Plan Builder - All Business Technologies

Plan Builder

ALL YOUR TECHNOLOGY NEEDS UNDER ONE ROOF

IT - SEO - WEB DESIGN - DIGITAL MARKETING - VOIP

SERVICE GOOD BETTER BEST
SUPPORT
Guaranteed Response Times
ABT Client Portal
Microsoft & Application Updates
Preventative Maintenance
24x7x365 Monitoring
Unlimited Remote Support
Unlimited Onsite Support Billable
Unlimited After Hours Support Billable Billable
Cloud Business Phone System Support Billable
SECURITY
Managed Endpoint Security
Managed Premium Firewall
Password Management System
Zero-Trust Application Control Optional + Billable
Storage Control and Auditing Optional + Billable
Elevation Control Optional + Billable
DNS Filtering N/A
Multi Factor Authentication N/A
Email Threat Protection N/A
Email Encryption N/A
Dark Web Monitoring N/A
Simulated Phishing Attack $1,495 Bi-Annual Quarterly
Vulnerability Scanning $2,995 Bi-Annual Bi-Annual
MANAGEMENT
IT Documentation
Monthly Executive Report
Vendor Management Optional + Billable
Asset & Inventory Management $1,495 Annual Bi-Annual
IT Budget Preparation $2,495 Annual Bi-Annual
Technology Business Review Meeting Bi-Annual Quarterly Monthly
TRAINING
Security Awareness Training
End User Training Program Optional + Billable
Technology Adoption Session Bi-Annual Quarterly Monthly
SERVICES
Office 365 Licensing
Office 365 Backup & Archiving
Monthly Human Backup Testing
BDR as a Service From $199/month
Simulated Mock BDR Test Optional + Billable Quarterly Monthly
ABT Cloud Backup + Recovery 50 Cents/GB 50 Cents/GB 50 Cents/GB

FREQUENTLY ASKED QUESTIONS

WHAT ARE GUARANTEED RESPONSE TIMES?

All issues from clients on our Premium Care plans are managed through our Helpdesk as follows.

If you choose to be on a Break/Fix Plan, we will help you as fast as we can, however it will be on a “best effort” basis as we need to give priority to clients on our Premium Care plans due to contractual obligations.

PRIORITY EXAMPLES GUARANTEED RESPONSE TARGETED RESPONSE
Critical Entire Company Offline (Call Us!)
Main Application Offline (Call Us!)
2 Hours 15 Minutes
High Department Offline (Call us!)
CEO's Computer Offline (Call Us!)
4 Hours 1 Hour
Medium User PC Offline
One Printer Not Working
8 Hours 4 Hours
Low Printing is slower than normal
A single user is unable to scan documents
16 Hours 8 Hours

CAN I GET FAST SUPPORT AS A BREAK/FIX CLIENT?

Absolutely, we have an option to upgrade any of your tickets to a “Critical” issue with an “Emergency Ticket Upgrade”.

This means we’ll treat your issue with our absolute highest priority.

Make sure you call us to open the service request and ask us to give this ticket an “Emergency Ticket Upgrade”. The upgrade charges will be added to the ticket.

WHAT IS THE CLIENT PORTAL?

The majority of our clients just email tickets to the portal, for those who want a deeper overview we have a web-based portal where you can add new tickets, view a listing of all of your open/closed tickets, add more information to tickets, access your invoices and more.

WHAT IS MICROSOFT PATCH MANAGEMENT?

Every month, Microsoft release a series of updates, patches, security fixes to their software, including Windows and Microsoft Office.

It is extremely important that these updates are installed on your computers and servers to make sure you are not only getting the latest versions of software, but that you are properly secured against any potential security vulnerabilities.

For clients on our Premium Care plans, we manage this for you by pushing out approved Microsoft patches using our Remote Agent to ensure that all of your machines are kept up to date and secure.

WHAT 3RD PARTY APPLICATIONS DO YOU UPDATE?

For clients on our Premium Care plans, we will automatically update Adobe Reader, Adobe Flash, Adobe Shockwave, Oracle JAVA, Apple QuickTime and PDF Creator, all line of business applications, and much more.

WHAT IS PREVENTATIVE MAINTENANCE?

For clients on our Premium Care plans, we perform regular maintenance (e.g. clearing excessive log files, disk cleanup, disk maintenance) on your Servers and Workstations in line with our best practices to make sure they are kept in top condition.

WHAT IS 24X7X365 INFRASTRUCTURE MONITORING?

For clients on Premium Care plans, our remote access agent will be configured to monitor and alert our support team for things that could potentially cause issues on your network (e.g. server or internet down, hard drive errors, disk space usage, Anti-Virus problems et al).

WHAT IS MANAGED ENDPOINT SECURITY?

