Kraft Technology Group – Perch Alerting Tool

Would you know if one of your employees either accidentally or intentionally downloaded an infected application, or visited a website that triggered a virus to breach your network?

Unfortunately, antivirus solutions and firewalls no longer provide all the protection you need. The fact is that your employees are your weakest link when it comes to cybersecurity—that’s why you need to monitor their internet activity.

This requires an alerting service that monitors all the traffic that comes through your network, analyzes it quickly, and, if suspicious, sends it on to IT professionals who determine if you have a problem. This is what Perch does.

“We are very happy to have Kraft as our IT partner.”

“Kraft Technology Group has provided great support to Prospect. Their expertise has been a tremendous help in developing new ideas and strategies for what we are trying to accomplish. The staff is very knowledgeable and their response time for support issues is terrific. We are very happy to have Kraft as our IT partner.”

MICHAEL PITTMAN

CFO, PROSPECT, INC.

blockquote stars

What Is Perch?

Perch is a co-managed threat detection and response platform backed by an in-house Security Operations Center (SOC). Enhanced by Artificial Intelligence (AI), Perch actively monitors for emergent and incoming threats, addressing them in real time and maintaining your cybersecurity posture.

Perch Detects When Your Employees Do Something They Shouldn’t

Let’s be clear: we’re not trying to get anyone in trouble. We just want to let you know if any of your employees are exhibiting risky internet behavior.

Perch works on any application or service that can access the Internet. If someone goes online or uses any type of cloud service, you’ll know. Most of the time, this is fine, but if they visit a malicious site or download something that they shouldn’t, you’ll know before it causes irreparable damage.

Perch Alerts You When Suspicious Activity Takes Place

Perch uses advanced analytics and correlation to detect threats and generate automated notifications 24 hours a day, 365 days a year. It uses AI to quickly go through everything that’s collected and classifies it as normal or suspicious.

All suspicious activity is then sent to a live IT professional for further analysis. The security analysts review your data for oversight and compliance. If they identify a risk, they will call you or us, based on how you want your Perch system set up.

It should be noted that Perch does not stop malicious traffic. We have other solutions to do this for you.

However, it lets us know if your employees are visiting malicious sites and what they did. We can then take the necessary steps to prevent this from happening again.

Key Scenarios In Which Perch Can Help

There have been situations where users downloaded and installed applications without administrative permission or the admin even knowing.

For example, you may have a policy where you don’t allow staff members to use Dropbox. After all, Dropbox doesn’t require administrative privileges, so you wouldn’t want your users to download it. Or, if someone uses a messaging application that’s not approved for use, you’ll know this too.

Furthermore, if an employee downloads a virus-laden application or visits a website that’s infected, the virus could infect your entire network and shut you down. Perch will let us know if a malicious virus has been downloaded.

You need to know what’s happening on your network at all times so you can act on it and stop viruses and malware from infecting your system.

With alerting, AI, and live security watching out for you, we can catch things quickly to prevent infections, breaches, and malicious activities from hurting your business.

Perch Is More Than Event Monitoring

You may say that you already have Security Incident and Event Monitoring (SIEM)—Perch is much more.

A SIEM solution alone can generate thousands of alerts each day, but many are false positives. To efficiently process the output, security engineers must make sense of a SIEM’s output to fine-tune the correlation rules and determine which alerts require further investigation or immediate attention.

Both automated and manual inspection workflows must be in place to protect your IT infrastructure—this is what Perch does for you.

Perch Is Affordable

The frequency of today’s cyber-attacks and data breaches requires that you bolster your defenses. Many businesses are recognizing the need for a security operations center (SOC) that combines the right people, processes, and technology to help them effectively identify and respond to growing threats.

But for small and mid-sized businesses, a SOC isn’t feasible due to its expense. Fortunately, you can sign up for Perch instead. It’s like having a SIEM and SOC combined, and for an affordable monthly fee.

Perch Goes Beyond Basic Security

Perch is an extra level of security that you would use in conjunction with your firewall and antivirus.

No one solution is enough—but with the right layered cybersecurity system and Perch watching over it all, you will be better protected.

The Kraft team understands that a single layer of protection simply won’t cut it—we’ve been in the business long enough to know that a simple cybersecurity defense will soon lead to a data breach.

That’s why we offer Perch. Contact our team to discover more about how it works and what it offers your business.