Co-managed threat detection and response
Backed by our in-house Security Operations Center (SOC), Perch can launch your cybersecurity program, or add depth to the visibility you already have.
Take advantage of our included tier-1 alert support, reducing noise and alerting you of only real threats.
Already have threat intelligence analysts on your payroll? While Perch SOC works through alerts, your analysts can participate through Perchybana: investigate Perch alerts; analyze network traffic and logs. Drill down into alert details and view the same alert data our SOC sees.
You can ingest logs from syslog and Windows Event Logs, and retain them to meet compliance requirements. Perch also generates alerts to highlight notable log events based on log data, and enhance reporting and visualizations; and it gives our SOC extra insight into your endpoints and network traffic data.
Perch connects to and consumes the best sources of threat intel for your business, free and paid. Connect to sharing community intel using your membership credentials. You can use any or all of the feeds from our Integration Partners. If you don’t see one you’re looking for, let our team know.
Share reported threats (aka sightings) with others in your community. When someone in your community sees a threat, you see it too. Shared sightings gives you the “bird’s eye view” of how threats are moving, and what attacks you (and we) should be prepared for.
Here’s a TIP: Perch’s interface lets you enter and manage your own threat indicators, sharing them with your community if you wish. You can even build your own threat intelligence repository with Perch, at a fraction of the traditional TIP price tag. However you use it, this feature gives you even more control of your threat data, and lets you give back to your community.
Easily access the big-picture information you need, when you need it, through Perchybana Dashboards. Build your own visualizations and add them to custom dashboards, or use these pre-built reports:
- PCI DSS v3.2.1 Compliance
- HIPAA Compliance
- Windows Logs
- Monitored Assets
- Office 365
Don’t see what you need? Let us know.
How do we do it?
Perch connects you with threat intelligence sharing communities and sources, and automates intel consumption. Identify potential threat activity on your network, and view everything through a user-friendly online interface.
No need to increase analyst hours or staff. The Perch Security Operations Center investigates any alerts on your network, escalates real incidents to your attention, and helps you eliminate the threat. Customize what and how we escalate to fit your needs.
Firewalls are a perimeter defense to protect your network; Perch detects what’s already gotten through. During your lunch break, you can start detecting threats on your network.