Pricing and Packaging

Packages designed for each stage of your teams growth and operational maturity.

UNLIMITED 24x7x365 Remote Helpdesk Support

Access via Phone, Email and Chat

Financially Backed Service Level Agreement

Online Portal

Documentation Access

Onsite Support Nationwide

24x7x365 Network and Server Monitoring

Patch Management

Windows and Mac Support

Endpoint Security

Dedicated Engineers

Mobile Device Management

Line of Business Application Updates

New Computer and User Setups

Included

Included

Included

Included

Included

Included

Included

Included

Included

Included

.

.

.

.

Included

Included

Included

Included

Included

Included

Included

Included

Included

Included

Included

Included

Included

Included

Included

Included

Included

Included

Included

Included

Included

Included

Included

Included

Included

Included

Included

Included

Dedicated Client Success Manager

Dedicated Service Delivery Manager

Dedicated IT Project Manager

Dedicated Virtual Chief Information Officer

Technology Business Review

Technology Standards Alignment

Strategic IT Roadmap

IT Budgeting

IT Asset Management

Reporting

Contract and Technology Vendor Management

Procurement Services

IT Risk Analysis

Setup Integration between Business Applications

Included

Included

Included

Included

Annual

Annual

Annual

Included

Included

Included

.

.

.

.

Included

Included

Included

Included

Quarterly

Quarterly

Quarterly

Included

Included

Included

Included

Included

.

.

Included

Included

Included

Included

Quarterly

Quarterly

Quarterly

Included

Included

Included

Included

Included

Annual

Included

Multi-Factor Authentication

Email Encryption

Email Spam Protection

Dedicated Virtual Chief Information Officer

Endpoint Detection and Response

Disk Encryption

Cloud to Cloud Backup for Microsoft 365

Managed Single Sign On

Advanced Email Threat and Anti-Phishing Protection

Security Awareness Training Program

Simulated Email Phishing

Dark Web Monitoring

Data Loss Prevention

Security Operations Center with SIEM

Network Intrusion Detection

Included

Included

Included

Included

.

.

.

.

.

.

.

.

.

.

.

Included

Included

Included

Included

Included

Included

Included

Included

Included

Included

Included

Included

.

.

.

Included

Included

Included

Included

Included

Included

Included

Included

Included

Included

Included

Included

Included

Included

Included

Online Training Portal

Curated Training Content

Quarterly Product and Technical Training

Available

Available

Available

Available

Available

Available

Included

Included

Included

Disaster Recovery as a Service

Virtual Desktops and Apps

Microsoft Teams Voice Services

Available

Available

Available

Available

Available

Available

Available

Available

Available

UNLIMITED 24x7x365 Remote Helpdesk Support

Access via Phone, Email and Chat

Financially Backed Service Level Agreement

Online Portal

Documentation Access

Onsite Support Nationwide

24x7x365 Network and Server Monitoring

Patch Management

Windows and Mac Support

Endpoint Security

Dedicated Engineers

Mobile Device Management

Line of Business Application Updates

New Computer and User Setups

Included

Included

Included

Included

Included

Included

Included

Included

Included

Included

.

.

.

.

Included

Included

Included

Included

Included

Included

Included

Included

Included

Included

Included

Included

Included

Included

Included

Included

Included

Included

Included

Included

Included

Included

Included

Included

Included

Included

Included

Included

Dedicated Client Success Manager

Dedicated Service Delivery Manager

Dedicated IT Project Manager

Dedicated Virtual Chief Information Officer

Technology Business Review

Technology Standards Alignment

Strategic IT Roadmap

IT Budgeting

IT Asset Management

Reporting

Contract and Technology Vendor Management

Procurement Services

IT Risk Analysis

Setup Integration between Business Applications

Included

Included

Included

Included

Annual

Annual

Annual

Included

Included

Included

.

.

.

.

Included

Included

Included

Included

Quarterly

Quarterly

Quarterly

Included

Included

Included

Included

Included

.

.

Included

Included

Included

Included

Quarterly

Quarterly

Quarterly

Included

Included

Included

Included

Included

Annual

Included

Multi-Factor Authentication

Email Encryption

Email Spam Protection

Dedicated Virtual Chief Information Officer

Endpoint Detection and Response

Disk Encryption

Cloud to Cloud Backup for Microsoft 365

Managed Single Sign On

Advanced Email Threat and Anti-Phishing Protection

Security Awareness Training Program

Simulated Email Phishing

Dark Web Monitoring

Data Loss Prevention

Security Operations Center with SIEM

Network Intrusion Detection

Included

Included

Included

Included

.

.

.

.

.

.

.

.

.

.

.

Included

Included

Included

Included

Included

Included

Included

Included

Included

Included

Included

Included

.

.

.

Included

Included

Included

Included

Included

Included

Included

Included

Included

Included

Included

Included

Included

Included

Included

Online Training Portal

Curated Training Content

Quarterly Product and Technical Training

Available

Available

Available

Available

Available

Available

Included

Included

Included

Disaster Recovery as a Service

Virtual Desktops and Apps

Microsoft Teams Voice Services

Available

Available

Available

Available

Available

Available

Available

Available

Available