Pricing & Packages
Tired of hearing “it depends” from your IT provider when it comes to pricing? We understand. Get started with our calculator and let our team customize the perfect package for you. Book your discovery call today!
Your Estimated Monthly Investment:
$835 - $1335
Core IT
$835
Core IT provides essential security to safeguard your businesses, like strong protection for devices, extra login security, and defense against fake emails.
Secure IT
$1085
Secure IT is made for businesses that want constant monitoring to stay safe, extra layers of protection, real-time cyber security, and cyber insurance compliance support.
Enterprise IT
$1335
Enterprise IT provides top-level security for businesses needing strong protection and needs to meet high regulatory compliance requirements.
The monthly investment you see is an estimate for each of our packaged plans. Consult with our experts and get a network assessment for the most accurate pricing information.
Core
$0
Per User Per Month
- Tek Care
- Cloud Care
Most poplular
Secure IT
$0
Per User Per Month
- Tek Care
- Cloud Care
- Cyber Care
Enterprise IT
$0
Per User Per Month
- Tek Care
- Cloud Care
- Cyber Care
Compliance Care
Compare Packages
TEK CARE
Description | Core IT | Secure IT | Enterprise IT |
---|---|---|---|
Unlimited Remote Support/Helpdesk | ✓ | ✓ | ✓ |
On-site Support | ✓ | ✓ | ✓ |
Live Chat Support | ✓ | ✓ | ✓ |
IT Support Panel/ Application | ✓ | ✓ | ✓ |
Mobile App | ✓ | ✓ | ✓ |
After-hour, Weekend, & Holiday Support | ✓ | ✓ | ✓ |
Emergency Remote Response Time | ✓ | ✓ | ✓ |
Emergency On-Site Response Time | ✓ | ✓ | ✓ |
Description | Core IT | Secure IT | Enterprise IT |
---|---|---|---|
Asset Inventory | ✓ | ✓ | ✓ |
IT Hardware Sourcing | ✓ | ✓ | ✓ |
Leasing and Financing | ✓ | ✓ | ✓ |
Computer Migration | ✓ | ✓ | ✓ |
Data Sanitization | ✓ | ✓ | ✓ |
Recycling / Donation | ✓ | ✓ | ✓ |
Description | Core IT | Secure IT | Enterprise IT |
---|---|---|---|
User Management | ✓ | ✓ | ✓ |
Dedicated Senior Consultant | ✓ | ✓ | ✓ |
Training Portal | ✓ | ✓ | ✓ |
IT Documentation | ✓ | ✓ | ✓ |
IT Budget Planning and Strategic Roadmap | ✓ | ✓ | ✓ |
Self-Service Portal | ✓ | ✓ | ✓ |
Weekly Cybersecurity & Tech Tips | ✓ | ✓ | ✓ |
Weekly Cybersecurity Awareness Tips | ✓ | ✓ | ✓ |
Monthly Newsletter | ✓ | ✓ | ✓ |
Description | Core IT | Secure IT | Enterprise IT |
---|---|---|---|
Schedule Preventative Maintenance | ✓ | ✓ | ✓ |
Patch Management – Microsoft, Adobe, Mozilla, Java, Google Chrome | ✓ | ✓ | ✓ |
Support & Fix Computer Issues | ✓ | ✓ | ✓ |
Secure Remote Access | ✓ | ✓ | ✓ |
Application Control | ✓ | ✓ | ✓ |
Firmware Updates | ✓ | ✓ | ✓ |
Security Information & Event Management (SIEM) | ✓ | ✓ | ✓ |
Automated Software Deployment | ✓ | ✓ | ✓ |
Web Gateway/Content Filtering Security | ✓ | ✓ | ✓ |
Multi-Engine Proxy Scanning | ✓ | ✓ | ✓ |
Description | Core IT | Secure IT | Enterprise IT |
---|---|---|---|
Endpoint Protection | ✓ | ✓ | ✓ |
Endpoint Remote Monitoring and Alerting | ✓ | ✓ | ✓ |
Password Vault | ✓ | ✓ | ✓ |
Dark web Monitoring | ✓ | ✓ | ✓ |
Cybersecurity Insurance Evaluation | ✓ | ✓ | ✓ |
CLOUD CARE
Description | Core IT | Secure IT | Enterprise IT |
---|---|---|---|
MS365/Google Workspace Management | ✓ | ✓ | ✓ |
MS365/Google Workspace User Account Monitoring | ✓ | ✓ | ✓ |
MS365/Google Workspace Support and License Management | ✓ | ✓ | ✓ |
Description | Core IT | Secure IT | Enterprise IT |
---|---|---|---|
MS365/Google Workspace Backup | ✓ | ✓ | ✓ |
Unlimited Backup Retention | ✓ | ✓ | ✓ |
Description | Core IT | Secure IT | Enterprise IT |
---|---|---|---|
MS365/Google Workspace Phishing Simulations | ✓ | ✓ | ✓ |
Cyber Security Awareness Training | ✓ | ✓ | ✓ |
MS365/Google Workspace AI Spam Protection / Filtering | ✓ | ✓ | ✓ |
White & Blacklist in Spam Filter | ✓ | ✓ | ✓ |
Security Monitoring Reports (Weekly/Monthly) | ✓ | ✓ | ✓ |
Description | Core IT | Secure IT | Enterprise IT |
---|---|---|---|
MS365/Google Workspace 2FA/MFA Enforcement | ✓ | ✓ | ✓ |
Access Permission Violation Monitoring | ✓ | ✓ | ✓ |
Cyber Threat Mitigation | ✓ | ✓ | ✓ |
Suspected Bot Attacks Monitoring | ✓ | ✓ | ✓ |
Mass Data Deletion/Download Monitoring | ✓ | ✓ | ✓ |
CYBER CARE
Description | Core IT | Secure IT | Enterprise IT |
---|---|---|---|
24/7 Security Operations Center | ✗ | ✓ | ✓ |
Managed Detection and Response (MDR) for Network, Cloud, and Endpoint | ✗ | ✓ | ✓ |
24/7 Network Traffic Analysis | ✗ | ✓ | ✓ |
Complete endpoint threat detection & response | ✗ | ✓ | ✓ |
Active malware and Advanced Persistent Threat (APT) Protection | ✗ | ✓ | ✓ |
Cloud layer detection and response | ✗ | ✓ | ✓ |
Domain Name System (DNS) Filter | ✗ | ✓ | ✓ |
Mitigate vulnerabilities and risks | ✗ | ✓ | ✓ |
Access advanced analytic engine | ✗ | ✓ | ✓ |
Gain expert threat hunting | ✗ | ✓ | ✓ |
Experience Active Response | ✗ | ✓ | ✓ |
Look behind the scenes with Covalence Dashboard | ✗ | ✓ | ✓ |
Minimize your impact with Incident Readiness | ✗ | ✓ | ✓ |
Prioritize security efforts | ✗ | ✓ | ✓ |
Flag suspicious email activity for expert review | ✗ | ✓ | ✓ |
Access integration functionality | ✗ | ✓ | ✓ |
Align with cyber security frameworks | ✗ | ✓ | ✓ |
Rely on easy set-up, state-of-the-art appliances | ✗ | ✓ | ✓ |
Access round-the-clock security expertise | ✗ | ✓ | ✓ |