-
EDR / MDRIdentify, contain, respond, and stop malicious activity on endpoints
-
SIEMCentralize threat visibility and analysis, backed by cutting-edge threat intelligence
-
Risk Assessment & Vulnerability ManagementIdentify unknown cyber risks and routinely scan for vulnerabilities
-
Identity ManagementSecure and streamline client access to devices and applications with strong authentication and SSO
-
Cloud App SecurityMonitor and manage security risk for SaaS apps
-
SASEZero trust secure access for users, locations, and devices
-
SOC ServicesProvide 24/7 threat monitoring and response backed by ConnectWise SOC experts
-
Policy ManagementCreate, deploy, and manage client security policies and profiles
-
Incident Response ServiceOn-tap cyber experts to address critical security incidents
-
Cybersecurity GlossaryGuide to the most common, important terms in the industry
Blog Posts by Patrick Beggs

Patrick Beggs
Chief Information Security Office, ConnectWise
Patrick is a cybersecurity executive focused on leading global cyber operations. Patrick has more than 20 years of operational duties in information security, spanning the commercial, federal civilian, defense, law enforcement, and intelligence communities. Most recently, Patrick served as Cognizant Technology’s Global Cyber Operations Executive, where he led a team of more than 150 personnel operating across five countries. Prior to Cognizant, Patrick led cyber operations for AIG, Booz Allen Hamilton, Amazon Web Services, and Bank of America. In the public sector, Patrick served as the first Deputy Director/Director of Operations at the Department of Homeland Security’s (DHS) National Cybersecurity and Communications Integration Center (NCCIC).
Patrick is a former Army Infantry Non-Commissioned Officer and holds a B.S. in Political Science from Radford University. He also holds a patent for his work developing a new method of leveraging AI models for improving network security.
Filter By:
05/24/2023
5 min read
Risk-based vulnerability management—what you need to know
By: Patrick Beggs
With security threats on the rise, it's important for MSPs to stay proactive and protect their networks from potential vulnerabilities. See how implementing effective risk-based vulnerability management programs can help you mitigate cyber risks and protect critical business assets.

Cybersecurity
02/01/2023
5 min read
The future is perimeterless: leveraging SASE on your journey to zero trust
By: Patrick Beggs
Secure Access Service Edge (SASE) and zero trust network architecture (ZNTA) are two concepts leading a revolution in network security. Though people sometimes use these phrases interchangeably, forward-thinking organizations leverage the SASE framework to create a perimeterless security posture.

Cybersecurity
01/04/2023
4 min read
Zero trust network architecture: why do I need SASE?
By: Patrick Beggs
Zero trust architecture verifies the intent of every network user to eliminate cybersecurity threats from malicious attackers.

Cybersecurity
05/25/2022
4 min read
How to enforce a zero trust policy—starting with the basics
By: Patrick Beggs
Are your customers asking about zero trust security? Or do you just want to understand what all the buzz is about? See this post to get a handle on the basics of zero trust, including where to start.

Cybersecurity