Sale!

Comprehensive Business IT Support Services – Monthly Support Plan

$125.00 / month

Discover how Blackhawk MSP can provide exceptional IT support services to your organization. From network security to help desk support, we have you covered. Contact us today!

View Our Brochure Online

 

Description

The Business IT Support Services Support Plan – Monthly provides comprehensive and reliable IT support for businesses of all sizes. With this plan, you will have access to a team of skilled IT professionals who will assist with troubleshooting, software updates, hardware installations, network security, and more. By subscribing to this monthly support plan, you can ensure that your business’s technology infrastructure runs smoothly, minimizing downtime and maximizing productivity. Services Included:

  • Unlimited Help Desk Support During Business Hours
  • Sentinel One Antivirus
  • Office 365 Business Plan
  • Duo RDP Security
  • Email Backup (Unlimited)
  • Workstation Backup
  • Software Updates
  • Computer Monitoring
  • Cyber Security Monitoring
  • Software Firewall
  • Ransomware Protection
  • Phishing Protection

 

INFORMATION TECHNOLOGY SUPPORT SERVICES CONTRACT

Dear Client,

I wanted to personally thank you for your interest in our IT services. We truly appreciate your consideration and are honored that you are considering our team to support your IT needs.

At Blackhawk MSP, we pride ourselves on providing exceptional IT services to our clients, and we are confident that we can provide the same level of service to your organization. Our team of experienced professionals is dedicated to ensuring that your IT infrastructure is reliable, secure, and optimized for your business needs.

We understand that technology is critical to the success of any organization, and we are committed to helping you achieve your business goals through effective IT solutions. Whether you need assistance with network security, data management, or help desk support, we have the expertise and experience to provide the right solution for your needs.

Thank you again for considering our services. We would be honored to work with you and provide you with the IT support you need to achieve your business objectives. Please do not hesitate to contact us if you have any questions or would like to learn more about our services.

Sincerely,

Ryan C. Smith

 

     This contract outlines the plan to offer Information Technology support services to the client, Blackhawk MSP.

Contractor Client

Blackhawk MSP

2824 Bollinger Canyon Road

San Ramon, CA 94583

1(925)-218-4000

You the client.

Month to Month Terms

Workstation and Coverage

$125 / Month per Desktop or Laptop.  Unlimited call in support for problems during business hours.  Server Monitoring, Workstation monitoring, Patching, System Updates, Full Backups, Email Backups, Security Patching, and Endpoint Security for Laptops and Desktops.

Project Pricing

$125 / Hour (Remote) for projects.  Any jobs that are not support based.

After Hours Support (Past 5:30 PM)

$75 / Hour

Onsite Support

$125 / hour (Two Hour Minimum per visit)

Month To Month Agreement
Item Qty Rate Amount

Workstation Monthly Support Plan

Calculated by Cart. $125 / Month Calculated by Cart.
  Monthly Total: Calculated by Cart.
Scope of Work

Hours of Operation

Help desk Hours of Operation are 6:00 AM to 5:00 PM M-F

Support Services   

All Workstations and Servers that are worked on during normal business hours on “Low and Normal Priority Tickets” are given unlimited support with no extra charges. Technicians will try their best to close out each ticket within the response time listed below.

All Help desk services are done remotely over the phone and Internet.  A remote control agent will be installed on each workstation and server.

Blackhawk MSP Responsibilities

The IT Provider, Blackhawk MSP will maintain and support the IT systems used by the client. Additionally, Blackhawk MSP will:- Ensure relevant software, services and equipment are available to the client.- Respond to support requests — and within reasonable time, in any case.- Do its best to escalate and resolve issues in an appropriate, timely manner.- Maintain good communication with the client at all times.

Your Responsibilities

The client will use the IT system covered by this contract as intended. Additionally, the client will:– Notify Blackhawk MSP of issues or problems in a timely manner.– Provide the Blackhawk MSP with access to equipment, software and services for the purposes of maintenance, updates and fault prevention.– Keep Blackhawk MSP informed about potential changes to its IT system. For example, changing a server password, etc.– Maintain good communication with the IT Company at all times.

Incident Tracking System

     Each customer request must have a ticket created. This can be done by emailing (support@blackhawkmsp.com) or calling our help desk line at 925-218-4000.

Incident Priority Levels

 Priority Level “Low” (P3)

– Response Time is 0-4 Hours. Customer may agree on a time to have technician look at the problem. Higher Priority tickets will get attention first within the company.

– Example: Mary wants someone to show her how to change font sizes in Word.

Priority Level “Normal” (P2)

– Response Time is 0-2 Hours.

Example: Mary needs to find a file on the network.

 Priority Level “High” (P1)

– Response time is 0-30 minutes. Technician will remain on the line with the customer until a qualified technician is available to assist.

– Customers Manager and Blackhawk MSP Manager will be notified.

– Example: Exchange Server is not responding, or Network is down.

Helpdesk Services
Our Helpdesk Services offer unlimited call in support during business hours for your Desktop, Laptop or Server.

System Updates

We take care of updating your desktops’ operating systems by installing the latest updates and security patches as they become available.

