Software and support solutions to protect your clients’ critical business assets
ConnectWise SIEM (formerly Perch) offers threat detection and response backed by an in-house Security Operations Center (SOC). Defend against business email compromise, account takeovers, and see beyond your network traffic. Our team of threat analysts does all the tedium for you, eliminating the noise and sending only identified and verified treats to action on. Built with multi-tenancy, ConnectWise SIEM helps you keep clients safe with the best threat intel on the market.
Fully Automated Process in One Tool: From Purchase Orders to Budget Control and Reporting.
For minor company expenses, you might utilize a spend management solution or track everything in spreadsheets. For everything more, you'll need Precoro. We help companies achieve procurement excellence and budget efficiency by building transparent, predictable, automated spending workflows.
Smart Card Sniffing And Debugging Tool for contact based SIM/ME comm.
SCSDT - Smart Card Sniffing And Debugging Tool is created to log the communication between a SIM/ME on a contact based level.
The software contains a simulator and a converter that takes individual logged APDU bytes (originally retrieved from the hardware) and transform them into an IO script on the form :
//Select
I: A0 A4 00 00 02 3F 00
O: 9F 16
Where the instruction of the APDU is read from an XML file that can be extended with proprietary commands.
The software...
Simulate netflow packets for version 1, 5, 7, 8,9. This can be helpful for development of netflow management software without access to a real netflow device. It also provides preliminary support for IPFIX and sFlow. .
Proactively monitor, manage, and support client networks with ConnectWise Automate
Out-of-the-box scripts. Around-the-clock monitoring. Unmatched automation capabilities. Start doing more with less and exceed service delivery expectations.
Storesim simulates creation of large amount of random files. Directory structure created is similar to what is done in very large file repositories: based on hashdirs (found in mailservers, NFS servers, files servers, image databases...)