Managed Device + Network Security
Device and Network Security Services for Businesses Throughout the Central Virginia area including Appomattox, Lynchburg, Farmville and the Surrounding Areas
Managed Device and Network Security is the core of all Ideal Technologies services, providing real-time protection against viruses, malware, ransomware, rootkits and adware, in addition to managed operating system updates and patch management with active network monitoring and firewall to protect your internal network – keeping your devices and data safe while giving you peace of mind.
Device Health Monitoring
Workstation and laptop health and services monitoring ensures your devices are operating at peak performance
Advanced Endpoint Security
Next-Gen antivirus backed up by automated endpoint detection and response with threat hunting protects your devices from security threats
Secure Data Cloud Backup
Secure cloud backup of your devices ensures that your business critical data is safe in the event of human error, breach, or natural disaster
Managed Updates + Patching
Protects your devices and network from known vulnerability exploitation from missing updates and security patches
Device + Network Monitoring
Vulnerability monitoring of your devices and network, identifying rouge devices, monitoring network activity, and blocking network threats
Network Next-Gen Firewall
Helping to secure your network and block attacks from reaching your devices, next-gen firewall offers intrusion prevention, VPN, and more
Service Pricing
SOHO
$ 65 .00
/ device / month+ Setup, Firewall and Equipment^
- PC Health & Services Monitoring
- Advanced Endpoint Security with Endpoint Detection & Response (EDR)
24/7/365 Managed Detection & Response (MDR)24/7/365 Security Operations Center Extended Detection & Response (XDR)Device Security Integrity & Vulnerability MonitoringZero Trust DNS + Secure Browser Protection- Microsoft & Third Party Software Patching & OS Updates
- Secure Cloud Workstation Backup (300GB/workstation) *
Virtual Chief Information Officer- Proactive Device Issue Remediation **
- VIP Rate 8×5 Out of Scope Remote Support
VIP Rate 8×5 Out of Scope Onsite SupportVIP Rate After Hours Remote Support
SMB
$ 95 .00
/ device / month+ Setup, Firewall and Equipment^
- PC Health & Services Monitoring
- Advanced Endpoint Security with Endpoint Detection & Response (EDR)
- 24/7/365 Managed Detection & Response (MDR)
24/7/365 Security Operations Center Extended Detection & Response (XDR)Device Security Integrity & Vulnerability Monitoring- Zero Trust DNS + Secure Browser Protection
- Microsoft & Third Party Software Patching & OS Updates
- Secure Cloud Workstation Backup (300GB/workstation) *
Virtual Chief Information Officer- Proactive Device Issue Remediation **
- VIP Rate 8×5 Out of Scope Remote Support
- VIP Rate 8×5 Out of Scope Onsite Support
VIP Rate After Hours Remote Support
PRO
$ 125 .00
/ device / month+ Setup, Firewall and Equipment^
- PC Health & Services Monitoring
- Advanced Endpoint Security with Endpoint Detection & Response (EDR)
- 24/7/365 Managed Detection & Response (MDR)
- 24/7/365 Security Operations Center Extended Detection & Response (XDR)
- Device Security Integrity & Vulnerability Monitoring
- Zero Trust DNS + Secure Browser Protection
- Microsoft & Third Party Software Patching & OS Updates
- Secure Cloud Workstation Backup (300GB/workstation) *
- Virtual Chief Information Officer
- Proactive Device Issue Remediation **
- VIP Rate 8×5 Out of Scope Remote Support
- VIP Rate 8×5 Out of Scope Onsite Support
- VIP Rate After Hours Remote Support
Firewall Monthly Service
The following firewall configurations are available and determined by the size of your network and speed of your internet. Average firewall service is the T45 option. The determination of which firewall is necessary is made by Ideal Technologies to ensure proper network operation and speed at your location. All firewalls include the following services: VPN, SD-WAN, Intrusion Prevention Service (IPS), Application Control, Web Blocker, Spam Blocker, Network Level Antivirus, Network Discovery, Advanced Persistent Threat Protection (APT), ThreatSync, DNSWatch.
Firewall Deployments
- T25 Small Office/Home Office Networks (1-5 users, 300Mbps throughput fully enabled) $75.00/month
- T45 Small Business Networks (1-20 users, 460Mbps throughput fully enabled) $125.00/month
- T85 (SMB to Medium Business Networks (1-50 users, 680Mbps throughput fully enabled) $240.00/month
- M290 (Medium to Large Business Networks (1-75 users, 8000Mbps throughput fully enabled) $275.00/month
- M390 (Large Business Networks (1-250 users, 1.8Gbps throughput fully enabled) $415.00/month
- M590 (Large Corporate Networks (1-500 users, 2.2Gbps throughput fully enabled) $825.00/month
Ready to Simplify IT Management?
We will work with you to select a plan that meets your business needs, while helping you get more from your technology, with less work, and less worry about making it all run right.
^ New service setup charge of $300 + $10 per device. Firewall services are based on the network size, priced per location, and includes the cost of hardware on a Hardware as a Service plan. If there are necessary equipment upgrades needed for network switches, wireless access points, etc., client will be billed for equipment before setup of service. Managed IT Services setup involves a technician coming onsite to evaluate your networks and systems, install necessary software, setup equipment and configure services for your devices and users. Your quote request will include include all one-time and monthly charges.
* 300GB storage per workstation, allocated to a pool of storage. For example, 10 managed systems would include 3,000GB of cloud storage (300 x 10 = 3,000), shared between the devices. Overages are charged in blocks of 1,000GB at $5/month per block.
