Cart 0
 

Basic Service Package


IT Support

IT Services

IT Solutions

589564544
 

Service Description: Basic Service Package is designed to provide small businesses with their most pressing information technology requirements to address security, data recovery, and system health concerns for Windows and Apple systems. The IT services within this package are actions businesses of any size should be taking to prevent data loss, maintain reliable operations, and enhance their cybersecurity.

 

IT Services, What's Included?

  • Security Suite ➤

  • Data Backup Solution ➤

  • Continuous Monitoring ➤

  • Help Desk ➤

  • Patch Management ➤

  • Remote Management ➤

  • Server Administration ➤

  • Monthly Reporting ➤

  • IT Summary Facts:

    • Over 340 million new malware variants discovered in 2016. [Source - Symantec Corporation]

    • In a 2016 survey over a six month period 32% of enterprise incurred a ransomware event; the average ransom requested was $679. [Source - Symantec Corporation]

    • 65% of Windows users are running unsupported or outdated versions of the operating system increasing vulnerabilities. [Source - Duo Security]

    • On average businesses spend 3.2% to 6.9% of their annual revenue on IT services and assets. [Source]

     

    Data Backup
    Solution

    A secure cloud solution to backup your critical data using industry standard AES 256 encryption allowing you to recover your data in the event of a security incident or disaster.

    Continuous
    Monitoring

    Implemented to monitor the health of workstations, laptops, servers, printers, plotters, and other peripheral devices. Can be used to identify failing hardware before it becomes a problem.

    Patch
    Management

    Keep operating systems, Microsoft Office, drivers, Java, Adobe, and third party applications up to date and secure from known vulnerabilities.

     

    Help Desk -
    Technical Support

    Call, email, or submit a ticket through a convenient software based help desk agent to receive technical support on a variety of subject matters.

    Server
    Administration

    ITX3 will evaluate your requirements to design a server to meet your specifications. ITX3 will also maintain, support, and manage existing server resources.

     
     
    Data Backup.jpg
     

    Remote Management

    Allows ITX3 to provide support to your company from anywhere. This remote management tool possesses banking grade encryption and security utilizing audit trails, multi-level passwords, device authentication, and TLS with AES 256 encryption. Accounts can also be made available to clients to access their corporate resources from a remote location; allowing for continued work in remote situations or during inclement weather events.

    Reporting

    Reports customized and for your company so you know you are getting a return on investment.

  • Backup Data Report - Can be sent daily, weekly, or monthly
  • IT Health Status Report - Monthly report
  • Security State Report - Monthly report
  •  
    485062338
     

    Security Suite

     
    • Content Control

      Employs web content filtering software preventing access to undesirable websites with malicious intent and any websites deemed unnecessary for access by your company.

    • Anti-Phishing Protection

      Defends against drive-by-downloads, phishing, and social engineering attacks.
    • Data Loss Prevention

      Emplace controls to prevent sensitive information such as bank account numbers, trade secrets, and social security numbers from being unintentionally disclosed.

    • Anti-Malware/Virus

      Active threat control for protection against viruses, malware, ransomware, trojans, worms, and spyware.
    • Intrusion Detection System

      Software that analyzes information from various areas within the endpoint to identify security breaches using heuristics and behavioral analysis.

    • Firewall

      Employs an endpoint firewall with rules adapted to client requirements with the ability to blacklist and whitelist resources.
     
    • Advanced Threat Control

      Actively monitors running processes to protect against fileless attacks and suspicious behaviors.

    • Full Disk Encryption

      Perform full disk encryption and manage all your endpoints regulatory compliancy for encrypting their hard drives from a central console.
    • Machine Learning

      Local and cloud based machine learning alogrithms are employed to monitor heuristics of the system to combat polymorphic malware threats.

    • Ransomware Vaccine

      Stop ransomware before it encrypts your hard drive and data is lost to cyber criminals.
     
    Cybersecurity.png
    ITX3 Services.jpg