Managed IT
Simply Secure provides complete Managed IT Services with Cybersecurity Protection and Response, covering all network devices, applications and endpoints, integrated into our 24×7 contact center with multi-channel support which enables us to effectively respond to our customers.
Our Managed IT services include:
- Multi-Channel Help Desk Support – Help Desk support uses ITIL® best practice processes and procedures, with 24×7 Support, via email, telephone, social media, web chat or text.
- Issue Management – Identify, classify, report and resolve issues within agreed SLA. Make distinction between problems versus incidents, with emphasis on fixing the underlying problems, which reduces repeated customer escalations.
- Server & Network System Monitoring – 24×7 monitoring of server & network systems with proactive communication and escalation based on the severity of any incidents.
- Patch Management Services & Preventative Maintenance – Centralized patch management of all systems, which ensures resources are properly protected, managed, and maintained.
- Business Continuity and Disaster Recovery – Support, develop and implement, Business Continuity and Disaster Recovery Plan, which includes replication and recovery of production environment to an off-site Data Center.
- Remote Backup – Nightly backup of critical servers and validate recovery process.
- Email System Management – Management and administration of email systems and accounts.
- Antivirus, AntiSpam & Antispyware Protection – Deployment of Active Next-Gen EDR to defend against security threats including phishing, ransomware, malware, spam, viruses.
- Networking Configuration & Support – Proactive management configuration and monitoring of switches, firewalls, routers, servers, Wi-Fi systems, active directory and other networking equipment.
- Security Systems Monitoring – Proactive monitoring and management of security systems, including firewalls, intrusion prevention, secure remote access, and any advanced security solutions being utilized.
- Warranty and Asset Inventory Management – Maintain hardware and asset registry that includes Desktops, Laptops, Switches, Routers, Wi-Fi Access Points, Servers, Printers/Scanners, Fax Machines, IP Phones, Projectors, Monitors etc. Notification of potential service or warranty issues.
- Software Licensing Control – Responsible for software applications licensing compliance and maintenance.
- Device Support – Support existing and future desktop and laptop hardware. Recommend maintenance, repair, replacement for failed equipment, and the acquisition and provisioning for new equipment as needed.
- Printer Management – Coordinate with third party service providers to ensure service availability for existing printers, copiers, and scanners.
- Desktop / Laptop Software Standardization – Establish a process for identifying standardization and management of desktop images and ensuring that staff are using current products as well as current OS and browser versions.
- Software Licensing and Upgrades
- Lifecycle Management of Hardware Units – Implement a process for end-of-life notification, replacement, and asset decommissioning/disposal.
- Break Fixes and Installation – Offer planned and on-call break/fix services, including emergency response to technology related issues.
- Move, Add, Change (MAC) – Implement standard process regarding changes to location, configuration of equipment or software, and installation of additional equipment or software as needed.
- Monthly Reporting – Provide reporting on, helpdesk performance, system health, uptime, threats, mitigations strategies, incident responses.
- IT Policy Review and Development – Assist in the development of customized policies related to the use of technology.
- End-User Training – Offer Security Awareness Training to teach staff and employees about current threats, terms, standards, and compliance to help them avoid a security incident on an ongoing basis.
- Vulnerability Testing – Conduct monthly Vulnerability Assessments and act on results.
- Managed SOC-as-a-Service – Offer Managed SOC-as-a-Service (SOC -Security Operating Center) to monitor your environment and ensure proactive detection and response to threats, intrusions, and attacks.
- Incident Response – Provide an incident response plan for suspected breaches and incident which may impair the business.