Features & Benefits
Service description (hover for description) |
Included in STARTER? |
Included in ESSENTIALS? |
Included in PREMIUM? |
Available? |
Expert Microsoft 365 setup and supporti Tech Speak
We will audit your Microsoft environment and provide recommendations on service and security improvement to meet your business and regulatory requirements, improve workflow and get best value from your investment.
Plain English Microsoft 365 Business Premium has an amazing number of features and benefits. Our team will make sure it is setup properly, securely and safely. We will also provide ongoing support, recommendations and tuition how to use these tools in your business. |
✓ |
✓ |
✓ |
Tailored |
Microsoft 365 Risky Sign-on detectioni Tech Speak
Microsoft 365 risky sign-on detection is a services that uses machine learning algorithms to analyze user sign-in behavior, identifying suspicious activities or potential security risks within the Microsoft 365 environment. These are escalated to us for investigation and remediation.
Plain English Our Microsoft 365 risky sign-on detection service watches how users log in and flags any strange or risky behavior, helping keep your Microsoft accounts safe from hackers. |
✓ |
✓ |
✓ |
Tailored |
Endpoint health monitoring and problem resolutioni Tech Speak
Endpoint health monitoring and problem resolution involves continuous tracking of performance and health metrics of individual endpoint devices (computers, laptops) within a network, along with proactive measures to identify and address any issues that may arise.
Plain English We keep an eye on each computer in your business to make sure they're running smoothly and safely. If there's a problem, we'll jump in to fix it before it causes any trouble. |
✓ |
✓ |
✓ |
Tailored |
Software patchingi Tech Speak
Operating system and application patching is the process of regularly updating software to fix known vulnerabilities and bugs, ensuring systems remain secure and functional.
Plain English We make sure your computer programs and systems stay up-to-date with the latest fixes and improvements, so hackers can't exploit any known weaknesses. |
✓ |
✓ |
✓ |
Tailored |
Next-Gen anti-virus with XDRi Tech Speak
Next-Gen anti-virus with XDR (Extended Detection and Response) is an advanced security solution that combines traditional antivirus capabilities with proactive threat detection and response features, utilizing cross-layered visibility and analytics to defend against sophisticated cyber threats. Most cyber insurance policies require XDR functionality.
Plain English Our advanced antivirus system doesn't just stop viruses; it also identifies suspicious activity and new threats that can harm your computer. Using this smart technology, threats can be identified more quickly. |
✓ |
✓ |
✓ |
Tailored |
Windows and macOS device encryptioni Tech Speak
Windows and macOS device encryption is a security feature that protects data on computers by converting it into unreadable code, ensuring confidentiality and integrity even if the device is lost or stolen.
Plain English We use special technology to scramble all the information on your computer, so even if someone tries to access it without permission, they won't be able to see or read your data. |
✓ |
✓ |
✓ |
Tailored |
Microsoft 365 / Google data backupi Tech Speak
Microsoft 365 / Google data backup is a service that regularly copies and stores critical information from Microsoft 365 or Google Workspace applications, ensuring data availability and recovery in the event of accidental deletion, corruption, or cyberattacks.
Plain English We regularly save important stuff from your Microsoft 365 or Google Workspace accounts, so if something goes wrong like accidental deletion or a cyberattack, we can bring it back for you. |
✓ |
✓ |
✓ |
Tailored |
Security awareness trainingi Tech Speak
Security awareness training involves educating employees on various cybersecurity threats, best practices, and policies to help them recognize and respond appropriately to potential security risks, ultimately reducing the likelihood of successful attacks.
Plain English We teach your team about online dangers and how to stay safe, like spotting suspicious emails or keeping passwords strong. It's like giving them a superhero cape against cyber villains! |
✓ |
✓ |
✓ |
Tailored |
Domain & DNS managementi Tech Speak
Oversight and administration of domain name registrations, renewals, and Domain Name System (DNS) configurations, ensuring correct domain resolution, safeguarding against latency, and maintaining coherent internet presence and connectivity.
Plain English We manage your website’s name and its address book (DNS) to ensure people can easily find your site on the internet, your email is reliably and safely delivered, and key email security settings are put into place. |
✓ |
✓ |
✓ |
Tailored |
Network & Wi-Fi supporti Tech Speak
Resolving network connection and configuration issues, ensuring a reliable and secure connection to your resources and the internet.
Plain English We help keep your IT networks running smoothly, fixing any issues and making sure data flows securely and quickly where it needs to. We also support your team if connection problems arise. |
✓ |
✓ |
✓ |
Tailored |
Joiner & leaver actionsi Tech Speak
Implementation and administration of IT protocols for onboarding and offboarding personnel, encompassing access provisioning and de-provisioning, credential management, and resource allocation or reallocation to ensure secure and compliant IT operation.
Plain English We manage tech tasks when someone joins or leaves your business, like setting up accounts for new people or removing access for those who've left, ensuring things stay secure and organised. This is tailored to your business's unqiue needs. |
✓ |
✓ |
✓ |
Tailored |
Remote device & profile setupi Tech Speak
End-to-end orchestration and configuration of user devices and profiles, entailing hardware/software setup, policy enforcement, and personalised user environment creation, to facilitate usability and adherence to your business IT standards.
Plain English We get your team's devices and accounts set up right, making sure everyone has what they need to work effectively and securely on their devices from day one. |
✓ |
✓ |
✓ |
Tailored |
Network device managementi Tech Speak
Network device management encompasses the configuration, monitoring, and maintenance of network devices such as routers, switches, and firewalls to ensure optimal performance, security, and reliability of the network infrastructure.
Plain English We take care of all the devices that make your internet work smoothly, making sure they're set up right, watching to catch any problems, and keeping everything running safely. |
✘ |
✓ |
✓ |
Tailored |
MDM monitoring & maintenancei Tech Speak
Monitoring and management of the mobile device management (MDM) environment (such as Microsoft Intune), ensuring the seamless operation of mobile and endpoint management, policy adherence, and secure application deployment across enterprise mobile devices and workstations.
Plain English We watch over and manage your MDM platform, making sure all your work devices are managed safely and efficiently, keeping apps and settings secure and up-to-date. |
✘ |
✓ |
✓ |
Tailored |
Configure and ship servicei Tech Speak
End-to-end device provisioning and deployment services, encompassing initial configuration, installation of requisite software, and physical despatch of IT assets to predetermined locations, ensuring operational readiness upon receipt by the end-user.
Plain English We set up your tech devices with all the software and settings they need, then pack them up and send them wherever they need to go, so they’re ready to use straight out of the box. |
✘ |
✘ |
✓ |
Tailored |
3-year IT budgeting and planning (vCIO)i Tech Speak
Strategic co-creation and development of a 3-year IT financial plan, entailing collaborative forecasting, allocation, and optimisation of technological expenditures, aligning with organisational goals and ensuring fiscal prudence and sustainability.
Plain English Working together, we’ll plan and create your tech spending plan for the next three years, making sure it aligns with your business goals and keeps your IT expenditure predicatable. |
✘ |
✘ |
✓ |
Tailored |