Pricing for Managed Services

Pick the best plan for you

You have Free Unlimited Updates and Premium Support on each package.

Aurora

$45/user/mo

Support as a Software. Our affordable support option powered by AI, leveraged to support you!

Get Started
  • AI Optimized Automations
    ?
    We've created 740+ IT automations to empower your business to perform at its peak! You'll wonder why you don't have as many issues as before.
  • Employee Onboarding and Offboarding
    ?
    Employees coming and going is just part of doing business, but it shouldn't be hard! Don't worry, we have you covered!
  • M365 Email Backup
    ?
    We make sure that your employees Emails, OneDrive, SharePoint, and Teams are safe from deletion and there if you need to recover them.
  • AI Malware Protection
    ?
    Endpoint Detection and Response(EDR). We utilize AI and machine learning to catch unknown viruses and keep your business safe.
  • Security Updates
    ?
    Our Patch Management policies ensure your devices are getting the all the security updates that the bad guys wish you ignored!
  • AI Chat / Email Support
    ?
    Email and Chat support are included to help you solve your problems without having to pickup the phone!
Compare Plans!
Guardian

$132/user/mo

Best for established businesses that are ready to Grow to the next level!
*Discounts may apply

Sign Up Now!
  • Aurora +
  • Executive Account Manager
    ?
    Get personalized attention from one of our best to help you achieve your goals using technology.
  • IT Inventory Management and Budget Planning
    ?
    We'll take the planning burden off your plate! We can help create an optimized plan and schedule to get your budget squared away!
  • End to End Protection
    ?
    From your email to your workstation, we have monitoring and security in place to help us catch bad guys before they get in!
  • Application Whitelisting
    ?
    Application Management that allows us to tell your devices what can be installed and what cannot. Stopping malicious code from getting to you!
  • Security Awareness Training
    ?
    If your people know what's out there, the bad guys are going to have a hard time getting in. That's where this training comes in.
  • Microsoft 365 License
    ?
    Our security program utilizes the features in Business Premium - and you get to take advantage of all the productivity benefits of Microsoft 365!
  • Firewall Replacement
    ?
    We provide a hardware firewall for physical locations of sufficient size.
See Features!
InfoKnox

$268/user/mo

Cyber Security and support! Save your employees, customers, and you Time!
*Discounts may apply

Protect Me!
  • Guardian +
  • Compliance Management
    ?
    Getting and staying compliant isn't easy - but we can ensure that you meet your obligations without the headache.
  • Risk Management
    ?
    Risk Management and Proactive Mitigation reduce your attack surface and harden your business against cyberattacks.
  • SIEM/SOAR
    ?
    We'll listen to your logs and analyze the data to ensure there is no intrusion - and if there is, we'll be on it!
  • 24 X 7 SOC
    ?
    The bad guys aren't sleeping when you aren't working - we have a 24 x 7 Security Operations Center to keep an eye on your business so you can rest easy.
  • Advanced 365 Security
    ?
    Microsoft invested over $1 Billion into Cybersecurity offerings - we'll help you take advantage of it.
More Details!

Why Us?

Because we Rock! Obviously, it's in our name!

See what other people think and see why you should do your business a favor and hire us today!

Testimonials

Pick the best plan for you

You Rock, We Rock, Lets Rock together!