Software Installation and Updates

We update all third party software as it comes available.  Some specialized software might require patches from vendors.

Security

     Due to the numerous security threats on the Internet and coming in via email, desktops must be secured with antivirus and antispyware software. We install sophisticated security software that can block threats in real-time, block phishing attempts, and more. Because it’s not practical to rely on individual users to update antivirus definitions, we make sure each desktop is updated as well as run regular scans to ensure that any malware that may have gotten past the initial defenses is found and removed.

With our security systems you get: 

– Antivirus / Threat Detection– Antimalware Protection– Firewall– Network Protection– Device Control – Disable USB, Printing CD-ROMs etc if you choose.– We can Block Social Media sites

Troubleshooting and Repair

     Whether a desktop’s hard drive has failed or software and components are conflicting with each other, computer problems are often difficult to diagnose. Our technicians are skilled at diagnosing and troubleshooting computer problems as well as making the appropriate repairs

Monitoring

We will monitor all Servers Networks, Network Devices, and Workstations for the following:

– Disk Space– Hacker Check– Memory Usage– Windows Updates– Antivirus is running and up to date– Critical Events in the Event Log– Services are running.– Patching (Windows and third party)– Server Downtime– ISP Downtime

Web Protection

     Keep users safe and protect your business from web-based security threats. Our Web Protection delivers extensive, web security across your distributed workforce. Within minutes, your servers, PCs and laptops on the move, are protected from websites pushing malware, phishing sites, proxies, spyware adware, botnets, and SPAM.

Website Maintenance     We have a Website Expert on site that can make changes to your HTML or WordPress website. Each Company is given 1 hour of free web site maintenance. Each additional hour is billed at $75 / hour and you will be notified before the hour is up. We will host your website for free if you want.

Remote Control

     All systems will have a remote agent installed on them. This allows our technicians to be able to remote control into systems immediately and not cause any extra time with customers having to navigate to a website and try to install a remote control system. The system is 100% secure.

Hardware Purchases

Blackhawk MSP does not sell hardware or software. We will help you find parts and software on Amazon or BestBuy.

Backups

We will backup your workstations, servers, and emails to the cloud.  Backups are encrypted.

Optional Web Hosting

We can host your website on our Web Hosting Servers. We will migrate your sites free of charge.

Exclusions

As this IT support contract is written in a spirit of partnership, the supplier will always make the best-possible efforts to provide support and rectify problems as requested. However, this agreement only applies to the parts of the IT system listed above.

Additionally: This contract does not cover IT system problems caused by using equipment, software or service(s) in a way that is not recommended.

If the client has made unauthorized changes (i.e. viruses, malware and spyware) to the configuration or set up of equipment, software or services, this agreement may not apply. If the client has prevented the supplier from performing required maintenance and updates, there may be a delay in resolving issues.

 

 

Blackhawk MSP Master Service Agreement

Contractor

Client

Blackhawk MSP

2824 Bollinger Canyon Road

San Ramon, CA 94583

(925)218-4000

You The Client

This Master Services Agreement (“Agreement”) by and between Client and Contractor known as Blackhawk MSP, is effective as of the date of purchase. The parties agree as follows:
1.  Performance of Services: Blackhawk MSP shall provide the Information Technology infrastructure support services set forth in the attached Professional Services Schedule (“Schedule”) and any subsequent schedules executed by the parties. All services shall be subject to, and performed in accordance with, this Agreement, the schedules attached hereto and incorporated herein by reference, and all applicable local, state and federal laws, rules and regulations. Each Schedule shall set forth the type of services to be performed and the related fees. Fees shall be subject to change by Blackhawk MSP upon notice to Client. Any fee estimates provided for work to be billed on an hourly or daily basis are for informational purposes only; Client agrees to pay for the actual services provided by Blackhawk MSP at the specified rate.

2.  Fees & Payment: Client agrees to pay all fees specified on each Schedule. Blackhawk MSP shall submit to the Client, on the first day of each month, its bill for services itemizing the fees and costs up front for the month. All payments shall be made immediately. Blackhawk MSP may bill in advance for any recurring service.

Client shall be responsible for all taxes, withholdings, duties and levies arising from the services (excluding taxes based on the net income of Blackhawk MSP). Blackhawk MSP shall have the right to suspend service if Client has failed to pay.

3.  Terms of Agreement:

(c) Upon any termination of this Agreement, and upon expiration of the term if Client does not renew , the rights granted hereunder may automatically terminate, and Client may not continue to use the services. If the Agreement is terminated based on Client’s uncured material breach, Client shall pay any unpaid fees covering the remainder of the term after the effective date of such termination. Termination is not an exclusive remedy and the exercise by either party of any remedy under this Agreement will be without prejudice to any other remedies it may have under this Agreement, by law, or otherwise. Sections 4 (Confidential and Proprietary Information), 5 (Indemnification) and 6-11 (general terms) shall survive any expiration or termination of this Agreement.

