PerchyCon 2020 View Agenda

Co-managed threat detection and response you can afford to deploy... anywhere.

 

Request Demo

Functionality

Perch is a co-managed threat detection and response platform backed by an in-house Security Operations Center (SOC). We built Perch to be flexible, scaling to any size business and tailored to fit your specific needs.

Where do you want to take your cyber security?

I want...

Full network visibility

Full network visibility.

Full network visibility

Perch passively collects your network data and provides access to netflow and other protocol meta data.

Learn More
Correlate log data

To correlate log data.

Correlate log data

Perch is a multi-tenant platform which allows you to correlate network and log data through a single pane of glass, seamlessly.

Learn More
To have security expertise available 24/7

To have security expertise available 24/7.

To have security expertise available 24/7

Perch SOC offers tier-1 support and manages your alerts 24/7 providing you with security expertise so you can focus on your core business.

Learn More
To use one product that covers all my threat detection and response needs

To use one product that covers all my threat detection and response needs.

To use one product that covers all my threat detection and response needs

Perch provides an all-in-one product. Complete with TIP, IDS, Log storage with configurable retention, and managed Security Operations Center (SOC). Add these capabilities right into your existing security program.

Learn More
To offer my clients network security without changing my security stack

To offer my clients network security without changing my security stack.

To offer my clients network security without changing my security stack

Perch integrates right into your existing security stack. Perch sensors are installed with no down time.

Automate the threat intelligence emails that my ISAC sends.

Automate the threat intelligence emails that my ISAC sends.

Perch automates your threat intelligence (ISAC or other). You can see your network alerts in the Perch Web app, drill down for detail; while our SOC does the analysis for you.

Perch automates your threat intelligence (ISAC or other). You can see your network alerts in the Perch Web app, drill down for detail; while our SOC does the analysis for you.

Quality alert information and SLAs

Quality alert information and SLAs.

Quality alert information and SLAs

Perch’s managed SOC provides tier-1 support and manages your alerts for you. Only real alerts get escalated and the Perch SOC helps you through the response process. We have multiple SLAs to fit your needs.

Learn More
A threat detection product that’s easy to implement

A threat detection product that’s easy to implement.

A threat detection product that’s easy to implement

Perch sensors can be installed over your lunch break with no down time. Our Customer Success team personally walks you through the process to answer any questions or problems that may arise.

Learn More
Network security without hiring more staff

Network security without hiring more staff.

Network security without hiring more staff

We triage alerts and notify you when malicious activity is identified. You can track SOC progress through the Community Defense App, anytime. If you prefer to do the nitty gritty, our SOC works alongside your team.

Learn More
Have access to my Office 365 logs so I can defend my company against business email compromise (BEC) and account takeovers.

Have access to my Office 365 logs so I can defend my company against business email compromise (BEC) and account takeovers.

Have access to my Office 365 logs so I can defend my company against business email compromise (BEC) and account takeovers.

Perch consumes Office 365 logs so you can see threats beyond your network traffic. Build your own alerts and investigate the impact through Perchybana.

To detect threats in my network

To detect threats in my network.

To detect threats in my network

Perch provides you with an Intrusion Detection System (IDS) to detect threats. Even those that have bypassed other preventative defenses.

Learn More
Use threat intelligence without buying a TIP.

Use threat intelligence without buying a TIP.

Perch connects you directly to your threat intelligence, without the need for a full-scale TIP.

Perch connects you directly to your threat intelligence, without the need for a full-scale TIP.

To build and manage intel on a Threat Intelligence Platform (TIP)

To build and manage intel on a Threat Intelligence Platform (TIP).

To build and manage intel on a Threat Intelligence Platform (TIP)

Perch allows you to create and manage indicators. You can track performance of the indicators you set up to see how they are performing in a community environment.

Learn More

Navigating the Cybersecurity waters: Decision-making tools for the MSP

Managed service providers (MSP) are discovering that cybersecurity is a vital piece of their service offering. Cybersecurity is still new, and a straight tool comparison is easily muddied with buzz words and ambiguous information. Where do you begin when trying to select the right vendor tools to combat cyber-attacks?

Learn More

Our Partner Community

"What we really like about Perch’s solution is that it is truly co-managed. We have the same visibility and tools as the Perch team allowing us to see what’s happening on our client’s networks in real-time, while having the peace of mind knowing that Perch’s Security Operations Center is also monitoring our clients and assessing threats behind the scenes."

Michael Brands

“We chose Perch because we simply needed better security and real-time network breach detection provided a reasonable cost. Perch provided a fully managed SOC solution that was easy to deploy and manage without creating 1001 tickets per day. Their unique solutions offer us monthly alert review calls, human back-end support, and cross-market insight into advanced identification of threats by delivering an almost “set it and forget it” type of solution that reduces the amount of noise we’ve had to handle in the past. Perch is one of our best vendors with an incredible team of highly skilled staff. We would highly recommend Perch – EVERY MSP should use it!“

Kyle Forward

Perch fits our needs. They can consume all of the intel channels we need, particularly from our ISAC. They can detect threats at the network layer and have visibility into things we just can’t see on the SIEM.

Greg Jones

The difference was immediate. Our old manual process generated a lot of noise. When Perch generates an alert, we know it’s actionable.

John Nelson

Having the threat intelligence from NH-ISAC alongside Perch to detect and respond to those threats helps us gain a far stronger cybersecurity posture than anything we could do on our own.

Lisa Steinbrueck

One of the biggest wins we get from Perch is not only the ability to detect those [network] threats, but also having help from Perch’s security analysts to tell us what threats are real and which ones are false positives.

Michael Cole

Perception is reality. This tool helps me sleep at night.

Rob Wilkinson

Cyber Defense Magazine
Managed Detection and Response (MDR) - Editor's Choice

Cyber Defense Magazine
Intrusion Detection System (IDS) - Next Gen

Cyber Security Excellence Award
Security Monitoring - Gold Winner

Cyber Security Excellence Award
Intrusion Detection & Prevention - Gold Winner

Cyber Security Excellence Award
Threat Detection, Intelligence and Response - Silver Winner

Cyber Security Excellence Award
Best Cybersecurity Startup - Silver Winner

Cyber Security Excellence Award
Security Monitoring - Silver Winner

Cyber Security Excellence Award
Intrusion Detection & Prevention - Bronze Winner