Daily monitoring and management of server and repair when needed. This is custom service and support for servers that ONLY function as Active Directory Domain Controller (a server dedicated to security authentication requests within a Windows Server Domain). Network People engineers perform daily health checks before business hours. This includes runtime and stability, backed, and critical errors. Then engineers verify additional health and security checks through monitoring and management of antivirus, anti-malware, system checks, alerts, hard drive maintenance, specific scripted repairs of known issues, ticket creation and closure. If an issue is detected, a ticket is created notifying client and an engineer dispatched to perform the necessary service according to the SLA to restore normal functionality. If ticket requires repair to be done onsite, the engineer will go onsite. (Monitoring + Management + Helpdesk + Proactive Maintenance) |
Proactive, persistent threat protection for your network that identifies your vulnerabilities and allows earlier detection of ransomware activity. This advanced security detection delivers: Vulnerability scanning, alert review and recommendations, remediation direction, detection and review of indications of compromise through ongoing scanning and monitoring for vulnerabilities. Network People engineers use state-of-the-art security tools that detect indications of compromise (IOC) on computers or servers in the network. When new or greater risks are identified, Network People alerts you. This security monitoring: • Highlights external and internal vulnerabilities to tighten your defenses • Enables earlier detection of potential ransomware incidents • Exposes attackers who abuse legitimate Windows applications and processes to bypass other security systems and establish persistence • Reviews incident reports that combine automated intelligence with human expertise to understand the scope and severity of potential threats • Prevents hackers from dwelling in your protected environments with step-by-step guidelines to harden your security and reduce future risk (Security + Monitoring + Compliance + Management + Proactive Maintenance + Accountability) |
Server Standard Annual License for Azure Server (Software License) |
Custom service and support for Azure AD services which gives users seamless access to all applications to maintain productivity. Network People engineers perform additions and subtractions of Microsoft Licenses of all kinds on the Azure server and manage the users access, data, security, and overall licensing. Engineers also enable the connection of workstations and laptops to the Domain Controller of the Azure AD. If an issue is detected, a ticket is created notifying client and an engineer dispatched to perform the necessary service according to the SLA to restore normal functionality. If ticket requires repair to be done onsite, the engineer will go onsite. (Monitoring + Management + Helpdesk + Proactive Maintenance + Security + Compliance |
Daily monitoring and management of cloud server and repair when needed to keep your network and team up and running. A private off premise cloud server hosted at a Microsoft data center used for storage, data bases, permissions access control, and file and print. Creates a highly redundant solution with flexibility for growth and scale. (Management + Security + Monitoring + Proactive Maintenance + Helpdesk) |
Management and provision of Cloud hosting services. Monthly variable rate for cloud hosting expenses in the Azure data center for the following services: Bandwidth utilization, number of servers, total storage, and resources.(Management) |
This disaster recovery tool offers comprehensive full server protection and minimizes network downtime. It prevents data loss, ensures quick full system restores, and easy recovery of individual files. Redundancy (full image back-ups of your server) in two data centers outside the state of Florida. Allows us to do image backup as often every 15 minutes. NPI engineers confirm backup was tested, successful, and complete every morning before business and proactively fixing any problem that are detected. (Disaster Recovery + Business Continuity + Security+ Compliance + Monitoring + Proactive Maintenance + Management + Helpdesk) |
This backup system for MS 365 protects from the threat of ransomware, data loss, or sabotage. This automated cloud-based backup and archiving system protects all OneDrive and Microsoft 365 data including (Word, Excel, Outlook, PowerPoint, Publisher, Access, OneNote, OneDrive, Teams, and many other applications in the MS 365 stack as well as personal documents and data stored in the OneDrive system). (Disaster Recovery + Proactive Maintenance + Security + Compliance + Disaster Recovery + Business Continuity + Helpdesk) |
Provides a real-time digital report on how your network, resources, and IT management are delivering value to your organization. This tool pulls information from multiple systems that monitor and protect your network as well as gathers data to help the business leader make decisions about technology, resources, and budgeting. It compiles it all into one easy to use and understand set of graphs and tables on one dashboard. (Strategy + Accountability + Monitoring) |
