Pricing & Packages

Tired of hearing “it depends” from your IT provider when it comes to pricing? We understand. Get started with our calculator and let our team customize the perfect package for you. Book your discovery call today!

How many users will be supported?

Please indicate the number of users that need support

How many locations do you have?

Please indicate how many business locations you have.

How many servers do you have?

Please indicate the number of servers you manage.

Your Estimated Monthly Investment:

$835 - $1335

Core IT

$835

Core IT provides essential security to safeguard your businesses, like strong protection for devices, extra login security, and defense against fake emails.

Secure IT

$1085

Secure IT is made for businesses that want constant monitoring to stay safe, extra layers of protection, real-time cyber security, and cyber insurance compliance support.

Enterprise IT

$1335

Enterprise IT provides top-level security for businesses needing strong protection and needs to meet high regulatory compliance requirements.

The monthly investment you see is an estimate for each of our packaged plans. Consult with our experts and get a network assessment for the most accurate pricing information.

Core

$0
Per User Per Month
  • Tek Care
  • Cloud Care
  •  
Most poplular

Secure IT

$0
Per User Per Month
  • Tek Care
  • Cloud Care
  • Cyber Care
  •  

Enterprise IT

$0
Per User Per Month
  • Tek Care
  • Cloud Care
  • Cyber Care
  • Compliance Care

  •  

Compare Packages

TEK CARE

Description Core IT Secure IT Enterprise IT
Unlimited Remote Support/Helpdesk
On-site Support
Live Chat Support
IT Support Panel/ Application
Mobile App
After-hour, Weekend, & Holiday Support
Emergency Remote Response Time
Emergency On-Site Response Time
Description Core IT Secure IT Enterprise IT
Asset Inventory
IT Hardware Sourcing
Leasing and Financing
Computer Migration
Data Sanitization
Recycling / Donation
Description Core IT Secure IT Enterprise IT
User Management
Dedicated Senior Consultant
Training Portal
IT Documentation
IT Budget Planning and Strategic Roadmap
Self-Service Portal
Weekly Cybersecurity & Tech Tips
Weekly Cybersecurity Awareness Tips
Monthly Newsletter
Description Core IT Secure IT Enterprise IT
Schedule Preventative Maintenance
Patch Management – Microsoft, Adobe, Mozilla, Java, Google Chrome
Support & Fix Computer Issues
Secure Remote Access
Application Control
Firmware Updates
Security Information & Event Management (SIEM)
Automated Software Deployment
Web Gateway/Content Filtering Security
Multi-Engine Proxy Scanning
Description Core IT Secure IT Enterprise IT
Endpoint Protection
Endpoint Remote Monitoring and Alerting
Password Vault
Dark web Monitoring
Cybersecurity Insurance Evaluation

CLOUD CARE

Description Core IT Secure IT Enterprise IT
MS365/Google Workspace Management
MS365/Google Workspace User Account Monitoring
MS365/Google Workspace Support and License Management
Description Core IT Secure IT Enterprise IT
MS365/Google Workspace Backup
Unlimited Backup Retention
Description Core IT Secure IT Enterprise IT
MS365/Google Workspace Phishing Simulations
Cyber Security Awareness Training
MS365/Google Workspace AI Spam Protection / Filtering
White & Blacklist in Spam Filter
Security Monitoring Reports (Weekly/Monthly)
Description Core IT Secure IT Enterprise IT
MS365/Google Workspace 2FA/MFA Enforcement
Access Permission Violation Monitoring
Cyber Threat Mitigation
Suspected Bot Attacks Monitoring
Mass Data Deletion/Download Monitoring

CYBER CARE

Description Core IT Secure IT Enterprise IT
24/7 Security Operations Center
Managed Detection and Response (MDR) for Network, Cloud, and Endpoint
24/7 Network Traffic Analysis
Complete endpoint threat detection & response
Active malware and Advanced Persistent Threat (APT) Protection
Cloud layer detection and response
Domain Name System (DNS) Filter
Mitigate vulnerabilities and risks
Access advanced analytic engine
Gain expert threat hunting
Experience Active Response
Look behind the scenes with Covalence Dashboard
Minimize your impact with Incident Readiness
Prioritize security efforts
Flag suspicious email activity for expert review
Access integration functionality
Align with cyber security frameworks
Rely on easy set-up, state-of-the-art appliances
Access round-the-clock security expertise

Discover what managed services can do for your business!