Perch Security SOC
0.00

Problems that solves

Shortage of inhouse software developers

Shortage of inhouse IT resources

Shortage of inhouse IT engineers

High costs of IT personnel

Values

Reduce Costs

Enhance Staff Productivity

Perch Security SOC

Backed by our in-house Security Operations Center (SOC), Perch can launch your cybersecurity program, or add depth to the visibility you already have

Description

Multi-tenancy Perch is built with multi-tenancy at its core. Manage alerts for as many lines-of-business or clients as you like. Perfect for Managed Service Providers. Threat Hunting Take advantage of our included tier-1 alert support, reducing noise and alerting you of only real threats. Already have threat intelligence analysts on your payroll? While Perch SOC works through alerts, your analysts can participate through Perchybana: investigate Perch alerts; analyze network traffic and logs. Drill down into alert details and view the same alert data our SOC sees. Log ingestion You can ingest logs from syslog and Windows Event Logs, and retain them to meet compliance requirements. Perch also generates alerts to highlight notable log events based on log data, and enhance reporting and visualizations; and it gives our SOC extra insight into your endpoints and network traffic data. Intel agnosticism Perch connects to and consumes the best sources of threat intel for your business, free and paid. Connect to sharing community intel using your membership credentials. You can use any or all of the feeds from our Integration Partners. If you don’t see one you’re looking for, let our team know. Threat Management Here’s a TIP: Perch’s interface lets you enter and manage your own threat indicators, sharing them with your community if you wish. You can even build your own threat intelligence repository with Perch, at a fraction of the traditional TIP price tag. However you use it, this feature gives you even more control of your threat data, and lets you give back to your community. Reports Easily access the big-picture information you need, when you need it, through Perchybana Dashboards. Build your own visualizations and add them to custom dashboards, or use these pre-built reports:
  • PCI DSS v3.2.1 Compliance
  • HIPPA Compliance
  • Networking
  • Windows Logs
  • Monitored Assets
  • Office 365