4.  Confidential and Proprietary Information: Each party agrees that all know-how, business, technical and financial information it obtains (“Receiving Party”) from the disclosing party  (“Disclosing Party”) constitute the confidential property of the Disclosing Party (“Confidential Information”), provided that it is identified as confidential at the time of disclosure or should be reasonably known by the Receiving Party to be Confidential Information due to the nature of the information disclosed and the circumstances surrounding the disclosure. Except as may be necessary to perform its obligations under this Agreement, the Receiving Party will hold in confidence and not use or disclose any Confidential Information. The Receiving Party ’s nondisclosure obligation shall not apply to information that: (i) was known to it prior to receipt of the Confidential Information; (ii) is publicly available; (iii) is  rightfully obtained by the Receiving Party from a third party; (iv) is independently developed by employees of the Receiving Party; or (v) is required to be disclosed pursuant to a regulation, law or court order.

Any templates, schematics, processes or technical documentation provided by Blackhawk MSP shall be deemed Confidential Information and proprietary information of Blackhawk MSP without any marking or further designation. Clients may use such information solely for its own internal business  purposes.

Blackhawk MSP shall maintain the confidentiality of information in its possession regarding individual protected health information in accordance with applicable law, and shall not release such information, to any other person or entity, except as required by law.

5. Indemnification: Blackhawk MSP shall indemnify, defend with counsel acceptable to Client, and hold harmless Client, its officers, officials, employees and volunteers from and against all liability, loss, damage, expense, cost (including without limitation reasonable attorneys fees, expert fees and all other costs and fees of litigation) of every nature arising out of or in connection with Blackhawk MSP’s performance of work hereunder or its failure to comply with any of its obligations contained in this Agreement, regardless of Client’s passive negligence, but excepting such loss or damage which is caused by the sole active negligence or willful misconduct of Client. It is expressly understood and agreed that the foregoing provisions are intended to be as broad and inclusive as is permitted by the law of the State of California and will survive termination of this Agreement.

 6.  Independent Contractor: The parties to this Agreement are independent contractors. There is no relationship of partnership, joint venture, employment, franchise or agency created hereby between the parties. Neither party will have the power to bind the other or incur obligations on the other party’s behalf without the other party’s prior written consent.

7. Assignment: Blackhawk MSP shall not assign or transfer any interest in this Agreement without the express prior written consent of Client.

8.  Disputes; Governing Law; Mediation: California law will govern and enforce this  Agreement. Any litigation or mediation between Client and Blackhawk MSP will take place in any state court located within Contra Costa County, California or federal court within the Northern District of California. Client and Blackhawk MSP waive any objection to personal jurisdiction or venue in any forum located in those jurisdictions. Except for a claim of payments of amounts due, no action, regardless of form, arising out of this Agreement may be brought by either party against the other more than one year after the cause of action has arisen. At the option of either Client or Blackhawk MSP, any dispute arising from or with respect to this Agreement will be decided by mediation. At the request of either party, proceedings may be conducted in secrecy.  If mediation can’t come to a conclusion then both parties agree to arbitration.

9.  Force Majeure: (Force majeure is a common clause in contracts that essentially frees both  parties from liability or obligation when an extraordinary event or circumstance beyond the control of the parties happens.)

Neither party shall be liable to the other for any delay or failure to perform any obligation under this Agreement (except for a failure to pay fees) if the delay or failure is due to unforeseen events which are beyond the reasonable control of such party, such as strikes, blockade, war, terrorism, riots, natural disasters, pandemics, and/or refusal of license by  the government, insofar as such an event prevents or delays the affected party from fulfilling its obligations and such party is not able to prevent or remove the force majeure at reasonable cost.

10. Buy Agreement

Client has the option to buy out Blackhawk MSP LLC’s contractors.  If you want to hire our contractors to  your company please see the terms below.

Buyout Amount: Client agrees to buy out Contractor’s services at a rate of six (6) months’ pay of $55 / hour. 
Payment Terms: The buyout amount shall be paid to Blackhawk MSP LLC in a lump sum within 30 days from the effective date of buy out. Payment shall be made via bank transfer.
All sales are final with no refund.

 

11. Waiver and Severability: Waiver or failure by either party to exercise in any respect any right provided for in the Agreement will not be deemed a waiver of any further right under this Agreement. If any provision of this Agreement is found by a court of competent jurisdiction to be unenforceable for any reason, the remainder of this Agreement will continue in full force and effect.

12. Entire Agreement: This Agreement, including any and all attachments and schedules attached hereto, contains the entire Agreement of the parties with respect to the subject matter hereof, and supersedes all prior negotiations, understandings or agreements. This Agreement may only be supplemented, amended or modified by a writing signed by both parties.

13. Notices: Any notice required to be given hereunder shall be deemed to have been given by depositing said notice in the United States mail, postage prepaid, and addressed as follows:

Contractor: 

Blackhawk MSP

2824 Bollinger Canyon Road

San Ramon, CA 94583

Attn: Ryan C. Smith, Owner

Client:

You the client.

14.

By purchasing you accept and agree to these terms and conditions of this agreement.

Thank you for your business!

Additional information

Technician

Stefan, Ronny, Dino, Ryan

Reviews

There are no reviews yet.