A backup server with redundancy in two locations outside of Florida to keep your business running even in the middle of disasters such as ransomware, malware, hurricanes, network downtime, and human errors. It includes verified backups as often as every five minutes, data restoration, ransomware protection,and instant virtualization (if the server goes down, we’ll take the backup and make that the server within minutes so everyone gets back to work). All backed by Datto’s private cloud. NPI engineers confirm backup was tested, successful, and complete every morning before business and proactively fixing any problem that are detected. Compliance + Monitoring + Proactive Maintenance + Management + Helpdesk) |
Email Fraud Defense protects your employees, customers, and business partners from cyber criminals who spoof trusted email domains. It makes email authentication easy and reliable so you can stop email fraud before it reaches the inbox. It blocks socially engineered attacks such as business email compromise and consumer phishing and automatically adjusts to new vectors of attacks created by criminals. Simplify email authentication without blocking legitimate email. Provides: email antivirus, spam filtering, reporting, content filtering, outbound filtering, imposter email protection, and data loss prevention. (Monitoring + Security + Business Continuity + Proactive Maintenance + Management + Compliance + Helpdesk) |
Email Fraud Defense protects your employees, customers, and business partners from cyber criminals who spoof trusted email domains. It makes email authentication easy and reliable, so you can stop email fraud before it reaches the inbox. It blocks socially engineered attacks such as business email compromise and consumer phishing and automatically adjusts to new vectors of attacks created by criminals. Simplify email authentication without blocking legitimate email. Provides: email antivirus, spam filtering, reporting, content filtering, outbound filtering, imposter email protection, and data loss prevention. Also includes Email encryption, attachment defense (sandboxing), and social media account protection. (Monitoring + Security + Business Continuity + Proactive Maintenance + Management + Compliance + Helpdesk) |
Email Fraud Defense protects your employees, customers, and business partners from cyber criminals who spoof trusted email domains. It makes email authentication easy and reliable, so you can stop email fraud before it reaches the inbox. It blocks socially engineered attacks such as business email compromise and consumer phishing and automatically adjusts to new vectors of attacks created by criminals. Simplify email authentication without blocking legitimate email. Provides: email antivirus, spam filtering, reporting, content filtering, outbound filtering, imposter email protection, and data loss prevention. Also includes Email encryption, Archiving, attachment defense (sandboxing), and social media account protection. (Monitoring + Security + Business Continuity + Proactive Maintenance + Management + Compliance + Helpdesk) |
Daily firewall management for prevention and detection against threat actors/hackers. Network People engineers manage the firewall and daily review the best settings and configurations and latest software (Firmware) to tune the firewall in order to provide the best prevention and detection against threat actors/hackers. (Security + Compliance + Monitoring + Proactive Maintenance + Management) |
Support for the management of hardware and software (inventory, purchase, replacement, and vendor support) Basic support for Hardware as a Service to manage inventory, asset allocation, sourcing of product, warranty, and vendor issues. (Management + Compliance + Proactive Maintenance + Accounting) |
Unlimited management and helpdesk support for a user (Onsite & Remote). During normal business hours Network People technician repairs desktop/laptop, verifies monitoring and management of desktop(s) is done correctly and successfully. This includes antivirus, anti-malware, system checks, alerts, hard drive maintenance, specific scripted repairs of known issues, ticket creation and closure. If Network People detects an issue with any of the above, a ticket is created notifying client and a technician is dispatched to perform the necessary service according to the SLA to restore normal functionality. If ticket requires repair to be done onsite, the technician will go onsite. All the following repairs will be performed under the “unlimited” coverage. *Replace or repair hardware (actual hardware part must be purchased by client) *Conference with vendor to get warranty repair that client deserves *Restore deleted files (requires backup server) *Provide training, advice, troubleshooting, and general user support (Management + Helpdesk + Security + Compliance + Proactive Maintenance + Disaster Recovery + Business Continuity) |
Remote services covered. Hardware/troubleshooting/repair is OOSA. |
