Promote this Nomination
|Company (that provides the nominated product / solution / service)||Perch Security|
|Company size (employees)||10 to 49|
|Type of solution||Hybrid|
In 3 bullets, summarize why this product or service is different from the competition and deserves recognition:
• Automating participation in sharing communities.
• Putting intel to work beyond threat detection.
• Ideal combination of man and machine.
Perch consumes and automates your threat intelligence and uses it to detect any sign of threat lurking on your network, while our security operations center (SOC) analyzes any detected signs of cyber threat activity. Customers are notified immediately of any validated threat activity on networks they manage.
Appealing to enterprises, managed service providers and the SMB market alike, Perch side-steps the potential shortcomings of the “traditional” approaches to threat intelligence by:
1. taking a vendor-agnostic stance on intel source, supporting any threat intelligence feeds the user chooses,
2. providing a Security Operations Center staffed with certified threat intelligence analysts to relieve costs and management expenses, and
3. a robust but intuitive web application that allows users to see and interact with their threat intelligence program as much (or as little) as they wish.
Now with capability to add/manage IoCs and store logs for deeper investigation, Perch is a complete threat intelligence solution for institutions small to global. Managed service providers are flocking to Perch as an ideal platform to deliver co-managed threat intelligence services to their clients.