Add a review

Microsoft does not take responsibility for your data. You are responsible for data recovery should an outage occur and data is lost. From Microsoft’s Service Agreement (Sec.6b): “In the event of an outage, you may not be able to retrieve Your Content or Data that you’ve stored. We recommend that you regularly backup Your Content and Data that you store on the Services or store using Third-Party Apps and Services.”


Dropsuite Business Backup + Email Archiving provides advanced cloud-based storage to protect and preserve Microsoft 365 and Google Workspace data, while also providing journaling-based email archiving for Exchange, Gmail, IMAP or POP protocols to preserve, search, hold and comply with compliance regulations and privacy laws. 

Dropsuite cloud-based email archiving helps any organization efficiently store, safeguard, manage, and discover data from most email systems such as Microsoft Exchange Online, Hosted Exchange, Google Workspace, Gmail, and IMAP or POP protocols. With this service, all emails are securely backed up and professionally archived. They are also easily searchable, discoverable, and accessible. 

Customers are covered in the event of a legal motion to hold a set of email records, or when a third-party regulator requests to access emails in the case of a compliance audit. Emails, attachments, calendar, tasks and related files are archived using envelope journaling, ensuring all assets are stored without fail. Dropsuite customers feel confident knowing their company’s emails are archived securely and are readily available should the need arise. 

With Dropsuite Business Backup + Email Archiving for Microsoft 365 and Google Workspace, customer data is kept safe and in compliance with regulatory requirements that include GDPR, HIPAA, SOC, and more, through military-grade encryption that protects data at rest and in transit. Dropsuite helps to close the data protection gaps in Office 365 Gmail. 

Business Backup + Email Archiving includes the following: 

Microsoft 365 Backup:

  • Exchange Online backup - Dropsuite provides unlimited storage and the option for unlimited restore you’ll never need to worry about running out of storage. 
  • OneDrive and SharePoint backup - Maintain complete copies of critical business digital assets to ensure protection from hackers, encryption malware, accidental deletion and more. 
  • Teams backup - Microsoft Teams backup is included with Dropsuite Backup for Office 365. Teams has quickly become the go-to chat messaging and file-sharing tool for Microsoft Office 365 users and Dropsuite protects all Teams files, including channel chats and private chats. 
  • Groups backup - Microsoft 365 Groups backup is included with Dropsuite Backup. Groups is a powerful tool for creating sets of members and shared resources for collaboration and project management. 
  • Calendars, Tasks, and Attachments backup - Microsoft Calendars, Contacts and Tasks are also included in Microsoft 365 backup by Dropsuite to ensure your calendar, contact and task data is safe, protected and secure. 

Google Workspace Backup

  • Gmail backup – Gmail is being adopted more and more by small businesses. Business Backup makes it fast, easy, and secure as possible to backup and recover your Google Workspace Gmail data with the 1-Click restore feature. 
  • My Drive and Shared Drive backup - Backup My Drive and Shared Drive with Dropsuite and ensure all your business-critical data saved to Shared Drive is protected from loss or threat.  
  • Contacts, Calendars and Tasks backup – Calendars, Contacts and Tasks are also included in Google Workspace backup by Dropsuite to ensure your calendar, contact and task data is safe, protected and secure. 

Business Backup also includes Insights BI, an advanced email analytics toolkit that uncovers buried Microsoft 365 email data and helps uncover actionable business intelligence quickly. Insights BI helps to turn complex and extensive email data sets into simple yet powerful reports, graphs and charts that help customers find issues and recommend improvements.

Features

  • Journaling-based email archiving
  • Exchange Online backup
  • Gmail backup (Google Workspace)
  • Outlook backup (Microsoft 365)
  • Calendars, Tasks, and Attachments backup for both Microsoft 365 and Google Workspace
  • OneDrive/SharePoint backup (Microsoft 365) and My Drive/Shared Drive backup (Google Workspace)
  • Microsoft Teams backup
  • Insights email business intelligence

Key Benefits

  • Closes common Office 365 data protection gaps
  • Supports compliance efforts
  • Scalable to meet the needs of the business
  • Protects the whole Office 365 environment
  • Provides single-pane visibility

Microsoft 365 Business Premium brings together features from across several Microsoft offerings in a solution designed for small and medium-sized businesses. It’s powered by Office 365 and Windows 10, with device management and security features to help ensure your company’s data is protected. Business Premium combines all the features included in Office 365 Business Premium with Windows 10, and Microsoft Enterprise Mobility + Security. 

This solution was purpose-built for small and medium-sized customers that have little to no IT resources on staff, do not rely on an Active Directory domain controller, and need a solution that provides their employees with the best-in-class productivity and collaboration capabilities of Office 365 and device management and security solutions to safeguard business data and assets across devices.


Features

  • Fully installed and web versions of Office apps
  • 1TB file storage and sharing
  • Business class email (50GB), calendar, and contacts.
  • Single console to manage user and device settings
  • Automatically deploy Office apps to Windows 10 PCs

Key Benefits

  • Bring together teams and resources, all in one place
  • Access your work securely from anywhere
  • Safeguard company data across PCs, phones and tablets
  • Easy employee setup and deployment
  • Manage users and devices with a single dashboard

Audio Conferencing is now available as a free add-on service in legacy Office 365 and Microsoft 365 suites through a new $0 Microsoft Teams Audio Conferencing select dial-out SKU. Pax8 is currently confirming with Microsoft the availability of a similar New Commerce Experience SKU. This new offer includes unlimited toll dial-in minutes, 60 dial-out minutes to United States and Canada phone numbers pooled at the tenant level (regardless of tenant location), and Operator Connect Conferencing.

