IT360 Complete Managed IT
Complete IT Management and Cybersecurity Services for Businesses Throughout the Central Virginia area including Appomattox, Lynchburg, Farmville and the Surrounding Areas
Is your technology aging and slow making it unreliable? Are you having trouble finding IT support that doesn’t cost a fortune? Are you worried about losing your data to hackers, viruses or ransomware?
If the answer to these questions is yes then Ideal Technologies can provide the IT management and cybersecurity services to stabilize your technology and secure your business. The world runs on technology, which means your business depends on it to stay competitive and to remain profitable. With Ideal Technologies Managed IT360 Complete Services we remove IT headaches from the equation, helping you stay focused on your business, while leaving the headaches to us.
Managed Devices + Network
Managed devices and networks included for your business and users keeping your devices and network safe from cyber threats
Microsoft 365 Email + Office
Get professional email through Microsoft with full Microsoft Office business suite of applications, including SharePoint and OneDrive
Password Management
Secure password management for every user, including dark web account monitoring, available from any device
Security Awareness Training
Empower your employees with security awareness training so they are more adept in spotting and preventing potential security threats
Email Security + Filtering
Advanced email protection, providing antivirus and phishing protection as well as advanced spam filtering to keep your inboxes safe
Secure Cloud Backup
Backup of your business data, including your devices and Microsoft 365 accounts, protecting inboxes, OneDrive and SharePoint data
Service Pricing
SOHO
$ 150 .00
/ user / month+ Setup, Firewall and Equipment^
- Core IT Services
- PC Health & Services Monitoring
- Operating System & 3rd Party Software Patching & OS Updates
- Proactive Device Issue Remediation
- Device + Network Cybersecurity Services
- Advanced Endpoint Security with Endpoint Detection & Response (EDR)
24/7/365 Managed Detection & Response (MDR)24/7/365 Security Operations Center Extended Detection & Response (XDR)Device Security Integrity & Vulnerability MonitoringZero Trust DNS + Secure Browser Protection- User Security, Education & Threat Intelligence Training
- Keeper Security Password Management
- Breach Watch Dark Web Monitoring
Bigger Brains Online Education & Training- Quarterly Simulated Phishing Attacks
- Monthly Security Awareness Training
- Communications, Email & Productivity
- Microsoft 365 Business Standard
- Microsoft Office Web Apps (Word, Excel, PowerPoint)
- Microsoft Office Suite + Teams + SharePoint
- Email Anti-Virus + Spam Filtering + Phishing Protection + Data Loss Prevention
Microsoft 365 Incident Response Service- Microsoft 365 + SharePoint Backup
- Data Backup & Continuity
- Secure Cloud Workstation Backup *
- Secure Cloud Microsoft 365 Backup
- Support and Maintenance
Virtual Chief Information Officer- Proactive Device Issue Remediation Included**
- VIP Rate 8×5 Out of Scope Remote Support
VIP Rate 8×5 Out of Scope Onsite SupportVIP Rate After Hours Remote Support
SMB
$ 200 .00
/ user / month+ Setup, Firewall and Equipment^
- Core IT Services
- PC Health & Services Monitoring
- Operating System & 3rd Party Software Patching & OS Updates
- Proactive Device Issue Remediation
- Device + Network Cybersecurity Services
- Advanced Endpoint Security with Endpoint Detection & Response (EDR)
- 24/7/365 Managed Detection & Response (MDR)
24/7/365 Security Operations Center Extended Detection & Response (XDR)Device Security Integrity & Vulnerability Monitoring- Zero Trust DNS + Secure Browser Protection
- User Security, Education & Threat Intelligence Training
- Keeper Security Password Management
- Breach Watch Dark Web Monitoring
Bigger Brains Online Education & Training- Bi-Monthly Simulated Phishing Attacks
- Monthly Security Awareness Training
- Communications, Email & Productivity
- Microsoft 365 Business Premium
- Microsoft Office Web Apps (Word, Excel, PowerPoint)
- Microsoft Office Suite + Teams + SharePoint
- Email Anti-Virus + Spam Filtering + Phishing Protection + Data Loss Prevention
- Microsoft 365 Incident Response Service
- Microsoft 365 + SharePoint Backup
- Data Backup & Continuity
- Secure Cloud Workstation Backup *
- Secure Cloud Microsoft 365 Backup
- Support and Maintenance
Virtual Chief Information Officer- Proactive Device Issue Remediation Included**
- VIP Rate 8×5 Out of Scope Remote Support
- VIP Rate 8×5 Out of Scope Onsite Support
VIP Rate After Hours Remote Support
PRO
$ 250 .00
/ user / month+ Setup, Firewall and Equipment^
- Core IT Services
- PC Health & Services Monitoring
- Operating System & 3rd Party Software Patching & OS Updates
- Proactive Device Issue Remediation
