Remote Support Comprehensive and swift IT assistance without the need for onsite visits, saving time and reducing interruptions. Core Plan has 2 hours of included Remote Support, Growth & Enhanced have unlimited Remote Support. | 2 Hours Included | | | |
Onsite Support Comprehensive onsite IT assistance without limitations, providing ultimate peace of mind for your IT needs, regardless of where the issue arises. | Optional | Optional | Optional | |
Support Hours Receive reliable assistance from qualified technicians during business hours on hour Core & Essentials Plans or round-the-clock IT support on our Enhanced Plan | Weekdays 8:30am - 5pm | Weekdays 8:30am - 5pm | Weekdays 8:30am - 5pm | Weekdays 7:00am - 6pm |
Response Times We strive to address any concerns or issues as quickly as possible, ensuring smooth operations for your business | Best Effort Response Times | Guaranteed Response Times | Guaranteed Response Times | Priority Response Times |
Staff Onboarding + Offboarding Seamless transition for new and departing staff, ensuring a consistent IT environment and minimising disruption. | | | | |
Microsoft 365 Management Complete management of clients Microsoft 365 tenant. | | | | |
Microsoft 365 Administration Expert management of your Microsoft 365 suite, ensuring optimal setup, security, and performance | | | | |
Cyber Security Awareness Training Empower your staff with the knowledge to stay safe online, reducing the risk of security breaches | | | | |
N-Central Remote Management Best in class remote management and monitoring | | | | |
Critical Software & Security Updates Stay updated with the latest patches, ensuring the safety and smooth running of your IT systems | | | | |
Server Performance Monitoring Constant surveillance of server health and performance to ensure peak server performance, preventing unexpected downtimes and promoting business continuity | | | | |
24/7 System Monitoring + Alerts Continuous oversight of your IT systems, ensuring swift detection and response to potential issues | | | | |
Daily Backup Monitoring Continuous surveillance of daily backup processes to ensure your data is consistently and safely backed up, offering peace of mind and reducing data loss risks | | | | |
Standard Operating Environment A unified computing environment across your organisation that enables consistency across your IT environment, simplifying management, and boosting overall efficiency | | | | |
Asset Management Comprehensive Asset Management and reporting including lifecycle management | | | | |
SentinelOne Antivirus with EDR Safeguard your devices against threats, ensuring the security and integrity of your business data | | | | |
DNS Filter Internet Protection Safeguard your network from harmful or inappropriate websites, ensuring a secure and productive online environment for your staff | | | | |
Quarterly Business Reviews Our Virtual Chief Information Officer (vCIO) service offers expert strategic IT leadership and guidance tailored to your business needs, ensuring your technology investments align with your goals and drive growth—all without the cost of a full-time executive. | | | | |
Zero Trust Network Access Twingate ZTNA. Replacing legacy VPN solutions with next generation secure remote access. | | | | |
Office 365 Backup Bi-daily backup of Office 365 mailboxes and Sharepoint | | | | |
MDR Service Managed Detection and Response (MDR) service provides continuous monitoring, threat detection, and rapid incident response to protect your business from cyber threats, ensuring robust security without the need for an in-house team. | | | | |
Essential 8 Assess & Report A thorough assessment based on the Australian Government’s Essential Eight cybersecurity strategies, ensuring your business aligns with best practices for IT security | | | Optional | |
Monthly Vulnerability Scanning Regular penetration testing to identify and address potential security vulnerabilities, ensuring the ongoing protection of your business data and systems | | | Optional | |
Threatlocker Application Control Fine-grained control over which applications can run, enhancing security by preventing unauthorised or potentially harmful software | | | | |
| Get started | Get started | Get started | Get started |