cloud Security Features

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Log Management Features

Archiving
Audit Trails
Compliance Reporting
Consolidation
Data Visualization
Event Logs
Network Logs
Remediation
Syslogs
Thresholds
Web Logs

SIEM Features

Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring

Application Performance Monitoring (APM) Features

Baseline Manager
Diagnostic Tools
Full Transaction Diagnostics
Performance Control
Resource Management
Root-Cause Diagnosis
Server Performance
Trace Individual Transactions

Cloud Management Features

Access Control
Billing & Provisioning
Capacity Analytics
Cost Management
Demand Monitoring
Multi-Cloud Management
Performance Analytics
SLA Management
Supply Monitoring
Workflow Approval

DevOps Features

Approval Workflow
Dashboard
KPIs
Policy Management
Portfolio Management
Prioritization
Release Management
Timeline Management
Troubleshooting Reports

Incident Response Features

Attack Behavior Analytics
Automated Remediation
Compliance Reporting
Forensic Data Retention
Incident Alerting
Incident Database
Incident Logs
Incident Reporting
Privacy Breach Reporting
Security Orchestration
SIEM Data Ingestion / Correlation
SLA Tracking / Management
Threat Intelligence
Timeline Analysis
Workflow Automation
Workflow Management

Integrations

7AI
ARIA SDS Packet Intelligence
AWS IoT SiteWise
AirShield
Armis Centrix
Beeceptor
Box Shield
Campaign Monitor
Carbon Black EDR
CloudZero
Contrast Security
Dasera
Mindflow
Orca Security
Revelstoke
SOC Prime Platform
SeeMetrics
Squadcast
The Respond Analyst
threatYeti by alphaMountain

Integrations

7AI
ARIA SDS Packet Intelligence
AWS IoT SiteWise
AirShield
Armis Centrix
Beeceptor
Box Shield
Campaign Monitor
Carbon Black EDR
CloudZero
Contrast Security
Dasera
Mindflow
Orca Security
Revelstoke
SOC Prime Platform
SeeMetrics
Squadcast
The Respond Analyst
threatYeti by alphaMountain
Claim ConnectWise SIEM and update features and information
Claim ConnectWise SIEM and update features and information
Claim Sumo Logic and update features and information
Claim Sumo Logic and update features and information