With cyber threats on the rise, gone are the days where you can just have a traditional security software that just blocks threats. On our Premium Care Plans we now utilize Multi-layered AI-powered endpoint protection and response which performs advanced threat hunting and device controls.

WHAT IS PASSWORD MANAGEMENT?

Cybersecurity starts with password security as 81% of data breaches are due to weak password security. Our password management app comes with 2FA authentication and can also create, manage, and share complex passwords both in your browser and on your mobile phone. This system also does a password security audit scoring and reporting, all while monitoring the dark web for data breaches where your password may have been used. Industry compliant with HIPAA, DPA, FINRA, GDPR and more.

WHAT IS MANAGED PREMIUM FIREWALL?

Managed Premium Firewall requires a subscription to the hardware vendor to enable a different set of security options than the typical standard firewall/router brings. Configured and monitored properly these services can help stop in-flight threats, eliminate attacks from common entry points, proactively prevent and detect breaches, and secure their expanded attack surfaces.

WHAT IS ZERO-TRUST APPLICATION CONTROL?

Total endpoint control over what software can run, and what resources it can access. Application Whitelisting has long been considered the gold standard in protecting businesses from viruses, ransomware, and other malicious software. Unlike antivirus, Application Whitelisting puts you in control over what software, scripts, executables, and libraries can run on your endpoints and servers. This “default deny” approach not only stops malicious software, but it also stops any other unpermitted applications from running.

WHAT IS STORAGECONTROL AND AUDITING?

Our Storage Control solution is an advanced storage control solution that protects information. We have the tools to control the flow and access of data. You can choose what data can be accessed, or copied, and the applications, users, and computers that can access said data. By using storage control, you are in control of your file servers, USB drives, and your data.

WHAT IS ELEVATION CONTROL?

Elevation Control, in conjunction with Ringfencing, enables application access controls that reinforce remote user access controls for remote execution of privileged commands so that privileged users can only use the defined applications for their intended purpose and not connect to additional applications while engaging in privileged activities related to security-relevant information.

WHAT IS DNS FILTERING?

DNS Filtering if a form of security threat protection as well as content filtering which controls the inbound traffic let into your corporate network and protects your users from phishing, malware, ransomware, and more using a cloud-based DNS service. You can also stop your users from viewing inappropriate or undesirable content, such as adult websites, personal email, social media, and streaming media.

WHAT IS MULTIFACTOR AUTHENTICATION?

Multi-factor authentication protects your applications by using a second source of validation, like a phone or token, to verify user identity before granting access. MFA is engineered to provide a simple, streamlined login experience for every user and application, and as a cloud-based solution, it integrates easily with your existing technology. Similar to as mentioned above 80% of security breaches involve compromised passwords.

WHAT IS EMAIL THREAT PROTECTION?

Email is the number one threat vector. Social actions such as phishing and email scams arrived via email 96% of the time, and these security threats are always evolving. Email Threat Protection delivers the most effective unified solution to protect your people and critical data from advanced email threats. Our complete, extensible email security platform blocks malware and non-malware email threats, such as email fraud, also known as business email compromise (BEC). It provides visibility into your greatest risk—your people. With actionable insights, you can better understand the risk you face and respond to threats faster.

WHY DARK WEB MONITORING?

Without continuous monitoring, new compromised employee data available on the dark web will go unnoticed, putting your clients and yourself in danger of dealing with a data breach.

WHAT IS A SIMULATED PHISHING ATTACK?

Routine simulated phishing has been proven to minimize the risk of end-users falling victim to a malicious phishing attempt. Routine phishing instills into our users the very behaviors of IT professionals before they click on any link so that even on the most chaotic of days, they’re ready.

WHAT IS VULNERABILITY SCANNING?

Continuously detect, manage & protect your IT assets for CVEs, zero-day vulnerabilities, and common misconfigurations based on CIS 20 Benchmarks. Our platform that empowers you to gain control of risks by identifying and prioritizing vulnerabilities across the entire attack surface including traditional, cloud, mobile and DevOps environments. Over 300 new vulnerabilities were detected on average every day in 2020 versus 28 vulnerabilities discovered per day in 2016. Our platform simplifies the complexity of vulnerability management. Now existing support teams can effectively manage vulnerabilities reducing risk.

WHY DO I NEED IT DOCUMENTATION?

At its core, IT documentation is simply an organized survey of all the information your business and IT team needs to operate effectively. Documentation involves creating written records of all key business information, which can be referred to for onboarding or simply to help employees or IT technicians run more efficiently.

WHAT IS THE MONTHLY EXECUTIVE REPORT?

A monthly report sent to the Primary IT Contact of clients on our Premium Care plans outlining some key IT business metrics from the last month such as: Most Active Users, Tickets Opened by Type, Tickets Opened by Sub-Type and more.