Unlimited management and helpdesk support for a user (Remote Only). During normal business hours Network People technician repairs desktop/laptop, verifies monitoring and management of desktop(s) is done correctly and successfully. This includes antivirus, anti-malware, system checks, alerts, hard drive maintenance, specific scripted repairs of known issues, ticket creation and closure. If Network People detects an issue with any of the above, a ticket is created notifying client and a technician is dispatched to perform the necessary service according to the SLA to restore normal functionality. If ticket requires repair to be done onsite, the technician will go onsite. All the following repairs will be performed under the “unlimited” coverage. *Replace or repair hardware (actual hardware part must be purchased by client) *Conference with vendor to get warranty repair that client deserves *Restore deleted files (requires backup server) *Provide training, advice, troubleshooting, and general user support (Management + Helpdesk + Security + Compliance + Proactive Maintenance + Disaster Recovery + Business Continuity) |
Tool that provides daily backup for workstations and is monitored for success. Full image backup of computer’s hard drive up to 1 TB into offsite data center replicated in two locations outside the state of Florida. Backups occur once per day. It provides: a full image cloud backup, screenshot verification, restore and virtualization of the entire PC, including files and data stored locally. (Disaster Recovery + Monitoring + Proactive Maintenance + Security + Helpdesk) |
Monitoring of the backup for a MAC. Alerts when the backup has not been successful for 7 days. Works with our Remote Management Tool (Mac). *This service requires external hard drive or NAS device. |
Advanced endpoint detection and protection combined with SOC-based response and remediation services. On-demand security operations. Always-on threat coverage. Next-gen threat detection and remediation. *Protection: Deliver complete endpoint protection and monitoring. Out static artificial intelligence (AI) prevents attacks before they start by monitoring and analyzing client IT environments. *Threat detection: Behavioral AI constantly monitors and maps each running process for incongruous behaviors and recognizes many thousands of virus and malware attack variants, including cryptomining attacks, as well as the root causes of these malicious behaviors by quickly identifying and diagnosing corrupt source processes and system settings. *Response and remediation: When malicious behavior is detected, Managed Endpoint will activate remediation steps including scrubbing the system of any remnant of an attack, such as malicious processes or registry keys, and performing system rollback, if required, to restore system and data access. *Managed detection and response (MDR): Implement advanced operations without the need for in-house security expertise. *Next-gen endpoint security: Provides unique malware detection and remediation technology. This solution incorporates innovative prevention technology, providing visibility into the root causes and origins of the threat, reversing the malicious operations of ransomware and remediating them at an agile speed, when needed. (Security + Monitoring + Compliance + Management + Proactive Maintenance + Accountability) |
Professional Network Mapping tool that auto-senses devices on the network that have an IP address and makes a visual diagram of those devices for ease of inventory and security. Also helps with securing the network when rogue devices are autosensed—such devices can be removed from the network to prevent unauthorized or malicious access. (Management + Monitoring + Proactive Maintenance + Security + Accountability + Compliance) |
Support for parallels running on a MAC. Technical support to troubleshoot, configure, and train user for help with parallel software running on top of the MAC. (Management + Proactive Maintenance + Helpdesk) |
A system to stop hackers from remotely escalating permissions on the desktops and installing malicious code or ransomware or pivoting to another computer or server on the network. It allows users to escalate permissions to install applications or printers but do so in a secure approach that doesn’t leave the system vulnerable to outside breaches. (Security + Monitoring + Compliance + Management + Helpdesk) |
A monitoring and management tool that saves time and money by giving NP engineers the ability to securely remote into the machine with the user’s permission and diagnose and solve the problem or provide user training if needed. IT allows Network People engineers to have a full team of resources, knowledge, and tools to identify and solve problems. This includes providing information so in depth about every computer and server on the network that our engineers have real time information about the firmware of the bios, the version of the operating system, all the software installed on system and their versions, technical information about setup of the computer, all the drivers, data, and much more. In addition, Network People has programmed custom scripts to identify issues automatically and resolve those issues without any user involvement. This saves you time and money. These custom scripts are continuously improved by watching for problems in the hundreds of networks that we manage, which helps us to identify and proactively prevent problems on your network. (Security + Monitoring + Compliance + Management + Proactive Maintenance) |
Actively monitors for problems on devices before they happen and prevents downtime. Remote monitoring for and remediation of issues. Keeps track of every device in your network regardless of location. Real-time visibility of your inventory. (Security + Monitoring + Management + Compliance) |
