Features & Benefits
Service description (hover for description) |
Included in STARTER? |
Included in ESSENTIALS? |
Included in PREMIUM? |
Included with IT SUPPORT? |
Expert Microsoft 365 setup and supporti Tech Speak
We will audit your Microsoft environment and provide recommendations on service and security improvement to meet your business and regulatory requirements, improve workflow and get best value from your investment.
Plain English Microsoft 365 Business Premium has an amazing number of features and benefits. Our team will make sure it is setup properly, securely and safely. We will also provide ongoing support, recommendations and tuition how to use these tools in your business. |
✓ |
✓ |
✓ |
✓ |
Endpoint health monitoring and problem resolutioni Tech Speak
Endpoint health monitoring and problem resolution involves continuous tracking of performance and health metrics of individual endpoint devices (computers, laptops) within a network, along with proactive measures to identify and address any issues that may arise.
Plain English We keep an eye on each computer in your business to make sure they're running smoothly and safely. If there's a problem, we'll jump in to fix it before it causes any trouble. |
✓ |
✓ |
✓ |
✓ |
Software patchingi Tech Speak
Operating system and application patching is the process of regularly updating software to fix known vulnerabilities and bugs, ensuring systems remain secure and functional.
Plain English We make sure your computer programs and systems stay up-to-date with the latest fixes and improvements, so hackers can't exploit any known weaknesses. |
✓ |
✓ |
✓ |
✓ |
Anti-virus with EDRi Tech Speak
Next-Gen anti-virus with EDR (Endpoints Detection and Response) is an advanced security solution that combines traditional antivirus capabilities with proactive threat detection and response features, utilizing cross-layered visibility and analytics to defend against sophisticated cyber threats. Most cyber insurance policies require EDR functionality.
Plain English Our advanced antivirus system doesn't just stop viruses; it also identifies suspicious activity and new threats that can harm your computer. Using this smart technology, threats can be identified more quickly. |
✓ |
✓ |
✓ |
✓ |
Windows and macOS device encryptioni Tech Speak
Windows and macOS device encryption is a security feature that protects data on computers by converting it into unreadable code, ensuring confidentiality and integrity even if the device is lost or stolen.
Plain English We use special technology to scramble all the information on your computer, so even if someone tries to access it without permission, they won't be able to see or read your data. |
✓ |
✓ |
✓ |
✓ |
Microsoft 365 / Google data backupi Tech Speak
Microsoft 365 / Google data backup is a service that regularly copies and stores critical information from Microsoft 365 or Google Workspace applications, ensuring data availability and recovery in the event of accidental deletion, corruption, or cyberattacks.
Plain English We regularly save important stuff from your Microsoft 365 or Google Workspace accounts, so if something goes wrong like accidental deletion or a cyberattack, we can bring it back for you. |
✓ |
✓ |
✓ |
Optional user protection pack |
Security awareness trainingi Tech Speak
Security awareness training involves educating employees on various cybersecurity threats, best practices, and policies to help them recognize and respond appropriately to potential security risks, ultimately reducing the likelihood of successful attacks.
Plain English We teach your team about online dangers and how to stay safe, like spotting suspicious emails or keeping passwords strong. It's like giving them a superhero cape against cyber villains! |
✓ |
✓ |
✓ |
Optional user protection pack |
Best practice Email security i Tech Speak
We will ensure that all email DNS records ar correctly researched and configured, including SPF, DMARC & DKIM, to ensure email deliverability and reduce the chance of your email accounts being spoofed.
Plain English Ever wondered why your emails keep going into junk? We will ensure your email internet records are correctly configured and stay that way. We will also protect your email address from being used to scam others. |
✓ |
✓ |
✓ |
Optional user protection pack |
SaaS monitoring and protectioni Tech Speak
SaaS applications are vulnerable to attack, and are an often overlooked vulnerable area. Our SaaS monitoring and protection, constantly monitors common SaaS Apps (Microsoft 365, Google Workspace, Slack, SalesForce, Dropbox and more) to analyze user sign-in behavior, suspicious activities or potential security risks within the these environments. Automation, rules and alerting ensures these key data silos remain secure.
Plain English Our data is now stored mostly in cloud applications such as Microsoft 365. Our SaaS monitoring and protectiom service watches how users log in and flags any strange or risky behavior, helping keep your accounts and data safe from hackers. |
✓ |
✓ |
✓ |
Optional user protection pack |
Phishing protection and trainingi Tech Speak
Using AI, Machine learning and other techniques, emails will be screened and filtered based on content. Advanced tech ensure that phishing emails are removed from staff inboxes. Advanced policies means you can control what emails gets in and what doesn't.
