Managed SIEM
Benefits at a Glance
• Aggregate logs, add them to network metadata for deeper understanding of your universe
• Meet compliance regulations with less investment
• See network and log data & threat activity in a single pane of glass
• Includes Office 365® logs Integrate with cloud services
Enhance Perch’s Analysis of Your Environment
Whether you prefer to call it SIEM, data lake, or log aggregation, adding it enhances your view of your security posture. Our SOC is now detecting and investigating threats within log metadata. Now our clients can store logs for compliance without any other tools.
Perch is a powerful Managed Threat Detection and Response Platform. Perch detects, while our Security Operations Center (SOC) responds. You have full access to view your alert data, and can even have your team analyze alongside us. We baked our client’s most-requested SIEM features right into the Perch platform.
Now you can access these features directly within Perch:
Collect – Perch brings all your logs into a single pane of glass, right next to the network data you’re already sending us.
Detect – Add log metadata to reveal behavior patterns, and identify potential brute force and other attacks.
Respond – Search for anomalous events, generate reports and charts to share with clients.