Co-managed threat detection and response

Backed by our in-house Security Operations Center (SOC), Perch can launch your cybersecurity program, or add depth to the visibility you already have.

 

 

multi-tenancy
Multi-tenancy

Perch is built with multi-tenancy at its core. Manage alerts for as many lines-of-business or clients as you like. Perfect for Managed Service Providers.

threat-hunting
Threat hunting

Take advantage of our included tier-1 alert support, reducing noise and alerting you of only real threats.

Already have threat intelligence analysts on your payroll? While Perch SOC works through alerts, your analysts can participate through Perchybana: investigate Perch alerts; analyze network traffic and logs. Drill down into alert details and view the same alert data our SOC sees.

log-ingestion
Log ingestion

You can ingest logs from syslog and Windows Event Logs, and retain them to meet compliance requirements. Perch also generates alerts to highlight notable log events based on log data, and enhance reporting and visualizations; and it gives our SOC extra insight into your endpoints and network traffic data.

intel-agnosticism
Intel agnosticism

Perch connects to and consumes the best sources of threat intel for your business, free and paid. Connect to sharing community intel using your membership credentials. You can use any or all of the feeds from our Integration Partners. If you don’t see one you’re looking for, let our team know.

Share reported threats (aka sightings) with others in your community. When someone in your community sees a threat, you see it too. Shared sightings gives you the “bird’s eye view” of how threats are moving, and what attacks you (and we) should be prepared for.

threat-management
Threat management

Here’s a TIP: Perch’s interface lets you enter and manage your own threat indicators, sharing them with your community if you wish. You can even build your own threat intelligence repository with Perch, at a fraction of the traditional TIP price tag. However you use it, this feature gives you even more control of your threat data, and lets you give back to your community.

reports
Reports

Easily access the big-picture information you need, when you need it, through Perchybana Dashboards. Build your own visualizations and add them to custom dashboards, or use these pre-built reports:

  • PCI DSS v3.2.1 Compliance
  • HIPAA Compliance
  • Networking
  • Windows Logs
  • Monitored Assets
  • Office 365

Don’t see what you need? Let us know.

How do we do it?

Perch is a single solution with 3 components:
See threat activity on your network and among your peers

Perch connects you with threat intelligence sharing communities and sources, and automates intel consumption. Identify potential threat activity on your network, and view everything through a user-friendly online interface.

Perch Web App >
Boost defense, not headcount

No need to increase analyst hours or staff. The Perch Security Operations Center investigates any alerts on your network, escalates real incidents to your attention, and helps you eliminate the threat. Customize what and how we escalate to fit your needs.

Perch SOC >
Detect what’s eluded your defenses

Firewalls are a perimeter defense to protect your network; Perch detects what’s already gotten through. During your lunch break, you can start detecting threats on your network.

Perch Sensors >