E5 suites are not impacted as they already included Audio Conferencing and no change is made.

Description

Important Microsoft Audio Conferencing Update

Audio Conferencing is now available as a free add-on service in legacy Office 365 and Microsoft 365 suites through a new $0 Microsoft Teams Audio Conferencing select dial-out SKU. Pax8 is currently confirming with Microsoft the availability of a similar New Commerce Experience SKU. This new offer includes unlimited toll dial-in minutes, 60 dial-out minutes to United States and Canada phone numbers pooled at the tenant level (regardless of tenant location), and Operator Connect Conferencing.

E5 suites are not impacted as they already included Audio Conferencing and no change is made.

Customers adding the $0 Audio Conferencing select dial-out supplemental SKU will be unable to associate a Communications Credits account with those users until April 1, 2022. This does not impact the ability to acquire the $0 SKU, assign the license to users, or utilize the included unlimited toll dial-in minutes and the included 60 dial-out minutes/user/month (pooled) to the US and Canada.


Microsoft 365 Business Standard includes fully installed Office applications across multiple devices, hosted email, and online file storage and sharing.

Microsoft 365 Business Standard is the most comprehensive package available for businesses with 300 or fewer users. The robust package supports greater productivity and collaboration in the workplace, with all of the features of the Microsoft 365 Apps for Business and Microsoft 365 Business Basic packages together in one integrated product.

Microsoft 365 Business Standard includes all of the popular Office applications like Word, PowerPoint, Excel and more. Each user can install Office on 5 PCs or Macs, 5 tablets (Windows, iPad, and Android), and 5 phones, all with anytime, anywhere access. Businesses can also simplify email with business-class Microsoft Exchange email hosting with a 50 GB mailbox.

In addition, Microsoft 365 Business Standard provides access to a wide range of business tools, including HD video conferencing, Microsoft Sway, which provides a set of professional digital storytelling tools to create interactive reports and presentation, and corporate team sites and social networking capabilities

All Microsoft 365 Business packages include 1 TB of file storage per user, a guaranteed uptime SLA of 99.9%, complementary support, and Active Directory integration.Features

  • Fully installed Office applications, including Word, Excel, PowerPoint, Outlook, Publisher, and OneNote
  • Each user can install Office on 5 PCs or Macs, 5 tablets (Windows, iPad, and Android), and 5 phones
  • Business-class email hosting with a 50 GB mailbox
  • HD video conferencing
  • Microsoft Sway, a set of professional digital storytelling tools to create interactive reports and presentation.
  • 1 TB file storage and sharing
  • Active Directory integration

Key Benefits

  • Supports BYOD across multiple devices
  • Anywhere, anytime access to apps
  • Reduces capital expenditures
  • Scales to fit your business needs
  • Continually updated, never grows obsolete

Microsoft 365 Business Basic makes it easy for you to take your business to the cloud. Access familiar Office applications like Word, PowerPoint, and Excel, collaborate with co-workers on SharePoint and Lync, and send and receive emails over the world’s leading email application – all securely over any PC, tablet, or smartphone. 

Business Basic is perfect for small and medium-sized businesses interested in enabling their users with greater productivity, efficiency, and security, while eliminating the hassles of managing on-premises hardware and applications. 

Whether users are offline or online, they can access and work with the most up-to-date versions of the files and tools they need to get things done – on virtually any device. This means that anyone can get work done anywhere.  Business-class email, shared calendars, instant messaging, web conferencing, and access to documents stored in the cloud allows for unmatched collaboration.  

Microsoft 365 Business Basic also helps reduce capital expenditures by allowing you to move to the cloud and transform your capital expenditures to operating expenses, with no large up-front costs. As your business grows, Business Basic easily grows with you – license only what you need. And finally, with Microsoft 365 in the cloud, it’s always up-to-date, and there are never patches or software upgrades to be dealt with. 

This robust package serves up to 300 users and includes business-class email hosting with a 50 GB mailbox, web versions only of Outlook, Word, Excel and PowerPoint, HD video conferencing, and 1 TB of file storage per user. There is also a guaranteed uptime SLA of 99.9%, along with Active Directory integration. Business Basic is accessible across PCs, Macs, Android tablets and phones, iPad, and iPhone.

Features

  • 1 TB file storage and sharing
  • Web versions of key Office apps
  • Complementary support
  • Active Directory
  • Video conferencing

Key Benefits

  • Supports BYOD across multiple devices
  • Anywhere, anytime access to apps
  • Reduces capital expenditures
  • Scales to fit your business needs
  • Continually updated, never grows obsolete

Additional Information

Audio Conferencing is now available as a free add-on service in legacy Office 365 and Microsoft 365 suites through a new $0 Microsoft Teams Audio Conferencing select dial-out SKU. Pax8 is currently confirming with Microsoft the availability of a similar New Commerce Experience SKU. This new offer includes unlimited toll dial-in minutes, 60 dial-out minutes to United States and Canada phone numbers pooled at the tenant level (regardless of tenant location), and Operator Connect Conferencing.

