-
EDR / MDRIdentify, contain, respond, and stop malicious activity on endpoints
-
SIEMCentralize threat visibility and analysis, backed by cutting-edge threat intelligence
-
Risk Assessment & Dark Web MonitoringIdentify and quantify unknown cyber risks and vulnerabilities
-
Cloud App SecurityMonitor and manage security risk for SaaS apps
-
SOC ServicesProvide 24/7 threat monitoring and response backed by ConnectWise SOC experts
-
Policy ManagementCreate, deploy, and manage client security policies and profiles
-
Incident Response ServiceOn-tap cyber experts to address critical security incidents
-
Cybersecurity GlossaryGuide to the most common, important terms in the industry
Perch: Network Threat Detection and Response
Protect client networks with Perch Security solutions backed by an in-house SOC
Cyberattacks are more frequent than ever. You need to keep your clients secure, but implementing cybersecurity solutions can be expensive and time-consuming. Perch Network Threat Detection has you covered with easy implementation and integration, complete network visibility, reliable cyberthreat detection, and more. Protect your clients’ networks—and your own—against cyberattacks with this co-managed detection and response platform backed by an in-house cybersecurity operations center.
Perch Network Threat Detection features
Multi-tenancy
Manage alerts for all your clients and lines of business using a single threat detection and response platform.
Threat hunting
Reduce noise with tier-1 support that only sends alerts for real cyber threats, and then drill down for more details with Perchybana
Log ingestion
Ingest logs from Syslog and Windows® Event Logs while ensuring compliance, so you can enhance reporting and visualizations and gain more insight into your data.
Intel agnosticism
Access community intel using your membership credentials so you’re better prepared to handle threats.
Threat management
Enter, manage, and share threat indicators to better control your data and build your own threat intelligence repository.
Reports
Gain a complete view of your data whenever you need it, allowing you to build your own visualizations or choose from our pre-built reports.
How can Perch benefit your cybersecurity?
Protect your house
Secure your networks with Perch to protect your customers and your business.
Build customer loyalty
Catch threats early and report them to your customers to validate their investment in your service.
Scale your offerings affordably
Become an MSP+ without shouldering the high costs, enduring a lengthy implementation time, or hiring more staff.
Unlock SIEM features without the price tag
Gain valuable context for network activity and meet compliance requirements with Perch’s log aggregation.
Integrate with your other solutions
Sync Perch seamlessly with ConnectWise Manage® for real-time threat activity notifications and easy documentation.
Access a top-of-the-line SOC
Access a team of certified, dedicated analysts who work 24/7 to review every alert and notify you when action is needed.
Boost visibility into your data
View all your data whenever and wherever you are with Perch’s comprehensive, easy-to-use dashboards.
“We chose Perch because we simply needed better security and real-time network breach detection provided at a reasonable cost. Perch provided a fully managed SOC solution that was easy to deploy and manage without creating 1,001 tickets per day. Their unique solutions offer us monthly alert review calls, human back-end support, and cross-market insight into advanced identification of threats by delivering an almost ‘set it and forget it’ type of solution that reduces the amount of noise we’ve had to handle in the past. Perch is one of our best vendors with an incredible team of highly skilled staff. We would highly recommend Perch—EVERY MSP should use it!”
Kyle Forward, Service Technician Analyst at ECMSI
Tap into more ConnectWise Security Management software
More cybersecurity resources from ConnectWise
eBook
Building Your MSP Security Offerings
Not sure where to begin when it comes to creating or evolving your MSP’s security offerings? This guide will help you.
Cybersecurity
Webinar
1h
Pricing and Packaging Cybersecurity
How to package and price your cybersecurity offerings is a question all MSPs share regardless of how mature their cybersecurity practice is. In this webinar, learn the different pricing and packaging models you can bring into your MSP and go to marketing with them successfully.
Cybersecurity