Overview of Plans

IT Connect ShieldI.T. Connect

IT Connect Plus ShiedI.T. Connect +

IT Connect Plus Managed Shield I.T. Connect + Managed

24×7 remote monitoring
EDR Detection & Response
EDR monitoring & analysis
Backup monitoring & analysis
Managed daily updates
Multifactor authentication
Password manager for all users
Office 365 monitoring, sharing, deletions, etc.
Firewall monitoring & analysis
Qtly. maintenance of workstations, networks, & servers
Qtly. inspections for rogue access points
Labor during business hours
Labor after hours for emergency scenarios
Yearly technology and security review
Yearly penetration testing of network segmentation
Yearly review of WISP
Yearly review of incident response plan
Yearly security awareness training
Security Information and Event Management (SIEM) with Change Detection and Internal Scanning
Special projects
Non-emergency services completed after hours

I.T. Connect  IT Connect Shield

With our I.T. Connect plan, your organization will be protected from a wide variety of threats. This base plan offers 24×7 remote monitoring, Endpoint Detection and Response (EDR), a robust password manager for all users, multifactor authentication, backup monitoring, and managed updates on devices. This is an alert-based plan; it does not include analysis, on-site visits, or routine system inspections.

If you are just starting out and want a good base for security, this plan is for you. If your organization requires more extensive security, please look ahead to the I.T. Connect + and I.T. Connect + Managed plans.

INCLUDED

  • 24×7 remote monitoring
  • Endpoint Detection and Response (EDR)—AI driven protection
  • EDR monitoring
  • Backup monitoring
  • Managed daily updates
  • Multifactor authentication
  • Password manager for all users

 

NOT INCLUDED

  • Routine system inspections

  • Additional labor

I.T. Connect + IT Connect Plus Shield

You can rest easy with our I.T. Connect + plan’s real-time threat detection and prevention. This preventative plan builds on our I.T. Connect plan with the addition of quarterly maintenance, Office 365 monitoring, and firewall monitoring.

Our team will establish and maintain protection for all devices to ensure an uninterrupted workflow for your business. We will manually inspect each computer, server, and firewall to make sure everything is functioning properly. We will also review workstation and server logs and inspect backup and EDR reports, allowing us to mitigate potential risks.

INCLUDED

  • 24×7 remote monitoring
  • Endpoint Detection and Response (EDR)—AI driven protection
  • EDR monitoring and analysis
  • Backup monitoring and analysis
  • Managed daily updates
  • Multifactor authentication
  • Password manager for all users
  • Office 365 monitoring for suspicious login events, sharing, deletions, rule creation, etc.
  • Firewall monitoring and analysis
  • Quarterly maintenance of workstations, networks, and servers
  • Security Information and Event Management (SIEM) with Change Detection and Internal Scanning
NOT INCLUDED

  • Additional labor

I.T. Connect + Managed IT Connect Plus Managed Shield

I.T. Connect + Managed is our top-tier, fully managed plan. If you want all-inclusive service with predictable payments for your yearly budget, this plan is for you. As our most comprehensive plan, I.T. Connect + Managed builds on I.T. Connect + with the inclusion of labor, yearly technology, infrastructure, and security posturing reviews, yearly penetration testing, and yearly security awareness training. If you want absolute security and peace of mind, this full-service plan is the one for you.

Special projects and non-emergency services completed outside of our regular business hours are the only exclusions and will be billed hourly or in an agreed upon sum.

INCLUDED

  • 24×7 remote monitoring
  • Endpoint Detection and Response (EDR)—AI Driven Protection
  • EDR monitoring and analysis
  • Backup monitoring and analysis
  • Managed daily updates
  • Multifactor authentication
  • Password manager for all users
  • Office 365 monitoring for suspicious login events, sharing, deletions, rule creation, etc.
  • Firewall monitoring and analysis
  • Quarterly maintenance of workstations, networks, and servers
  • Quarterly inspections for rogue access points
  • Labor during business hours
  • Labor after hours for emergency scenarios
  • Yearly technology and security review
  • Yearly penetration testing of network segmentation
  • Yearly review of Written Information Security Policy (WISP)
  • Yearly review of incident response plan
  • Yearly security awareness training
  • Security Information and Event Management (SIEM) with Change Detection and Internal Scanning
NOT INCLUDED

  • Special projects
  • Labor after hours for non-emergency work
OPTIONAL ADD-ONS

  • Email phishing training and testing
  • File access auditing of on-premises and cloud systems
  • Productivity reports and employee monitoring
  • Backup solutions—file, off-site replication, cloud/local, M365