Pricing

Managed Services Pricing

We offer different tiers to fit any business.  Choose the tier that best fits your objectives and business requirements!

Additional Information:

  • Locations: The first business location is included in the per user/computer fees. Each additional location is billed at $250 per month.
  • Contract Terms: All contracts include a 30-day cancellation policy. If you’re not satisfied with our services, you can terminate the agreement with 30 days’ notice. Upon cancellation, we provide all documentation compiled about your infrastructure.
  • Custom Quotes: If your business requires unique support—such as operating 24/7 or using specialized applications—please contact us for a tailored quote.
 

For more information or to discuss your specific needs, please  contact us!

Feature Core Core+ Advanced
24/7 Proactive System Monitoring Monitoring
Infrastructure uptime monitoring iKnow when critical systems (servers, Wi-Fi, switches, firewalls) go down—so issues get fixed before they impact revenue.
Internet connectivity monitoring iInstant alerts when your internet drops or degrades—reducing staff downtime and support escalations.
Application/custom alerts iMonitor the apps that run your business (ERP, POS, line-of-business) and alert the right person when they misbehave.
Security Protection
Standard antivirus protection iBlocks known malware and viruses on endpoints to reduce infections and help meet cyber insurance basics.
Next-generation antivirus (EDR) iDetects and stops modern attacks (ransomware, file-less threats) and enables rapid containment to limit damage.
Email filtering management (third-party) iCuts spam and phishing before it reaches users—fewer risky clicks and less time wasted clearing inboxes.
Multi-factor authentication (MFA) VPN management iLocks down remote access with MFA policies and upkeep—reducing breach risk from stolen passwords.
Quarterly vulnerability scans & remediation iFind and fix exploitable weaknesses on networks and devices—improves compliance and audit readiness.
Phishing simulations & security awareness training iReduces human-error breaches by coaching employees to spot and report suspicious emails.
Penetration testing iEthical hacking to prove what attackers could do—and prioritize fixes that materially lower risk.
Security information & event management (SIEM) iCentralizes security logs to detect suspicious behavior sooner—shortening time to respond.
Desktop and Node Management Endpoints
Operating system patch management iKeeps Windows/macOS up to date—closing security gaps and reducing support incidents.
Third-party application patch management iUpdates common apps (browsers, Java, PDF, etc.) automatically—minimizing exploit risk.
Scripting, automation & performance tuning iAutomates routine fixes and optimizes PCs—fewer slowdowns, less manual IT work.
Advanced Web Protection & Content Filtering Web
Real-time threat intelligence blocking iBlocks access to known malicious sites—reducing ransomware and credential-steal attempts.
Web usage analytics iSee risky or non-productive browsing trends—inform policies and protect staff productivity.
Granular filtering & productivity controls iControl categories and time-wasters by user or group—keep teams focused and compliant.
Cloud Backup & Disaster Recovery BC/DR
Daily server backups to secure cloud iYour data is backed up offsite every day—meet recovery objectives and compliance mandates.
7-day retention, one-click restores & alerts iRecover lost files fast and know if backups fail—minimizes downtime and data loss.
Immutable (ransomware-protected) backups iBackups can’t be altered by attackers—ensures a clean restore point after ransomware.
Hourly backups (28-day retention) iTighter recovery points for critical systems—roll back to just an hour before an incident.
Long-term archive snapshots iKeep monthly snapshots for years—support legal, finance, and retention requirements.
Bare-metal / cloud restore & testing iRestore entire servers to new hardware or cloud and test recovery—proves you can recover when it matters.
Microsoft 365 backup (Exchange/SharePoint/OneDrive/Teams) iProtects cloud email and files from deletion, ransomware, or departing users—fast restores when needed.
Desktop workstation backups iSafeguards key user data on laptops/desktops—recover from device loss or damage quickly.
Network & Identity Management Network
User & directory management (Active Directory / Azure AD) iFast onboarding/offboarding and access control—right people, right access, right away.
Single sign-on (SSO) management iOne login for many apps—better security, fewer passwords, happier users.
Domain registration & DNS management iKeep your web and email records accurate and secure—prevents outages and spoofing risks.
Switch / access point / firewall management iSecure, reliable networks—configuration, updates, and troubleshooting handled by experts.
Internet connection management iWe deal with the ISP and performance issues—less downtime, less finger-pointing.
Group Policy management iStandardizes security and settings across PCs—consistent, compliant, and easier to support.
New site startup, premise wiring, cloud/virtualization/storage iPlan and stand up new locations or platforms quickly—reduce go-live risk and delays.
Management & Reporting Reporting
Monthly basic health & annual inventory iClear view of what you have and how it’s performing—better planning and fewer surprises.
Yearly Virtual CIO review & budget iAlign IT spend to business goals—roadmaps, cost control, and smarter investments.
Advanced reporting (monthly/weekly/quarterly) iDeep health, web-threat, and executive reports—turn data into decisions.
Mobile Device Management Mobility
Mobile device management (customer platform) iSecure company phones: enforce policies, push apps, and remotely wipe lost devices.
Apple Business Manager device management iZero-touch Apple deployments—new Macs/iPhones ship ready for work with the right apps and policies.
Communication & Collaboration Communication
Email user management (Google/Microsoft 365) iFast account adds/changes with proper permissions—less wait time for new hires and role changes.
Email deliverability & anti-spoofing (DKIM/SPF/DMARC) iPrevents impersonation and improves inbox placement—protects your brand and ensures customers see your emails.
Email signature management (third-party) iConsistent, branded signatures across the company—update once, applied everywhere.
HelpDesk / User Support Support
8×5 HelpDesk iUser Helpdesk Support provides help for user support issues across your enterprise 8 hours a day / 5 days per week Pay-As-You-Go 5 Hours Unlimited
24×7 HelpDesk iRound-the-clock coverage for late-night teams or critical operations—no waiting until morning.
Service Level Agreement — Response Times SLA
Infrastructure — Critical Issue iGuaranteed response targets so outages are addressed quickly and transparently. 8 Hours 8 Hours 4 Hours
HelpDesk — Business Hours, Standard iEveryday issues resolved within defined windows—keep staff productive. 8 Hours 8 Hours 8 Hours
HelpDesk — Business Hours, Critical iFaster response for high-impact issues—shorter downtime for revenue-critical teams. 8 Hours 8 Hours 4 Hours
HelpDesk — After Hours, Standard iCoverage outside 9-to-5 for distributed or late-shift teams.
HelpDesk — After Hours, Critical iUrgent help when incidents strike at night or on weekends—reduce prolonged outages.
Pricing Cost
Price (per node/user) $49 $69 $99