E5 suites are not impacted as they already included Audio Conferencing and no change is made.

Safeguard Your Business Finances with QuickBooks Online Backup

Over half of small-to medium sized businesses (SMBs) in the USA use QuickBooks Online (QBO). When QBO is the lifeblood of a company’s finances, it’s critical to have the most recent copy of their accounting records should the need occur (data breach or data inquiry).

Dropsuite’s QuickBooks Online Backup offers secure continuous and on-demand backup of over 40 QBO objects for quick and easy restore. Businesses can now take advantage of point-in-time restore, download archived files for reporting, import into QBO, replicate records to other QBO accounts for testing and training purposes, upgrade/downgrade subscription plans, auditing purposes, and entity changes.

Why should you back up QuickBooks Online?

Data Loss Protection

Backing up QBO data ensures that important financial and accounting information is safe from accidental deletion, system crashes, cyber-attacks, and other causes of data loss.

Business Continuity

In the event of a data loss, having a backup of QuickBooks Online data can help businesses quickly recover and resume operations, minimizing the impact of downtime on business productivity and revenue.

Peace of Mind

An easy-to-use UI and “set and forget” capabilities allow business owners and financial managers to rest assured that their data is secure so they can focus on their business.

AutoElevate allows you to remove administrator rights, quickly move to a more secure least privilege model, and control privileged access while delivering a seamless customer experience.

What You Are Getting

Our Digital Spartan Cybersecurity Ecosystem deploys technologies on the Endpoint (your device), to protect your device and your access through the Network into the Internet while not interrupting your user experience.

Secure Endpoint

The EXOsecure Digital Spartan Service provides Cortex® XDR™ from Palo Alto Networks. The Cortex® XDR™ Endpoint Protection software for your compute and mobile devices provides everything you need to secure your endpoints. By analyzing files before and after they execute, it identifies the telltale signs of attacks, including zero-day malware, fileless attacks, and script-based attacks. You can quickly deploy the unified, cloud-delivered agent to your endpoints to instantly start blocking advanced attacks and collecting data for detection and response.

Secure Network

The EXOsecure Digital Spartan Service provides GlobalProtect™ from Palo Alto Networks. GlobalProtect™ network security for endpoints enables you to protect users by extending the Prisma™ Access Palo Alto Networks Next-Generation Firewalls to all users, regardless of location. It secures traffic by applying the platform’s capabilities to understand application use, associate the traffic with users and devices, and enforce security policies with next-generation technologies.

Secure Internet

The EXOsecure Digital Spartan Service provides advanced protection by utilizing Prisma™ Access from Palo Alto Networks. GlobalProtect™ and Prisma™ Access work together to protect You, your family, business or organization and delivers consistent security to all applications. All users, whether at your business location, on the road or at home, connect to the Digital Spartan Service to safely use the internet and cloud applications by consistently inspecting all traffic for thr

eats.

Secure Endpoint – Protection Overview

Safeguard your endpoints from never-before-seen attacks with a single, cloud-delivered agent for endpoint protection, detection, and response.

Advanced malware and script-based cyber-attacks can bypass traditional antivirus with ease and potentially wreak havoc on your business or personal compute devices. To protect your endpoints, you need a solution that provides superior prevention and uses AI to continuously adapt to rapidly changing threats and outpace adversaries.

The EXOsecure Digital Spartan Service provides Cortex® XDR™ from Palo Alto Networks. The Cortex® XDR™ Endpoint Protection software for your compute and mobile devices provides everything you need to secure your endpoints. By analyzing files before and after they execute, it identifies the telltale signs of attacks, including zero-day malware, fileless attacks, and script-based attacks. You can quickly deploy the unified, cloud-delivered agent to your endpoints to instantly start blocking advanced attacks and collecting data for detection and response.

Eliminate Zero-Day Malware, Ransomware, and Fileless Attacks 

Block Exploits by Technique to Shut Down Attacks Early

Quickly Discover and Investigate Threats with Cortex XDR

The Cortex® XDR™ agent provides the most comprehensive prevention stack, thwarting every possible attack vector with a single agent by unifying multiple complementary engines:

• AI-based local analysis blocks malware before it can execute, using a local machine learning model powered by a comprehensive data set from global sources. The model is built on a unique agile framework, enabling continuous updates to ensure the latest local prevention is always available.

• Integration with cloud-based WildFire® malware prevention service brings deep inspection of unknown files, with intelligence automatically shared across your Palo Alto Networks endpoint agents, Next-Generation Firewalls, and cloud infrastructure.

• Behavioral Threat Protection blocks the stealthiest threats by recognizing the sequence of events associated with malware and fileless attacks. This engine examines the behavior of multiple related processes to uncover attacks, even if individual actions do not definitively signal malicious activity.

• Behavior-based ransomware protection safeguards your endpoints against ransomware by detecting processes attempting to modify or encrypt files, providing another layer of defense against covert ransomware.

