Illuminate threats on network and log data, with SOC included. Try it yourself, then shine the light for your customers.
Built from the ground up with multi-tenancy, Perch makes managing all of your customers a breeze. And it’s transparent – you can see everything that we see, all the way to the detailed Indicators of Compromise (IoCs) and our analysis.
Our team of threat analysts does all the tedium for you, while you collect all the accolades from your clients. If you prefer to analyze threat indicators yourself, just click Perchybana and dive in. Optional service level agreements guarantee fast analysis turnaround.
Defend your company against business email compromise (BEC), account takeovers, and have visibility beyond your network traffic. Make your MS 365 & G Suite logs searchable, parsable, cleaner, and reportable. Build alerts that suit your needs to get notified in real-time, then investigate the impact through Perchybana.
Cover your clients with the best threat intel on market. Perch ingests and automates most popular threat intelligence feeds – you can select which ones through our platform. No more noise for you, only identified threat activity from our SOC.
Perch sensors can be set up over a coffee break. You can install them yourself with setup instructions at Perch.help – and our Customer Success team is standing by to walk you through the process if you have any questions or difficulties.