On-premises full image and file level server backup to protect your business and keep you up and running. System schedules regular backups as often as hourly and creates differential backup sets (backups of recently changed files) for full recovery or file-based retrieval of data. Image backups can be stored on local media (SAN, backup server, tape) and in redundant locations off-premises. Backups are monitored and managed by the Network People team daily during normal business hours and tickets created automatically to have engineers repair if the backups fail. (Disaster Recovery + Management + Monitoring + Proactive Maintenance + Security + Compliance + Disaster Recovery + Business Continuity) |
On-premises full image and file level server backup to protect your business and keep you up and running. System schedules regular backups as often as hourly and creates differential backup sets (backups of recently changed files) for full recovery or file-based retrieval of data. Image backups can be stored on local media (SAN, backup server, tape) and in redundant locations off-premises. Backups are monitored and managed by the Network People team daily during normal business hours and tickets created automatically to have engineers repair if the backups fail. (Disaster Recovery + Management + Monitoring + Proactive Maintenance + Security + Compliance + Disaster Recovery + Business Continuity) |
Maintain, configure, and support equipment in server room. Equipment includes rack, uninterruptable power supply (UPS), switch, firewall. *Labor to replace or repair hardware (actual hardware part must be purchased by client) *Conference with vendor to get warranty repair that client deserves *Fix normal, high, and critical issues (Disaster Recovery + Management + Monitoring + Proactive Maintenance + Security + Compliance + Disaster Recovery + Business Continuity + Helpdesk) |
Alerts to system compliance issues and resolves them which prevents downtime. Network People combines a powerful set of tools into a unified control panel to provide best in class alerting, documentation, inventory, and change management. Information about hardware and software is instantly gathered and documented. If the information shows that a system is out of compliance an alert is created. It also proactively identifies and resolves changes through these automated alerts and prevents downtime. Engineers can quickly evaluate the system using automated security, compliance, and network configuration alerts. The impact: The business can worry less because misconfigurations or security compliance issues are identified and alerted upon. Troubleshooting is easier because the history of the machine is recorded which makes it possible for engineers to go back in time to figure out what change caused the issue. (Disaster Recovery + Management + Monitoring + Proactive Maintenance + Security + Compliance) |
Daily monitoring and management of server and repair when needed to keep your network and team up and running. Network People engineers perform daily health checks before business hours. This includes runtime and stability, backed, critical errors. Then engineers verify additional health and security checks through monitoring and management of antivirus, anti-malware, system checks, alerts, hard drive maintenance, specific scripted repairs of known issues, ticket creation and closure. If an issue is detected, a ticket is created notifying client and an engineer is dispatched to perform the necessary service according to the SLA to restore normal functionality. If ticket requires repair to be done onsite, the engineer will go onsite. All the following repairs will be performed under the “unlimited” coverage of the server at no extra charge. Examples of such repairs include: *Fix Active Directory (AD) and Group Policy Objects (GPO) issues *Replace or repair hardware (actual hardware part must be purchased by client) *Conference with vendor to get warranty repair that client deserves *Restore data on hard drive or restore entire server (requires backup server) *Provide training, advice, troubleshooting, and general user support (Management + Helpdesk + Security + Compliance + Proactive Maintenance + Disaster Recovery + Business Continuity) |
Prevents unauthorized access to email, Windows Domain, and Cloud accounts. This is designed to prevent unauthorized access to your network by requiring both a password and something you know (the second factor) to have access to the account. For example, a security code is sent to your cell phone. This system manages two-factor authentication (2FA, MFA) devices and improve security for remote desktop connections. This can be implemented for most third-party web facing applications including connecting to the corporate network remotely. Network People can manage the users to maintain high security and compliance, so the tool isn’t turned off by users, exposing the network to risk. (Security + Management + Compliance + Helpdesk) |
Maintains proper updates to network computers and servers to protect from hackers. Statistics show that as high as 97% of malicious code would be prevented from impacting computers and servers if they were properly and regularly updated. This tool and service allows your network computers and servers to maintain the proper updates both in Microsoft operating systems as well as third party applications. (Security + Compliance + Management + Proactive Maintenance) |