Adversaries often exploit system and application vulnerabilities to gain control of endpoints and install malware. To stay ahead of continually evolving exploits, the Cortex XDR agent identifies exploit techniques and methods rather than simply detecting exploits with signatures. By foiling each step of an exploit, it breaks the attack lifecycle and renders threats ineffective.

Cortex® XDR™ agents prevent exploits through multiple methods:

• Pre-exploit protection blocks reconnaissance and vulnerability-profiling techniques before adversaries launch exploits, effectively preventing attacks. 

• Technique-based exploit prevention prevents known and zero-day exploits, without any prior knowledge of the threats, by blocking exploit techniques such as buffer overflow or DLL hijacking.

• Kernel exploit prevention blocks exploits that take advantage of vulnerabilities in the operating system kernel to create processes with escalated, system-level privileges.

The Cortex XDR agent also thwarts injection techniques used to load and run malicious code from the kernel, such as those used in the WannaCry and NotPetya attacks.

Deploying Cortex® XDR™ agents to your compute and mobile devices proactively blocks attacks and collects rich endpoint data for the EXOsecure Managed Cortex XDR portal, the category-defining enterprise- scale prevention, detection, and response plat­form that runs on endpoint, network, and cloud data to stop sophisticated attacks. A unified user interface facilitates man­agement of alerts and incidents for detection and response as well as policies for the Cortex XDR agent.

 The EXOsecure managed Cortex XDR portal speeds alert triage and incident response feedback to the customer by pro­viding a complete picture of each threat and revealing the root cause automatically.
By stitching different types of data together and simplifying investigations, Cortex XDR reduces the time and experience required at every stage of security
operations, from triage to threat hunting. Tight integration with enforcement points lets you respond to threats quickly and apply the knowledge gained from investigations to detect similar attacks in the future.

Secure Network – Protection Overview

Extend the endpoint protection of your compute devices into the network, for you your family or mobile workforce, no matter where they go.

The world you need to secure continues to expand as users and applications shift to locations outside the traditional network perimeter. We all face new security challenges with maintaining pace with current cyber threats, visibility into network traffic and taking appropriate actions to stop threats. Traditional technologies used to protect mobile endpoints, such as host endpoint antivirus software and remote access virtual private networks (VPNs), cannot stop the advanced techniques employed by today’s sophisticated attackers.

The EXOsecure Digital Spartan Service provides GlobalProtect™ from Palo Alto Networks. GlobalProtect™ provides a secure connection to Prisma Access extending the level of protection for all users from the endpoint to the network perimeter, regardless of location. It secures traffic by applying the platform’s capabilities to understand application use, associate the traffic with users and devices, and enforce security policies with next-generation technologies.

Extending the Platform Protection Externally

 GlobalProtect provides

GlobalProtect™ safeguards you, your family or mobile workforce by inspecting all traffic using Prisma Access firewalls which are deployed as internet gateways at the network perimeter. Laptops, smartphones, and tablets with the GlobalProtect app automatically establish a secure IPsec/SSL VPN connection to the Prisma Access using the best gateway, thus providing full visibility of all network traffic, applications, ports, and protocols. By eliminating the blind spots in mobile workforce traffic, EXOsecure can provide feedback to you or your Business and therefore  provide and maintain a consistent view into application usage.

Secure access to the Internet & cloud-based applications. 

Advanced Threat Prevention 

  • Secures internet traffic
  •  Stops threats from reaching the endpoint.
  • Protects against phishing and credential theft.
  • Quarantines compromised devices by leveraging immutable characteristics.

 URL Filtering

  •  Enforces acceptable use policies.
  • Filters access to malicious domains and adult content.
  • Prevents the use of avoidance and evasion tools.
  • Secures access to SaaS applications.
  • Control’s access and enforces policies for SaaS applications while blocking unsanctioned applications. 

Secure Internet – Protection Overview

Prisma Access is critical component to providing an effective cyber security deterrent. It further enhances the level of protection provided to your compute devices protecting you, your family or Business at the network perimeter.

Fundamental shifts in the application and threat landscape, user behavior, and network infrastructure have steadily eroded the security that traditional traditional firewalls once provided. People are accessing all types of applications using a range of device types, often times to get their job done. Meanwhile, datacenter expansion, virtualization, mobility, and cloud-based initiatives are forcing you to re-think how to enable application access yet protect your network.  

Traditional responses include an attempt to lock down all application traffic through an ever growing list of point technologies in addition to the firewall, which may hinder your business; or allowing all applications, which is equally unacceptable due to increased business and security risks. The challenge that you face is that your traditional  firewall technology, even with bolt-on application blocking, does not provide an alternative to either approach. In order to strike a balance between allowing everything and denying everything, you need to safely enable applications by using business-relevant elements such as the application identity, who is using the application, and the type of content as key firewall security policy criteria.

The EXOsecure Digital Spartan Service provides advanced protection by utilizing Prisma Access from Palo Alto Networks. Global Protect and Prisma Access work together to protect You, your family, business or organization and delivers consistent security to all applications. All users, whether at your business location, on the road or at home, connect to the Digital Spartan Service to safely use the internet and cloud applications by consistently inspecting all traffic for threats.

