(SIEM) technology supports threat detection, compliance and security incident management through the collection and analysis (both near real time and historical) of security events, as well as a wide variety of other event and contextual data sources. It keeps you compliant with reporting requirements.
Reports
Gain a full view of your data whenever you need it. You can build your own visualizations or choose from our pre-built reports.
- PCI DSS v3.22 Compliance
- HIPPA Compliance
- Networking
- Windows Logs
- Monitored Assets
- Office 365
Threat management
Enter, manage, and share your own threat indicators to have better control of your data and build your own threat intelligence repository. Firewalls are a perimeter defense to protect your network, Perch detects what’s already gotten through.
Log ingestion
Ingest logs from Syslog and Windows® Event Logs while ensuring compliance, helping you enhance reporting and visualizations and gain more insight into your data.