Co-managed threat detection and response

Backed by our in-house Security Operations Center (SOC), Perch can launch your cybersecurity program, or add depth to the visibility you already have.

Multi-tenancy

Multi-tenancy

Perch is built with multi-tenancy at its core. Manage alerts for as many lines-of-business or clients as you like. Perfect for Managed Service Providers.

Perch is built with multi-tenancy at its core. Manage alerts for as many lines-of-business or clients as you like. Perfect for Managed Service Providers.
Threat hunting

Threat hunting

Take advantage of our included tier-1 alert support, reducing noise and alerting you of only real threats.

Already have threat intelligence analysts on your payroll? While Perch SOC works through alerts, your analysts can participate through Perchybana: investigate Perch alerts; analyze network traffic and logs. Drill down into alert details and view the same alert data our SOC sees.

Take advantage of our included tier-1 alert support, reducing noise and alerting you of only real threats.
Log ingestion

Log ingestion

You can ingest logs from syslog and Windows Event Logs, and retain them to meet compliance requirements. Perch also generates alerts to highlight notable log events based on log data, and enhance reporting and visualizations; and it gives our SOC extra insight into your endpoints and network traffic data.

You can ingest logs from syslog and Windows Event Logs, and retain them to meet compliance requirements.
Intel agnosticism

Intel agnosticism

Perch connects to and consumes the best sources of threat intel for your business, free and paid. Connect to sharing community intel using your membership credentials. You can use any or all of the feeds from our Integration Partners. If you don’t see one you’re looking for, let our team know.

Share reported threats (aka sightings) with others in your community. When someone in your community sees a threat, you see it too. Shared sightings gives you the “bird’s eye view” of how threats are moving, and what attacks you (and we) should be prepared for.

Perch connects to and consumes the best sources of threat intel for your business, free and paid.
Threat management

Threat management

Here’s a TIP: Perch’s interface lets you enter and manage your own threat indicators, sharing them with your community if you wish. You can even build your own threat intelligence repository with Perch, at a fraction of the traditional TIP price tag. However you use it, this feature gives you even more control of your threat data, and lets you give back to your community.

Here’s a TIP: Perch’s interface lets you enter and manage your own threat indicators, sharing them with your community if you wish.
Reports

Reports

Easily access the big-picture information you need, when you need it, through Perchybana Dashboards. Build your own visualizations and add them to custom dashboards, or use these pre-built reports:

  • PCI DSS v3.2.1 Compliance
  • HIPAA Compliance
  • Networking
  • Windows Logs
  • Monitored Assets
  • Office 365

Don’t see what you need? Let us know.

Our team builds lovely graphs and reports, so you have access to all the information you need, when you need it. Don’t see what you’re looking for? Let us know and we’ll add it.

Perch is built with multi-tenancy at its core. Manage alerts for as many lines-of-business or clients as you like. Perfect for Managed Service Providers.

Perch is built with multi-tenancy at its core. Manage alerts for as many lines-of-business or clients as you like. Perfect for Managed Service Providers.

Take advantage of our included tier-1 alert support, reducing noise and alerting you of only real threats.

Already have threat intelligence analysts on your payroll? While Perch SOC works through alerts, your analysts can participate through Perchybana: investigate Perch alerts; analyze network traffic and logs. Drill down into alert details and view the same alert data our SOC sees.

Take advantage of our included tier-1 alert support, reducing noise and alerting you of only real threats.

You can ingest logs from syslog and Windows Event Logs, and retain them to meet compliance requirements. Perch also generates alerts to highlight notable log events based on log data, and enhance reporting and visualizations; and it gives our SOC extra insight into your endpoints and network traffic data.

You can ingest logs from syslog and Windows Event Logs, and retain them to meet compliance requirements.

Perch connects to and consumes the best sources of threat intel for your business, free and paid. Connect to sharing community intel using your membership credentials. You can use any or all of the feeds from our Integration Partners. If you don’t see one you’re looking for, let our team know.

Share reported threats (aka sightings) with others in your community. When someone in your community sees a threat, you see it too. Shared sightings gives you the “bird’s eye view” of how threats are moving, and what attacks you (and we) should be prepared for.

Perch connects to and consumes the best sources of threat intel for your business, free and paid.

Here’s a TIP: Perch’s interface lets you enter and manage your own threat indicators, sharing them with your community if you wish. You can even build your own threat intelligence repository with Perch, at a fraction of the traditional TIP price tag. However you use it, this feature gives you even more control of your threat data, and lets you give back to your community.

Here’s a TIP: Perch’s interface lets you enter and manage your own threat indicators, sharing them with your community if you wish.

Easily access the big-picture information you need, when you need it, through Perchybana Dashboards. Build your own visualizations and add them to custom dashboards, or use these pre-built reports:

  • PCI DSS v3.2.1 Compliance
  • HIPAA Compliance
  • Networking
  • Windows Logs
  • Monitored Assets
  • Office 365

Don’t see what you need? Let us know.

Our team builds lovely graphs and reports, so you have access to all the information you need, when you need it. Don’t see what you’re looking for? Let us know and we’ll add it.

How do we do it?

Perch is a single solution with 3 components:

See threat activity on your network and among your peers

Perch connects you with threat intelligence sharing communities and sources, and automates intel consumption. Identify potential threat activity on your network, and view everything through a user-friendly online interface.

Perch Web App
App Dashboard
Soc Managed Services

Boost defense, not headcount

No need to increase analyst hours or staff. The Perch Security Operations Center investigates any alerts on your network, escalates real incidents to your attention, and helps you eliminate the threat. Customize what and how we escalate to fit your needs.

Perch SOC

Detect what’s eluded your defenses

Firewalls are a perimeter defense to protect your network; Perch detects what’s already gotten through. During your lunch break, you can start detecting threats on your network.

Perch Sensors
Perch Sensor