- Device + Network Cybersecurity Services
- Advanced Endpoint Security with Endpoint Detection & Response (EDR)
- 24/7/365 Managed Detection & Response (MDR)
- 24/7/365 Security Operations Center Extended Detection & Response (XDR)
- Device Security Integrity & Vulnerability Monitoring
- Zero Trust DNS + Secure Browser Protection
- User Security, Education & Threat Intelligence Training
- Keeper Security Password Management
- Breach Watch Dark Web Monitoring
- Bigger Brains Online Education & Training
- Monthly Simulated Phishing Attacks
- Monthly Security Awareness Training
- Communications, Email & Productivity
- Microsoft 365 Business Premium
- Microsoft Office Web Apps (Word, Excel, PowerPoint)
- Microsoft Office Suite + Teams + SharePoint
- Email Anti-Virus + Spam Filtering + Phishing Protection + Data Loss Prevention
- Microsoft 365 Incident Response Service
- Microsoft 365 + SharePoint Backup
- Data Backup & Continuity
- Secure Cloud Workstation Backup *
- Secure Cloud Microsoft 365 Backup
- Support and Maintenance
- Virtual Chief Information Officer
- Proactive Device Issue Remediation Included**
- VIP Rate 8×5 Out of Scope Remote Support
- VIP Rate 8×5 Out of Scope Onsite Support
- VIP Rate After Hours Remote Support
Firewall Monthly Service
The following firewall configurations are available and determined by the size of your network and speed of your internet. Average firewall service is the T45 option. The determination of which firewall is necessary is made by Ideal Technologies to ensure proper network operation and speed at your location. All firewalls include the following services: VPN, SD-WAN, Intrusion Prevention Service (IPS), Application Control, Web Blocker, Spam Blocker, Network Level Antivirus, Network Discovery, Advanced Persistent Threat Protection (APT), ThreatSync, DNSWatch.
Firewall Deployments
- T25 Small Office/Home Office Networks (1-5 users, 300Mbps throughput fully enabled) $75.00/month
- T45 Small Business Networks (1-20 users, 460Mbps throughput fully enabled) $125.00/month
- T85 (SMB to Medium Business Networks (1-50 users, 680Mbps throughput fully enabled) $240.00/month
-
M290 (Medium to Large Business Networks (1-75 users, 8000Mbps throughput fully enabled)
$275.00/month - M390 (Large Business Networks (1-250 users, 1.8Gbps throughput fully enabled) $415.00/month
- M590 (Large Corporate Networks (1-500 users, 2.2Gbps throughput fully enabled) $825.00/month
Ready to Simplify IT Management?
We will work with you to select a plan that meets your business needs, while helping you get more from your technology, with less work, and less worry about making it all run right.
^ New service setup charge of $300 + $10 per device. Firewall services are based on the network size, priced per location, and includes the cost of hardware on a Hardware as a Service plan. If there are necessary equipment upgrades needed for network switches, wireless access points, etc., client will be billed for equipment before setup of service. Managed IT Services setup involves a technician coming onsite to evaluate your networks and systems, install necessary software, setup equipment and configure services for your devices and users. Your quote request will include include all one-time and monthly charges.
* 300GB storage per workstation, allocated to a pool of storage. For example, 10 managed systems would include 3,000GB of cloud storage (300 x 10 = 3,000), shared between the devices. Overages are charged in blocks of 1,000GB at $5/month per block.
** Proactive device issue remediation is limited to the services included in the service inclusion list. Items not listed on the service inclusion list are considered out of scope and it is the discretion of Ideal Technologies whether to charge for remote or onsite support.
*** $500/month minimum service investment, 1 Year Service Commitment. Additional locations add $50/month per additional location for SOHO and $100/month additional location for SMB and PRO services. Month-to-month service commitments available for an additional 20% over listed service investment. Request a quote for complete pricing, including setup and installation, equipment charges if necessary, and firewall services.
Yes, there is a minimum $500 per month service spend requirement.
Yes, all managed services provided by Ideal Technologies require a minimum 1 year commitment. No commitment, month-to-month contracts are available for an additional 20% above published pricing, and require a minimum 30 day termination of service notice.
We install an agent on your workstations which monitors the health of your device hardware and alerts us in the event that there is an issue, for example that there is increased CPU usage, the system memory is being maxed out, there are issues with the storage disk, etc. We also monitor necessary system services to ensure that they are running and performing as required.