Aurora

Guardian

Infoknox

  • Advanced Performance Monitoring
    ?
    We monitor your devices and network to ensure they are running at peak performance
  • Monitoring for Bloatware
    ?
    We monitor for programs known to cause problems and work with clients to replace or remove them when they are found
  • Employee and Device Onboarding/Offboarding
    ?
    Let us help manage your employee onboarding and offboarding process and get people the permissions, equipment, and software they need to do their job
  • Application Maintenance and Management
    ?
    We help you maintain your 3rd party applications and ensure they are up to date and secure
  • Automatic Fixes
    ?
    We have created tons Proactive Automations to optimize your experience and keep your devices running smoothly
  • Device optimization
    ?
    We adjust device settings in the background to ensure you are getting the most out of your devices
  • Network device monitoring and management
    ?
    We monitor your networking equipment to ensure they are running at peak performance
    $
  • Patch Management
    ?
    In today's world, patches are released all the time to fix security vulnerabilities. Someone needs to make sure they are installed ASAP. We can help with that.
  • Routine Server and Desktop maintenance
    ?
    Devices need digital and sometimes physical maintenance to ensure they stay problem free. We can help with that.
  • Server/PC Self Healing
    ?
    If something does go wrong, we have smart technology to try to resolve the issues right away - invisibly to you. If we can't fix it, we will let you know.
  • Software License and Hardware Management
    ?
    We'll keep track of your subscriptions, warranties, and hardware to make sure you are not overpaying or underprotected.
  • Change Management Procedure Handling
    ?
    We will help you manage the changes in your IT environment to ensure that they are done in a controlled and secure manner
    $
  • Advanced Security Monitoring (SIEM/SOAR)
    ?
    Collection and analysis of many logs and alerts into a single system, allowing for real-time security incident response and the systematic review of configurations and effectiveness
    $
  • 24x7 MDR
    ?
    Managed Detection and Response (MDR), collects even more data for security analysis, enhancing our threat hunting and response capabilities
    $
    $
  • SSO / SAML Management
    ?
    We'll set up and manage your seamless secure login to 3rd party apps
    $
  • Application Control Security
    ?
    Cutting edge technology to ensure that only the right applications are running on your devices - without getting in your way
  • Anti-Phishing
    ?
    We'll keep your email security tight to help stop people from trying to use social engineering through your email to get information they don’t need
    $
  • AV/EDR
    ?
    Endpoint Detection and Response(EDR) utilizes AI, ML, and other smart technologies to protect you - even from threats that haven't been seen before
  • Compliancy Enforcement and Mgmt
    ?
    We can help you manage your compliance paperwork to help you ensure all the boxes are checked.
    $
    $
  • Domain security analysis and configuration
    ?
    A full review of your web domains security using OSINT tooling, followed by either taking action to resolve issues or bringing larger issues to your attention
    $
    $
  • Configuration management and enforcement
    ?
    After an initial assessment, or a quarterly review, we perform an initial secure configuration - then create custom monitoring and enforcement mechanisms to ensure your environment stays secure.
  • Continuous Security Monitoring
    ?
    We constantly evaluate the configuration of your Domain, M365 Environment, PCs, Servers, and network stack to ensure it is secure
  • Dark Web Monitoring
    ?
    We monitor for breached passwords being utilized within your organization, in Guardian/InfoKnox - we have more tools to monitor this
  • Advanced Data Access Controls
    ?
    We can assist you in creating a data tagging and encryption strategy to ensure your private and confidential information remains secure
    $
    $
  • Device Disk Encryption
    ?
    We will ensure that your local disks are encrypted and we will help you manage the encryption keys
  • Web Protection and Content Filtering
    ?
    We will monitor your devices network traffic to ensure your not talking to the bad servers
  • Advanced Cloud Application Protection
    ?
    We will help you secure your cloud applications, infrastructure, and workloads to ensure that only the right people have access to them
    $
    $
  • Hardware Firewall
    ?
    We will install and manage a physical firewall at any location(s) staffing over 10 users
    $
  • Firewall monitoring and management
    ?
    We ensure that your firewall is up to date and optimized for security
    $
  • Vulnerability Management Reporting
    ?
    Real-time Monitoring your PCs, Servers, and Network Appliances for known vulnerabilities and weaknesses
  • Vulnerability Proactive Mitigation
    ?
    When we find know vulnerabilities on your PCs, Servers, or Network Appliances we will take care of mitigate or resolve the issues ASAP
    $
    $
  • Mail Archiving and Governance
    ?
    Stay compliant with regulations and save those old emails for when you need them
    $
    $
  • Mail filtering and protection
    ?
    Advanced protection for your email
    $
  • Secondary email filtering service
    ?
    When one layer isn't enough, we can apply a multi-layered email defense to protect your organization from email-borne threats
    $
    $
    $
  • 365 MFA Enforcement
    ?
    Multi-Factor Autentication is a must for any business. We can help you enforce this on your M365 environment
  • Quarterly Risk Assessment
    ?
    We will review your business IT Risk exposure to exnsure you are still protected appropriately
    $
    $
  • Network IDS/IPS
    ?
    Intrusion Detection and Prevention Systems are a must for any business. We can help you enforce this on your network
    $
  • Password Manager
    ?
    A safe place to store your secrets that doesn't involve pen, paper, and a locked file cabinet. We can help you set this up and manage it.