Plain English Over 90% of successful cyber attacks start with a phishing email. We detect and remove those from your staff inboxes. We also send test phishing emails regulalry to identify where training will benefit staff. |
✓ |
✓ |
✓ |
✘ |
Password breach monitoringi Tech Speak
Password dark web breach monitoring provides businesses with early detection of compromised credentials, enabling swift incident response and mitigation of potential cyber threats.
Plain English Password breach monitoring is like a superhero who watches for bad guys trying to steal your secret codes and tells you so you can keep your toys safe. |
✓ |
✓ |
✓ |
✘ |
Domain & DNS managementi Tech Speak
Oversight and administration of domain name registrations, renewals, and Domain Name System (DNS) configurations, ensuring correct domain resolution, safeguarding against latency, and maintaining coherent internet presence and connectivity.
Plain English We manage your website’s name and its address book (DNS) to ensure people can easily find your site on the internet, your email is reliably and safely delivered, and key email security settings are put into place. |
✓ |
✓ |
✓ |
✓ |
Network & Wi-Fi supporti Tech Speak
Resolving network connection and configuration issues, ensuring a reliable and secure connection to your resources and the internet.
Plain English We help keep your IT networks running smoothly, fixing any issues and making sure data flows securely and quickly where it needs to. We also support your team if connection problems arise. |
✓ |
✓ |
✓ |
✓ |
Joiner & leaver processi Tech Speak
Implementation and administration of IT protocols for onboarding and offboarding personnel, encompassing access provisioning and de-provisioning, credential management, and resource allocation or reallocation to ensure secure and compliant IT operation.
Plain English We manage tech tasks when someone joins or leaves your business, like setting up accounts for new people or removing access for those who've left, ensuring things stay secure and organised. This is tailored to your business's unqiue needs. |
✓ |
✓ |
✓ |
✓ |
Standardised bespoke computer buildi Tech Speak
A standardised software build with approved apps ensures consistent security, simplifies maintenance, enhances compatibility, and reduces costs by streamlining updates and support across the organisation
Plain English Using the same apps and software on all computers makes them safer, easier to fix, and cheaper to manage. It helps everyone work better together and keeps things running smoothly. |
✓ |
✓ |
✓ |
✓ |
Remote device & profile setupi Tech Speak
End-to-end orchestration and configuration of user devices and profiles, entailing hardware/software setup, policy enforcement, and personalised user environment creation, to facilitate usability and adherence to your business IT standards.
Plain English We get your team's devices and accounts set up right, making sure everyone has what they need to work effectively and securely on their devices from day one. |
✓ |
✓ |
✓ |
✘ |
Network device managementi Tech Speak
Network device management encompasses the configuration, monitoring, and maintenance of network devices such as routers, switches, and firewalls to ensure optimal performance, security, and reliability of the network infrastructure.
Plain English We take care of all the devices that make your internet work smoothly, making sure they're set up right, watching to catch any problems, and keeping everything running safely. |
✘ |
✓ |
✓ |
✘ |
MDM monitoring & maintenancei Tech Speak
Monitoring and management of the mobile device management (MDM) environment (such as Microsoft Intune), ensuring the seamless operation of mobile and endpoint management, policy adherence, and secure application deployment across enterprise mobile devices and workstations.
Plain English We watch over and manage your MDM platform, making sure all your work devices are managed safely and efficiently, keeping apps and settings secure and up-to-date. |
✘ |
✓ |
✓ |
✘ |
Configure and ship servicei Tech Speak
End-to-end device provisioning and deployment services, encompassing initial configuration, installation of requisite software, and physical despatch of IT assets to predetermined locations, ensuring operational readiness upon receipt by the end-user.
Plain English We set up your tech devices with all the software and settings they need, then pack them up and send them wherever they need to go, so they’re ready to use straight out of the box. |
✘ |
✘ |
✓ |
✘ |
3-year IT budgeting and planning (vCIO)i Tech Speak
Strategic co-creation and development of a 3-year IT financial plan, entailing collaborative forecasting, allocation, and optimisation of technological expenditures, aligning with organisational goals and ensuring fiscal prudence and sustainability.
Plain English Working together, we’ll plan and create your tech spending plan for the next three years, making sure it aligns with your business goals and keeps your IT expenditure predicatable. |
✘ |
✘ |
✓ |
✘ |