How is Prisma Access from Palo Alto Networks different from the traditional firewall and why does it matter?

 • Identify applications, not ports. Classify traffic, as soon as it hits the firewall, to determine the application identity, irrespective of protocol, encryption, or evasive tactic. Then use that identity as the basis for all security policies. 

 • Tie application usage to user identity, not IP address, regardless of location or device. Employ user and group information from enterprise directories and other user stores to deploy consistent enablement policies for all your users, regardless of location or device. 

 • Protest against all threats—both known and unknown. Prevent known vulnerability exploits, malware, spyware, malicious URLs while analyzing traffic for, and automatically delivering protection against highly targeted and previously unknown malware. 

 • Simplify policy management. Safely enable applications and reduce administrative efforts with easy-to-use graphical tools, a unified policy editor, templates, and device groups.

Safe application enablement with Palo Alto Networks™ next-generation firewalls helps you address business and security risks associated with the rapidly growing number of applications traversing your network. By enabling applications for users or groups of users, both local, mobile, and remote, and protecting the traffic against known and unknown threats, you can improve your security posture while growing your business.  PrismaPrisma Prisma 

Classifying all applications, across all ports, all the time.

Integrating users and devices, not just IP addresses into policies.

Protect against all threats, both known and unknown.

Accurate traffic classification is the heart of any firewall, with the result becoming the basis of the security policy. Today, applications can easily bypass a port-based firewall; hopping ports, using SSL and SSH, sneaking across port 80, or using non-standard ports. App-ID™ addresses the traffic classification visibility limitations that plague traditional firewalls by applying multiple classification mechanisms to the traffic stream, as soon as the firewall sees it, to determine the exact identity of application traversing your network, regardless of port, encryption (SSL or SSH) or evasive technique employed. The knowledge of exactly which applications are traversing your network, not just the port and protocol, becomes the basis for all your security policy decisions. Unidentified applications, typically a small percentage of traffic, yet high in potential risk, are automatically categorized for systematic management— which can include policy control and inspection, threat forensics, creation of a custom App-ID, or a packet capture for Palo Alto Networks App-ID development.

Creating and managing security policies based on the application and the identity of the user, regardless of device or location, is a more effective means of protecting your network than relying solely on port and IP address. Integration with a wide range of enterprise user repositories provides the identity of the Microsoft Windows, Mac OS X, Linux, Android, or iOS user accessing the application. Users who are traveling or working remotely are seamlessly protected with the same, consistent policies that are in use on the local, or corporate network. The combined visibility and control over a user’s application activity means you can safely enable the use of Oracle, BitTorrent, or Gmail, or any other application traversing your network, no matter where or how the user is accessing it.

To protect today’s modern network, you must address a blend of known exploits, malware and spyware as well as completely unknown and targeted threats. This process begins by reducing the network attack surface by allowing specific applications and denying all others, either implicitly through a deny-all-else strategy or through explicit policies. Coordinated threat prevention can then be applied to all allowed traffic, blocking known malware sites, vulnerability exploits, viruses, spyware and malicious DNS queries in a single pass. Custom or otherwise unknown malware is actively analyzed and identified by executing the unknown files and directly observing more than 100 malicious behaviors in a virtualized sandbox environment. When new malware is discovered, a signature for the infecting file and related malware traffic is automatically generated and delivered to you. All threat prevention analysis uses full application and protocol context, ensuring that threats are always caught even if they attempt to hide from security in tunnels, compressed content or on non-standard ports.

SentinelOne provides prevention and detection of attacks across all major vectors, rapid elimination of threats with fully automated, policy-driven response capabilities, and complete visibility into the endpoint environment with full-context, real-time forensics. The innovative security solutions offer broad protection against diverse modes of attack, including malware, exploits, and live/insider attacks. 

Malware attacks protection includes executables such as Trojans, malware, worms, backdoors, payload-based Fileless- Memory-only malware, no-disk-based indicators, and fileless attacks such as memory-only malware, no-disk-based indicators. Exploit attacks include exploits rooted in Office documents, Adobe files, macros, spear phishing emails as well as drive-by downloads, Flash, Java, Javascript, VBS, IFrame/HTML5, plug-ins. Live/insider attacked include Powershell, WMI, PowerSploit, VBS, Mimikatz, credentials scraping, and tokens.

Features

  • Single, holistic agent for PC, Mac, Linux, VDI
  • Multi-layered AI-powered endpoint protection
  • Advanced Threat Hunting and device controls
  • Policy driven response to threats

Key Benefits

  • Enterprise proved and easily scalable
  • Certified and recognized as an industry-leading solution
  • Helps eliminate notification fatigue

Singularity Ranger

Singularity Ranger is a cloud delivered, software-defined network discovery solution designed to add global visibility and control with minimal friction. This solution is easy to implement, requiring no new software or network changes. Ranger gives you unparalleled network visibility and correlates all learned information within the backend to fingerprint known and unknown devices. Finally, get granular control, collect device information, and isolate suspicious devices from managed devices with a click.

In addition, SentinelOne Complete has broader Device Control capabilities, including firewall control, which enables the management of the personal firewall on your endpoints.