** Proactive device issue remediation is limited to the services included in the service inclusion list. Items not listed on the service inclusion list are considered out of scope and it is the discretion of Ideal Technologies whether to charge for remote or onsite support.
*** $500/month minimum service investment, 1 Year Service Commitment. Additional locations add $50/month per additional location for Tier 1 SOHO services and $100/month additional location for Tier 2 SMB and Tier 3 PRO services. Month-to-month service commitments available for an additional 20% over listed service investment. Request a quote for complete pricing, including setup and installation, equipment charges if necessary, and firewall services.
Yes, there is a minimum $500 per month service spend requirement.
Yes, all managed services provided by Ideal Technologies require a minimum 1 year commitment. No commitment, month-to-month contracts are available for an additional 20% above published pricing, and require a minimum 30 day termination of service notice.
We install an agent on your workstations which monitors the health of your device hardware and alerts us in the event that there is an issue, for example that there is increased CPU usage, the system memory is being maxed out, there are issues with the storage disk, etc. We also monitor necessary system services to ensure that they are running and performing as required.
We deploy next-gen antivirus and malware protection security software which monitors your systems and protects against viruses, malware, ransomware, and other security issues that could compromise your business data and devices. Endpoint detection and response (EDR) is a security solution that pairs with our endpoint security software and monitors your business devices for cyber threats and responds to them based on standard security practices, and alerts us of the threat so we can engage if necessary. EDR uses automation and real-time analytics to protect your organization’s devices, data, and users.
Managed Detection and Response (MDR), takes EDR to the next level, and is a cybersecurity service that uses a combination of technology automation and human cybersecurity expertise to monitor, hunt, and respond to cyber threats. MDR adds 24/7/365 eyes on your business security, providing expert cybersecurity professionals providing environment monitoring, threat investigation, pro-active threat hunting, and immediate response to cyber threats.
Extended Detection and Response (XDR), is a cybersecurity approach that collects data from multiple security tools, analyzes it, and responds to maliciousness. XDR integrates data from multiple sources, including your business endpoints, network firewalls, business email, onsite and cloud servers, cloud services, and other network devices. It then correlates the data across multiple security layers to provide a unified view of the security landscape. This is all monitored by a dedicated team of cybersecurity experts who can investigate, respond to, and remediate cyber threats.
Device security integrity and vulnerability monitoring provides continuous assessment of your business workstations for new cyber vulnerabilities, and ensures that your system security settings are configured to the most efficient system hardening standards, increasing the security of your business devices and the safety of your business data.
Zero trust DNS and secure browser protection provides a secure DNS filter to secure your organization from malicious websites and web downloads, while allowing web filtering to protect your business from compromising websites and services. The zero trust secure web browser protects users from advanced cybersecurity attacks by isolating web based threats from reaching your business workstations and devices.
In an effort to maintain optimum performance and to ensure the security of your devices, we routinely monitor for updates to Microsoft and third party software, such as Adobe products, Google Chrome, Java, Microsoft Office applications, TeamViewer, Zoom and other common business software applications. Maintaining updated software secures your business against vulnerabilities exploited by cyber attackers.
Every workstation in your organization will be backed up to the cloud on a daily basis, ensuring continuous continuity of your business data, and facilitating complete system restoration in the event of device failure or loss. You data is encrypted in transit using 256-bit AES encryption and is stored in data centers compliant with the Service Organization Control (SOC 1 / SSAE 16 and SOC 2) reporting standards. Secure clou dbackup allows for the recovery of individual files and folders or a full bare-metal restore of the old machine to the same or dissimilar hardware. W eprovide 300GB of cloud storage per workstation, pooled and shared between all workstations, so if you have 10 workstations, you get 3000GB total storage. Extra storage is provided in blocks of 1000GB for an additional $5/month per block.
For plans that include network level firewall protection, we install a network hardware firewall between your internet modem and your network which filters and inspects all traffic routed through your network and the internet. This provides for network level virus blocking, ad blocking, application control, network intrusion prevention, and threat prevention. Firewalls work beyond the security provided on workstations to provide network level security for all connected devices, including printers and IoT devices.
We deploy a network monitoring device on your physical network which continuously scans your network for device vulnerabilities, such as open ports, exposed services, unknown devices, and device changes, alerting us in the event of a detection or change that needs attention or remediation. Network monitoring also helps satisfy CIS Critical Security Controls requirements by meeting certain safeguards associated with various CIS controls.
In the event that our health and services monitoring agent or endpoint security agent identifies an issue, we will remotely resolve this issue in an attempt to prevent it from having an affect on your business. We call this proactive remediation, in other words, stopping an issue from becoming a problem. Additionally, we routinely perform system cleanup and optimization tasks to ensure your systems are running a peak efficiency. Subject to our services inclusion list, services such as temp file cleanup, driver updates, troubleshooting of security and backup software, restarting print spoolers, and resetting passwords (just to name a few) are always included. Upgrade to unlimited remote support for only $50 additional per device per month and receive unlimited remote support for all you workstations, and VIP rates for necessary onsite support.
Virtual Chief Information Officer (vCIO) services provides cybersecurity policy development, compliance assistance, risk management reviews, and consultation services for your organization. We will create IT policies for your organization, including such polices as acceptable use policies, password and MFA policies, bring your own devices policies, data protection and security policies, and email use policies (just to name a few). We will review your organization for risk and provide a risk management assessment. We will work with you to implement controls and practices that meet your organizations compliance and regulatory requirements, such as HIPPA, PCI DSS, FTC Safeguards Rule, and so forth.
Getting started with managed services with Ideal Technologies is as simple as filling out a form to schedule a discovery and onboarding visit. Contact us to tell us about your business and desired services and we will call you to schedule a time to talk.