12-Month commitment. |
$47.50/user/month |
$104/user/month |
$159/user/month |
Designed to protect your organisation from a variety of email-based threats, including spam, phishing, and malware. Key features include advanced spam filtering, phishing protection, malware detection, email encryption, content filtering, user and role-based access controls, reporting and analytics, and integration with real-time threat intelligence feeds. This solution enhances overall email security, reduces the risk of malicious attacks, and provide Colton Computers with the tools to manage and monitor email threats effectively.
|
|
|
|
Advanced endpoint protection solution that goes beyond traditional antivirus. It offers features such as behavioural analysis, exploit prevention, ransomware protection, and centralised management to safeguard against a wide range of cyber threats.
|
|
|
|
Continuous checks on endpoint protection health, so we can respond to any threats immediately.
|
|
|
|
We’ll keep your hardware and software running smoothly with automated updates for drivers, system firmware, Windows OS and common programs like browsers and PDF readers.
|
|
|
|
Providing your organisation with a secure solution for backing up critical data to the cloud. This service is designed to protect against data loss, including accidental deletion, hardware failure and cyber threats. It will safeguard your information in the event of unexpected data loss or system failure.
|
|
|
|
Provides your organisation phishing simulation and training. The purpose of Cyber Threat Training is to help your organisation educate your employees about the dangers of phishing attacks, which are a common method used by cybercriminals to trick individuals into revealing sensitive information, such as usernames and passwords. This is done by simulation phishing emails that mimic real-world phishing scenarios, helping organisations assess their vulnerability to such attacks.
|
|
|
|
Captures critical Logon data for every client, giving you a full month look-back for every User logon, logoff, computer unlock and computer.
|
|
|
|
Disk capacity and health metrics, CPU and memory usage, offline status, failed backups, and hardware errors are all continuously collected and available for review to help proactively identify potential issues.
|
|
|
|
Encryption is a process of converting information or data into a code to prevent unauthorised access, thereby protecting its confidentiality. In simple terms, encryption involves using algorithms (mathematical procedures) to transform plain, readable data into an unreadable format known as ciphertext. The original data can only be recovered (decrypted) with the appropriate key. Hence if a device is lost or stolen company data is secure.
|
|
|
|
Standard Domain Registration for 1 domain (premium domains may incur an additional cost). DNS Hosting on our redundant DNS cluster (Australia and US Name Servers). All DNS Record changes and updates covered. Servers back up daily and records can be recovered for up to 90 days. Colton Computers will assist with Website Redirects, CNAME, MX Records along with txt and other identity records relating to the domain.
|
1 |
3 |
10 |
Our support team will cover you for everything included in Basic and Intermediary Support as well as support for all licenses included in the quotation.
Support hours 7:00am – 7:00pm Monday to Friday and 8:00am – 12:00pm Saturday.
|
|
|
|
Benefit from unlimited remote support for the setup and troubleshooting of your managed cloud account, covering email, Office Online, and multi-factor authentication. All other remote and on-site support falls outside the inclusive scope and is billed separately at our standard rate. Support of hardware is not included in Basic Support.
|
|
|
|
Includes unlimited remote support for managed users and supported devices, ensuring uninterrupted operations. This includes troubleshooting supported hardware and software, user set up and support, and management of your IT environment. However, please note that on-site support is not covered and will be billed separately at our standard rate.
|
|
|
|
We’ll proactively manage and monitor your security status, keeping your system strong. If there are any significant drops, we’ll review and take action promptly.
|
|
|
|
Proactive measures to ensure multi-factor authentication (MFA) is up and running, providing added protection.
|
|
|
|
Multifactor Authentication (MFA) is a security system that requires more than one method of identification from independent categories of authentication to verify the identity of a user. The goal of MFA is to add an extra layer of security to prevent unauthorised access to systems, applications, or data.
|
|
|
|
Immediate notifications for new admin accounts created in your environment to verify and prevent unauthorised changes.
|
|
|
|
When a user requests a password change, we can send them an MFA prompt to confirm their identity, providing an extra layer of security.
|
|
|
|
This tool simplifies the process of generating, accessing and organising passwords, enhancing overall digital security. CCTs Password manager is integrated into Microsoft 365 meaning that users only need to remember one password and use one MFA token to access all company passwords, along with allowing users to share credentials securely.
|
|
|
|
We use a Remote Monitoring and Management system to automate various IT tasks, monitor systems and manage your devices remotely. This gives you a peace of mind your computers and server are being maintained.
|
|
|
|
Records of automated restarts and other routine maintenance tasks are kept for visibility and auditing.
|
|
|
|
Get notified before storage becomes an issue (around 90% capacity), so your operations run smoothly.
|
|
|
|
Allows organisations to create and centrally manage professional and consistent email signatures for all users. This ensures that email communications maintain a standardised and branded appearance.
|
|
|
|
Automatically updates your third party applications* in the background, ensuring you have the latest versions without having to manually check and update each program. Ad-free installer that only installs the selected applications without any additional, unnecessary programs (Bloatware).
*Applications are based on a pre-defined approved list by Colton Computers, available on request.
|
|
|
|
Integrates with Microsoft 365 to strengthen protection against phishing, spoofing, and business email compromise (BEC) threats. It adds real-time banners to suspicious emails, enables user reporting via an Outlook add-in, and continuously improves through feedback.
|
|
|
|
No more $200 fixed fee! Creation of new users is now fully covered under your agreement. This includes account setup, license assignment, permissions, and configuring the user on a PC.
|
|
|
|
Vulnerability scanners look at all software and systems on a PC and or the network and check them for known vulnerabilities (A security vulnerability is a weakness or error in a system, software, or device’s code that, when exploited, can compromise the confidentiality, availability, and integrity of data stored in them) this is logged and reported on so patching and mitigation of the vulnerabilities can be tracked and the risks managed.
|
|
|
|
The process of applying updates, patches, and fixes to your operating system, software applications (supplied by Colton Computers) to address security vulnerabilities, improve software performance and fix buys or issues that may impact your stability and functionality of your PC.
|
|
|
|