Perch: Network Threat Detection and Response

Protect client networks with Perch Security solutions backed by an in-house SOC

Cyberattacks are more frequent than ever. You need to keep your clients secure, but implementing cybersecurity solutions can be expensive and time-consuming. Perch Network Threat Detection has you covered with easy implementation and integration, complete network visibility, reliable cyberthreat detection, and more. Protect your clients’ networks—and your own—against cyberattacks with this co-managed detection and response platform backed by an in-house cybersecurity operations center.

Perch Network Threat Detection features


Manage alerts for all your clients and lines of business using a single threat detection and response platform.

Threat hunting

Reduce noise with tier-1 support that only sends alerts for real cyber threats, and then drill down for more details with Perchybana

Log ingestion

Ingest logs from Syslog and Windows® Event Logs while ensuring compliance, so you can enhance reporting and visualizations and gain more insight into your data.

Intel agnosticism

Access community intel using your membership credentials so you’re better prepared to handle threats.

Threat management

Enter, manage, and share threat indicators to better control your data and build your own threat intelligence repository.


Gain a complete view of your data whenever you need it, allowing you to build your own visualizations or choose from our pre-built reports.

How can Perch benefit your cybersecurity?

Protect your house

Secure your networks with Perch to protect your customers and your business.

Build customer loyalty 

Catch threats early and report them to your customers to validate their investment in your service.

Scale your offerings affordably

Become an MSP+ without shouldering the high costs, enduring a lengthy implementation time, or hiring more staff.

Unlock SIEM features without the price tag

Gain valuable context for network activity and meet compliance requirements with Perch’s log aggregation.

Integrate with your other solutions

Sync Perch seamlessly with ConnectWise Manage® for real-time threat activity notifications and easy documentation.

Access a top-of-the-line SOC

Access a team of certified, dedicated analysts who work 24/7 to review every alert and notify you when action is needed.

Boost visibility into your data

View all your data whenever and wherever you are with Perch’s comprehensive, easy-to-use dashboards.

“We chose Perch because we simply needed better security and real-time network breach detection provided at a reasonable cost. Perch provided a fully managed SOC solution that was easy to deploy and manage without creating 1,001 tickets per day. Their unique solutions offer us monthly alert review calls, human back-end support, and cross-market insight into advanced identification of threats by delivering an almost ‘set it and forget it’ type of solution that reduces the amount of noise we’ve had to handle in the past. Perch is one of our best vendors with an incredible team of highly skilled staff. We would highly recommend Perch—EVERY MSP should use it!”

Kyle Forward, Service Technician Analyst at ECMSI

Tap into more ConnectWise Security Management software

ConnectWise Fortify
Managed cybersecurity detection & response software
Learn More >>
ConnectWise Identify
Cybersecurity risk assessment software
Learn More >>
Modern SIEM, SOC-as-a-Service & proactive defense
Learn More >>