Thrive raises the bar on client protection with SaaS Alerts

Customer

Thrive

Foxborough, Massachusetts

Site: https://thrivenextgen.com/

About

Thrive began in 2000 as a modest IT services firm in Concord, Massachusetts. Recognizing that the traditional break/fix model was not as desirable as it once was, its pioneering founders were among the first in the world to create proactive managed services for the SMB market.

In 2025, Thrive received strategic investment from Berkshire Partners and Court Square Capital Partners to unlock further growth, enhancing Thrive’s position as a leading next-generation service provider delivering global AI, cybersecurity, cloud and digital transformation managed services.

With a focus on customer experience, innovation and a team driven by passion and purpose, Thrive empowers businesses to operate smarter, faster and more securely in an ever-evolving digital world.

Overview

Thrive was struggling to keep pace with the growing challenge of detecting and preventing account compromises. Many of its clients had not yet adopted managed detection and response (MDR) services. For clients who had, rule-based analytics required constant maintenance and risked detecting attacks much later in the lifecycle. This delay forced the security operations center (SOC) to spend most of its time firefighting active incidents. SaaS Alerts offered Thrive a cost-effective, machine-learning-driven solution to identify compromised accounts early in the attack cycle.

Thrive needed more than just tools

As a customer-first MSSP, Thrive has always been committed to delivering enterprise-grade security services to businesses that lack the in-house resources of larger enterprises. Their mission: to provide top-tier protection without the complexity or cost.

To achieve this, Thrive invested in technologies such as EDR, SIEM, log aggregation, vulnerability scanning and threat intelligence. Its SOC team worked tirelessly to protect clients.

Even with these tools, challenges remained. The analytics rules required constant updates to keep pace with evolving attack patterns, as threat actors increasingly focused on exploiting compromised user credentials. Gaps were evident in Thrive’s defense systems. Account compromises were detected later in the kill chain, leaving the team spending far too much time reacting to incidents rather than preventing them.

Thrive needed a smarter, more reliable tool designed for MSPs that could proactively detect threats and give the team time to act before damage was done. That search led them to SaaS Alerts — a proven SaaS security solution that would change the game for both Thrive and the businesses they protect.

How SaaS Alerts transformed Thrive’s defense strategy

To protect clients effectively, Thrive must stay one step ahead of attackers. That made adopting SaaS Alerts an easy decision. With its machine learning and behavioral intelligence capabilities, SaaS Alerts enables Thrive to spot compromised accounts earlier in the attack chain, before attackers launch phishing campaigns or exfiltrate data.

SaaS Alerts detects suspicious logins, malicious mailbox rule changes and other signs of account takeover activity that legacy tools miss. Proactive detection and instant alerts give their SOC team valuable time to respond with actions such as resetting passwords, terminating sessions and remediating accounts before they cause damage.

“We’ve made SaaS Alerts mandatory for all clients whose Microsoft 365 tenants we manage. This was the big area where we needed the assistance.” Kevin Landt, VP of Product Management, Cybersecurity Services

SaaS Alerts’ Respond module also allows Thrive to take decisive action across environments, even when they’re not managing a client’s IT environment. This has been especially powerful for their MSSP practice, where clients outsource security but still expect enterprise-grade protection.

Scaling security across 180,000 endpoints with smarter, faster response

SaaS Alerts has been a true game changer for Thrive. The MSP now detects threats earlier and automatically remediates them without any delay or manual intervention. What once required multiple teams and back-and-forth communication with clients now happens instantly through smart alerts. This automation has reduced response times, freed technicians from repetitive tasks and eased the IT burden across 180,000 managed endpoints.

SaaS Alerts has made life easier not just for Thrive but also its clients. Instead of late-night calls asking their clients to take action, Thrive can now step in directly, locking accounts, resetting credentials and stopping attacks before they spiral out of control. For their SOC team, it means more time spent on true positives and deeper investigations, not chasing false alarms. For clients, it means greater peace of mind and uninterrupted service, knowing their accounts stay secure without them lifting a finger.

In a world where SaaS applications have become indispensable for business operations, SaaS Alerts gives Thrive the visibility, speed and automation needed to deliver the proactive protection clients expect.

“We’re automatically mitigating attacks. It’s not like a once-in-a-while thing. It’s an everyday thing,” Kevin explained.

The security platform that understands MSPs

For Thrive, choosing SaaS Alerts was about more than just technology — it was about finding a solution purpose-built for MSPs. SaaS Alerts was designed from the ground up with MSP workflows in mind. Its multitenancy architecture and robust API integrations, critical for MSPs managing hundreds of clients, made it easy for Thrive to automate client onboarding, streamline deployment and apply baseline policies at scale.

SaaS Alerts’ powerful detection and alerting capabilities gave Thrive exactly what they needed — a scalable, MSP-focused solution that grows with their business while delivering enterprise-grade protection to their clients.

“We can catch the attackers while they're still in the recon phase and kick them out of the account. We can reset the password, end those sessions and remediate it back to a good state before they compromise accounts. That's the difference. We're catching it earlier.” Kevin Landt, VP of Product Management, Cybersecurity Services

Products used in this case study

random shapes

Kaseya 365 User

Kaseya 365 User delivers a single, integrated subscription that provides everything needed to prevent, respond to and recover from evolving SaaS threats.

Explore Kaseya 365 User

Case studies

Curious to explore more?

Salinor powers up IT operations with a smooth migration to VSA 10

How Brazil’s salt giant Salinor powered ahead with a seamless migration to VSA 10, unlocking efficiencies across its operations.

Read More
BCS IS|IT Case Study
How BCS IS|IT tripled margins with Kaseya 365 Endpoint Pro

From technology tinkering to trusted partner. Like many MSPs, Nero Consulting began with founder Anthony Oren helping others with computer issues, a side hustle that soon grew into a full-fledged technology business operating across multiple locations worldwide.

Read More
Blackline IT: Protecting people, not just systems 

Blackline IT protects clients with care and confidence, using Kaseya’s unified platform and RocketCyber to deliver security that never sleeps.

Read More