(SIEM) technology supports threat detection, compliance and security incident management through the collection and analysis (both near real time and historical) of security events, as well as a wide variety of other event and contextual data sources. It keeps you compliant with reporting requirements.

Reports

Gain a full view of your data whenever you need it. You can build your own visualizations or choose from our pre-built reports.

  • PCI DSS v3.22 Compliance
  • HIPPA Compliance
  • Networking
  • Windows Logs
  • Monitored Assets
  • Office 365

Threat management

Enter, manage, and share your own threat indicators to have better control of your data and build your own threat intelligence repository.  Firewalls are a perimeter defense to protect your network, Perch detects what’s already gotten through.

Log ingestion

Ingest logs from Syslog and Windows® Event Logs while ensuring compliance, helping you enhance reporting and visualizations and gain more insight into your data.