We deploy next-gen antivirus and malware protection security software which monitors your systems and protects against viruses, malware, ransomware, and other security issues that could compromise your business data and devices. Endpoint detection and response (EDR) is a security solution that pairs with our endpoint security software and monitors your business devices for cyber threats and responds to them based on standard security practices, and alerts us of the threat so we can engage if necessary. EDR uses automation and real-time analytics to protect your organization’s devices, data, and users.
Managed Detection and Response (MDR), takes EDR to the next level, and is a cybersecurity service that uses a combination of technology automation and human cybersecurity expertise to monitor, hunt, and respond to cyber threats. MDR adds 24/7/365 eyes on your business security, providing expert cybersecurity professionals providing environment monitoring, threat investigation, pro-active threat hunting, and immediate response to cyber threats.
Extended Detection and Response (XDR), is a cybersecurity approach that collects data from multiple security tools, analyzes it, and responds to maliciousness. XDR integrates data from multiple sources, including your business endpoints, network firewalls, business email, onsite and cloud servers, cloud services, and other network devices. It then correlates the data across multiple security layers to provide a unified view of the security landscape. This is all monitored by a dedicated team of cybersecurity experts who can investigate, respond to, and remediate cyber threats.
Device security integrity and vulnerability monitoring provides continuous assessment of your business workstations for new cyber vulnerabilities, and ensures that your system security settings are configured to the most efficient system hardening standards, increasing the security of your business devices and the safety of your business data.
Zero trust DNS and secure browser protection provides a secure DNS filter to secure your organization from malicious websites and web downloads, while allowing web filtering to protect your business from compromising websites and services. The zero trust secure web browser protects users from advanced cybersecurity attacks by isolating web based threats from reaching your business workstations and devices.
In an effort to maintain optimum performance and to ensure the security of your devices, we routinely monitor for updates to Microsoft and third party software, such as Adobe products, Google Chrome, Java, Microsoft Office applications, TeamViewer, Zoom and other common business software applications. Maintaining updated software secures your business against vulnerabilities exploited by cyber attackers.
Every workstation in your organization will be backed up to the cloud on a daily basis, ensuring continuous continuity of your business data, and facilitating complete system restoration in the event of device failure or loss. You data is encrypted in transit using 256-bit AES encryption and is stored in data centers compliant with the Service Organization Control (SOC 1 / SSAE 16 and SOC 2) reporting standards. Secure clou dbackup allows for the recovery of individual files and folders or a full bare-metal restore of the old machine to the same or dissimilar hardware. W eprovide 300GB of cloud storage per workstation, pooled and shared between all workstations, so if you have 10 workstations, you get 3000GB total storage. Extra storage is provided in blocks of 1000GB for an additional $5/month per block.
For plans that include network level firewall protection, we install a network hardware firewall between your internet modem and your network which filters and inspects all traffic routed through your network and the internet. This provides for network level virus blocking, ad blocking, application control, network intrusion prevention, and threat prevention. Firewalls work beyond the security provided on workstations to provide network level security for all connected devices, including printers and IoT devices.
We deploy a network monitoring device on your physical network which continuously scans your network for device vulnerabilities, such as open ports, exposed services, unknown devices, and device changes, alerting us in the event of a detection or change that needs attention or remediation. Network monitoring also helps satisfy CIS Critical Security Controls requirements by meeting certain safeguards associated with various CIS controls.
In the event that our health and services monitoring agent or endpoint security agent identifies an issue, we will remotely resolve this issue in an attempt to prevent it from having an affect on your business. We call this proactive remediation, in other words, stopping an issue from becoming a problem. Additionally, we routinely perform system cleanup and optimization tasks to ensure your systems are running a peak efficiency. Subject to our services inclusion list, services such as temp file cleanup, driver updates, troubleshooting of security and backup software, restarting print spoolers, and resetting passwords (just to name a few) are always included. Upgrade to unlimited remote support for only $50 additional per device per month and receive unlimited remote support for all you workstations, and VIP rates for necessary onsite support.
Virtual Chief Information Officer (vCIO) services provides cybersecurity policy development, compliance assistance, risk management reviews, and consultation services for your organization. We will create IT policies for your organization, including such polices as acceptable use policies, password and MFA policies, bring your own devices policies, data protection and security policies, and email use policies (just to name a few). We will review your organization for risk and provide a risk management assessment. We will work with you to implement controls and practices that meet your organizations compliance and regulatory requirements, such as HIPPA, PCI DSS, FTC Safeguards Rule, and so forth.
Getting started with managed services with Ideal Technologies is as simple as filling out a form to schedule a discovery and onboarding visit. Contact us to tell us about your business and desired services and we will call you to schedule a time to talk.