Detect threats that get past traditional security tools
Illuminate threats on network and log data, with SOC included. Try it yourself, then shine the light for your customers.
APPLY TO BECOME A PARTNER
Built from the ground up with multi-tenancy, Perch makes managing all of your customers a breeze. And it’s transparent – you can see everything that we see, all the way to the detailed Indicators of Compromise (IoCs) and our analysis.
Our team of threat analysts does all the tedium for you, while you collect all the accolades from your clients. If you prefer to analyze threat indicators yourself, just click Perchybana and dive in. Optional service level agreements guarantee fast analysis turnaround.
Dynamic domain blocking for your favorite firewalls, ConnectWise Manage and Automate integration, and fresh integrations like Cisco AMP for Endpoints, Umbrella, and Duo fuel a simplified workflow for any MSP.
Learn More
Defend your company against business email compromise (BEC), account takeovers, and have visibility beyond your network traffic. Make your MS 365 & G Suite logs searchable, parsable, cleaner, and reportable. Build alerts that suit your needs to get notified in real-time, then investigate the impact through Perchybana.
Cover your clients with the best threat intel on market. Perch ingests and automates most popular threat intelligence feeds – you can select which ones through our platform. No more noise for you, only identified threat activity from our SOC.
Perch sensors can be set up over a coffee break. You can install them yourself with setup instructions at Perch.help – and our Customer Success team is standing by to walk you through the process if you have any questions or difficulties.
PerchyCoin Scavenger Hunt 2020 - hint: tempus fugit