Pricing

Flexible plans with customizable support and optional add-ons for growth.

Our Support Plans

Our plans are designed to be flexible, allowing you to start with the level of support that meets your current needs and build upon it as your business evolves. You can also enhance any plan with optional add-on services that address specific requirements or challenges.
Foundations
Starts at
$35/Device/Month
(Minimum of 10 devices)
The perfect starting point if you’re seeking a cost-effective solution to manage their IT infrastructure and devices, and enforce security policies.
Features:
Optional Add-ons:
Solutions
Starts at
$110/Device/Month
(Minimum of 10 devices)
Enhanced support and management capabilities with unlimited access to our Help Desk team for prompt and efficient assistance on key applications.
All Foundations features plus:
Optional Add-ons:
Comprehensive
Starts at
$175/Device/Month
(Minimum of 20 devices)
Premium IT management for complex IT environments with rapid response times, advanced security measures including training, and lifecycle management.
All Solutions features plus:
Optional Add-ons:

What exactly are you getting

Mobile Device Management (MDM/RMM)
We enforce consistent security settings, prevent unauthorized changes, manage user settings and enable remote device management (lock, wipe) using industry-leading MDM/RMM tools across your fleet.
We proactively monitor your macOS and Windows devices for vulnerabilities and then nudge your users to allow the patches to be installed in a timely manner.
We keep your Core Applications up-to-date with the latest security patches and bug fixes. Core applications are defined during service kickoff but usually include Adobe Reader, Box Drive, Box Edit, Chrome, FileMaker Pro, Firefox, MS Office, Slack & Zoom.
We protect your users, computers, and network from advanced cyber threats, including ransomware, malware, and data breaches, through advanced security measures and threat hunting.
We encrypt your devices to safeguard sensitive data, preventing unauthorized access even if a device is lost or stolen.
We proactively monitor the health and security of your devices, identifying potential issues and vulnerabilities before they impact your operations. This includes performance monitoring, security threat detection, and compliance tracking.

We help you manage your computer and software investments by providing access to detailed reports via a secure online portal. Use this data to make smart decisions about future IT purchases and upgrades.

All Foundations features plus:

Zero-touch deployment for macOS / iOS / iPadOS devices
We pre-configure your new devices with the necessary settings, apps, and security policies, so they’re ready for your team to use right out of the box, eliminating the need for manual setup and saving valuable time.
We handle all aspects of managing your cloud productivity suite, including user account creation, configuration, security settings, and ongoing maintenance, ensuring a smooth and collaborative experience for your team.

.

Our team of experts is available to provide prompt and efficient remote assistance for any IT issues for the devices and platforms we manage. We can troubleshoot software problems, assist with connectivity issues, and answer technology-related questions your team may have that are within our scope of expertise.

We leverage Apple Business Manager and custom Apple online stores to streamline the procurement and deployment of Apple devices, simplifying inventory tracking, license management, and setting up Zero-touch deployment.

All Solutions features plus:

Discretionary On-site Support
For critical issues that we deem to require hands-on attention, we offer on-site technical support at your location. Our experienced technicians will diagnose and resolve the problem quickly and efficiently, minimizing disruption to your business operations.
We streamline the employee onboarding and offboarding process by automating user account provisioning, access control, and application deployment. This ensures new hires are productive from day one. For departing employees, we promptly revoke access and efficiently reset or refresh devices, establishing a clean baseline for the next user.
We proactively manage the lifecycle of your workstations (based on the 5-year standard lifecycle), ensuring your team has the appropriate technology for their roles and that your fleet remains compatible with the latest software updates and security patches.
Protect your team from spam, malware, malicious URLs, and phishing attacks, while safeguarding sensitive email communications with industry-leading encryption solutions.

.

We’ll help you manage your ever-growing collection of cloud-based software (like Salesforce, Slack, Dropbox, and more) and ensure they’re properly licensed, secured, and seamlessly integrated with your IT environment.

We review and update your Acceptable Use Policies to ensure they align with current best practices, legal requirements, and your organization’s specific needs. This helps protect your company from legal and security risks while promoting responsible technology use among employees.

Educate users on identifying threats and reinforce best practices for cybersecurity awareness with our engaging training modules and realistic phishing simulations.
We understand that your team size may change over time. Our flexible IT services can scale up or down as needed, ensuring you always have the right level of support, whether you’re expanding rapidly or experiencing seasonal fluctuations.

Cybersecurity

Email Security

Advanced email protection that safeguards your business from spam, malware, phishing, and impersonation attacks, while also preventing sensitive data like banking details and personally identifiable information (PII) from leaving your organization by monitoring outbound emails. 

Educate users on identifying threats and reinforce best practices for cybersecurity awareness with our engaging training modules and realistic phishing simulations. 

Back-up and Archiving

Safeguard your critical cloud data against accidental deletion, data corruption, or malicious attacks with automated backups and long-term archiving solutions tailored for Microsoft 365 and Google Workspace. 

Protect your valuable data stored in various cloud platforms with secure and reliable backup and archiving solutions, ensuring business continuity and easy data recovery. 

Prevent data loss and ensure uninterrupted operations by implementing robust backup solutions for your workstations, protecting against hardware failures, accidental deletions, and ransomware attacks. 

Technical Support

Our team of experts is available to provide prompt and efficient remote assistance for any IT issues your team encounters. We can troubleshoot software problems, assist with connectivity issues, and answer technology-related questions your team may have that are within our scope of expertise.

For critical issues that require hands-on attention, we offer on-site technical support at your location. Our experienced technicians will diagnose and resolve the problem quickly and efficiently, minimizing disruption to your business operations.

Device Management

We pre-configure your new devices with the necessary settings, apps, and security policies, so they’re ready for your team to use right out of the box, eliminating the need for manual setup and saving valuable time. 

We proactively manage the lifecycle of your workstations (based on the 5-year standard lifecycle) so your team has the appropriate technology for their roles and your fleet stays compatible with the latest software updates and security patches.   

We secure and manage your employees’ personal devices used for work, ensuring compliance with company policies and protecting sensitive data without compromising employee privacy. 

Others

We’ll help you manage your ever-growing collection of cloud-based software (like Box, Slack, Trello, and more) and ensure that they’re properly licensed, secured, and seamlessly integrated with your IT environment.

We review and update your Acceptable Use Policies to ensure they align with current best practices, legal requirements, and your organization’s specific needs. This helps protect your company from legal and security risks while promoting responsible technology use among employees.

We establish secure connections to your company network using Virtual Private Networks (VPNs), encrypting data and protecting it from unauthorized access, especially when employees work remotely or use public Wi-Fi.

We leverage Security Operations Center (SOC) services and Security Information and Event Management (SIEM) tools to provide comprehensive threat monitoring, detection, and response, safeguarding your systems and data from cyberattacks.

*** Some of these Add-ons are included in the Solutions and Comprehensive plans. Please refer to the plan matrix above for details on which add-ons are, or can be, included with your chosen plan.

Note:
Some features for the MDM, RMM, Zero-touch Deployment, and 3rd party Application Patching Management services have hardware and operating system compatibility requirements. Some restrictions apply.

Talk to our consultants today to discover which plan best fits your needs and how we can tailor it to your unique requirements.