    $
  • Security Awareness Training
    ?
    Make sure your employees know how to keep your business safe from cyber threats
  • Phishing Simulation
    ?
    We can test your employees knowledge by sending simulated phishing attacks to their email
  • Security Controls Recommendations
    ?
    We will help you understand what security controls you need to have in place to protect your business
    $
    $
  • Security Policy Creation
    ?
    We will help you create a security policy to help you understand what you need to do to protect your business
    $
    $
  • External Attack Surface Monitoring
    ?
    We will monitor your external attack surface to ensure that you are not exposing your business to unnecessary risk
    $
    $
  • Threat hunting
    ?
    We will actively search for threats in your environment to ensure that you are not being attacked
    $
    $
  • Backup recovery testing
    ?
    We will test you backup by deploing your backup to a separate location to ensure that your backups are working
    $
    $
  • Disaster recovery policies & planning
    ?
    We will help you generate a plan to help you remediate you issue if something were to go wrong
    $
    $
  • M365 Backup
    ?
    Backup users M365 email, OneDrive, SharePoint, and Teams
  • Redundancy/Failover planning for Firewall and Backup
    ?
    We can help you plan on making a highly available network so you can keep working when things go wrong
    $
  • Server Backup
    ?
    File, Application, and System Image level backups stored directly on the cloud - with onsite options as well
    $
  • Workstation Backup
    ?
    File, Application, and System Image level backups stored directly on the cloud - with onsite options as well
    $
  • It Inventory and Asset Management
    ?
    We will help manage your IT inventory and keep an updated list of items that you own and how they are doing
  • Hardware Replacement Planning
    ?
    We can help you plan for your IT budget and help you understand when you need to replace items
  • Monthly Business Review
    ?
    Monthly business reviews to help make sure that IT is helping you meet your business objectives
    $
    $
  • Automatic Monthly Reporting
    ?
    We will send you any metrics requested as an automated monthly report to help you understand how we're doing as your IT team
  • Quarterly Business Review
    ?
    Quarterly business reviews to help make sure that IT is helping you meet your business objectives
    $
  • Semi-annual Business Review
    ?
    Semi-Annual business reviews to help make sure that IT is helping you meet your business objectives
    $
  • M365 Consulting / Training
    ?
    We can help you understand what Microsoft 365 can offer for your business
    $
    $
    $
  • It Environment Analysis and Review
    ?
    We'll help you understand if your IT infrastructure is optimized, efficient, following best-practice, and secure
    $
  • Support from Technicians
    ?
    Technicians typically handle simple backend support requests and minor tasks on projects.
    $
  • Support from Analysts
    ?
    Analysts are the first line of defense for support requests and typically handle the majority of support requests, including many that would typically be escalated.
    $
  • Support from Administrators
    ?
    Administrators typically handle escalated support requests, managing monitoring and self-healing, and performing regular maintenance.
    $
  • Support from Engineers
    ?
    Engineers are a final escalation point typically for problems that require something new implemented as a solution, create monitoring and self-healing, and create automations.
    $
    $
  • Security Analysts performing regular maintenance
    ?
    Security Analysts are responsible for monitoring and maintaining security systems, including SIEM, EDR, and AV. They also take action on security alerts and incidents.
    $
    $
  • Security Administrators performing continuous improvement
    ?
    Security Administrators are responsible for managing security systems, including SIEM, EDR, and AV. They also take action on security alerts and incidents.
    $
    $
  • Architects, Project Managers, and Engineers working within scope
    ?
    These roles are typically used for projects and are not typically used for support.
    $
    $
  • Architects, Project Managers, and Engineers expanding or outside scope
    ?
    These roles are typically used for projects and are not typically used for support.
    $
    $
    $
  • Billing and Sales Team Q&A
    ?
    These roles are typically used for projects and are not typically used for support.
  • Project Managers or TAMs performing project maintenance
    ?
    These roles are typically used for projects and are not typically used for support.
    $
  • Incident response team performing remediation
    ?
    The Incident Response team is activated for serious security incidents and will work to resolve the issue as quickly as humanly possible. We also typically interface with your lawyers, insurance, and law enforcement.
    $
    $
    $
  • Web Designer creating and editing websites
    ?
    Web Designers create and edit websites. They are not typically used for support. Designers typically work on front-end aesthetics and user experience.
    $
    $
    $
  • Developers creating custom solutions
    ?
    Developers create custom solutions. They are not typically used for support. Developers typically work on back-end functionality and integrations.
    $
    $
    $
  • Domain Registration and DNS Hosting
    ?
    We will help you register your domain and host your DNS, ensuring that your domain is secure and available to the world.
    $
  • VOIP
    ?
    We manage Voice over IP Phone systems that can keep calls coming in wherever you need them.
    $
    $
    $
  • Web Hosting Hardened
    ?
    Hosting Pro + we perform more hardening on the web server, keep your plugins up to date, and provide a web application firewall.
    $
    $
  • Web Hosting Pro
    ?
    Website hosted on a dedicated secure server to protect your digital reputation. Includes DNS registration, hosting, and SSL certificate.
    $