WHAT IS VENDOR MANAGEMENT?

Get better, faster support for your third-party hardware and software investments and one point of contact for all of your vendor relationships. Our Vendor Management can also include budget creation, management, and review. Procurement assistance as well as warranty and vendor agreement tracking and management.

WHY DO I NEED ASSET AND INVENTORY MANAGEMENT?

You’ve spent thousands of dollars on technology for your organization, but are you getting the most out of your IT investments? Collecting inventory data and tracking contract statuses throughout the lifecycle of an asset is critical. Capturing your asset data in one location enables better IT asset management and tracking of hardware, software, licenses, ticket history, and even non-IT assets.

WHY EMPLOYEES NEED SECURITY AWARENESS TRAINING?

The vast majority of today’s threats require humans to activate them. Ensure your users know what to do when faced with a real threat by providing them with targeted education. Our unique people-centric approach can reduce successful phishing attacks and malware infections by up to 90%.

WHAT IS MICROSOFT 365 LICENSING AND MANAGEMENT?

On our Premium Care Plans, we bundle all your Microsoft 365 licensing and management into one monthly bill along with all the other necessary line of business security defense tools. No more random, multiple, confusing monthly bills from Microsoft.

WHY DO I NEED MICROSOFT 365 BACKUP?

Microsoft 365 backup (Exchange Email, One Drive, Teams, SharePoint), and recovery is a critical element in any business data protection plan. That’s because it’s very easy to have Microsoft 365 data accidentally deleted, held hostage by ransomware, or corrupted by disgruntled employees. That leaves a data protection gap not covered by Microsoft 365.

Additionally, Office 365 only saves deleted emails in the recycle bin for up to 30 days — and many system administrators use the recycle bin as a temporary data backup repository.

Using the recycle bin as a temporary backup repository is an extremely risky way to safeguard mission critical company data. That’s because a recycle bin doesn’t have the same security features as a SaaS backup solution, exposing your Office 365 data to ongoing threats.

Three myths about M365 backup

  1. Microsoft 365 is backed up already – it’s in the cloud! (no, not entirely)
  2. Firms don’t ask for it – because they don’t know the pitfalls (education is key)
  3. I can quickly restore with Microsoft (no you can’t)

Our business continuity solution closes the data protection gap. Securely backup, manage, recover, and protect critically Microsoft 365 email, contacts, calendar, tasks, and much more.

WHY DO I NEED MICROSOFT 365 EMAIL ARCHIVING?

Our cloud-based email archiving solution helps organizations maintain industry email retention compliance by efficiently storing, safeguarding, managing, and discovering data from most email systems such as Microsoft Exchange Online, Hosted Exchange, G Suite Gmail.

You are covered in the event of a legal motion to hold a set of email records, or when a third-party regulator requests to access emails in the case of a compliance audit. Emails, attachments, calendar, tasks and related files are archived using envelope journaling, ensuring all assets are stored without fail. Company emails are archived securely and are readily available should the need arise.

All emails are:

  • Professionally archived
  • Searchable
  • Discoverable
  • Accessible

WHY DO A MONTHLY HUMAN BACKUP TESTING?

For clients on our Premium Care Agreements, each month we perform a restore of some data from your backups to confirm the backups are running successfully.

We will send you an email to confirm everything is running nicely (or if we have found any problems and fixed them).

We also monitor your backups daily with our automated systems, however we always like to have a regular “human touch” as an extra check.

WHAT IS BDR AS A SERVICE?

Many of our clients chose to just lease or purchase backup software through us and often forget that it is not a managed service and monitoring backup testing is reliant on them. What often can happen is backups alerts stop flowing or they forget to check the status. With our BDR as a service we monitor and take care of all of that for you. We also can regularly test for restoration as well as simulating a full disaster recovery event for restoration. We will also help you implement a full proof business continuity plan which no client of ours has lost all their data in 23 years in the industry when following.

WHY DO I NEED SIMULATED MOCK BDR TESTING?

With current cyber threats it is not uncommon your system can be breached months prior to the cyber-attack being triggered. The hacker will often get on your system and disable backups in a way where you will still receive success alerts despite the data being non restorable. In addition to this these are other reasons data may not restore. Over 80% of US businesses do not have a reliable backup solution and 7 out of 10 small businesses that experience major data loss go out of business within one year. You have invaluable, and irreplaceable information on your system. What we can provide for you is not just backup, its business continuity and disaster recovery.

HOW DO WE RECEIVE OUR INVOICES?

If you choose a Premium Care plan, you will receive your monthly Invoice on the first of the month. As Premium Care Agreements are a pre-paid agreement, you will be auto billed and have a receipt sent.

Scroll to Top
Skip to content