Detect threats that get past traditional security tools

Illuminate threats on network and log data, with SOC included. Try it yourself, then shine the light for your customers.

APPLY TO BECOME A PARTNER
Security Wall

Single pane-of-glass view

Single pane-of-glass view

Built from the ground up with multi-tenancy, Perch makes managing all of your customers a breeze. And it’s transparent – you can see everything that we see, all the way to the detailed Indicators of Compromise (IoCs) and our analysis.

Security Operations Center included

Security Operations Center included

Our team of threat analysts does all the tedium for you, while you collect all the accolades from your clients. If you prefer to analyze threat indicators yourself, just click Perchybana and dive in. Optional service level agreements guarantee fast analysis turnaround.

Integrations

Popular integrations built in

Dynamic domain blocking for your favorite firewalls, ConnectWise Manage and Automate integration, and fresh integrations like Cisco AMP for Endpoints, Umbrella, and Duo fuel a simplified workflow for any MSP.

Learn More

MS 365 Monitoring

MS 365 & G Suite Monitoring

Defend your company against business email compromise (BEC), account takeovers, and have visibility beyond your network traffic. Make your MS 365 & G Suite logs searchable, parsable, cleaner, and reportable. Build alerts that suit your needs to get notified in real-time, then investigate the impact through Perchybana.

Connect to your favorite feeds

Connect to your favorite feeds

Cover your clients with the best threat intel on market. Perch ingests and automates most popular threat intelligence feeds – you can select which ones through our platform. No more noise for you, only identified threat activity from our SOC.

Super-fast implementation

Super-fast implementation

Perch sensors can be set up over a coffee break. You can install them yourself with setup instructions at Perch.help – and our Customer Success team is standing by to walk you through the process if you have any questions or difficulties.

See how using Perch to manage client threat detection feels.

Request A Demo