Managed IT Services

Managed services allow you to outsource your IT, so you can focus on your business priorities while taking advantage of our specialist knowledge. Our managed services offerings give you IT support for a monthly fixed fee with the proactive monitoring of IT workstations and infrastructure.

This means we keep your systems up-to-date and secure. In our experience, many break-fix issues and cyber breaches can be avoided by good IT systems management. Depending on your business needs, you can choose the Managed Services Plan that suits you.

Our plans cover:

Managed IT Services
  • Cybersecurity – spam filtering, Virtual Private Networks (VPN), and anti-CEO spoofing
  • Compliance – industry specific compliance, GDPR, The Australian Notifiable Data Breach (NDB) Scheme, financial audits and policy compliance
  • Hardware and software upgrades – EOL planning, scheduled preventative maintenance, hardware system management
  • Data backups in line with Australian Cyber Security Centre’s Essential 8
  • Technical support speaking to real people – 12 x 5 helpdesk support and 24 x 7 business critical monitoring

Our most popular plan is our Managed Business plan, which covers one workstation per user for a contracted number of users. Changes, moves or additions can be supported as separate scopes of work. Alternatively, you can choose the Managed Platinum Agreement, which includes these added extras. For more information and example scenarios on Managed Business inclusions, click here.

Microsoft licensing is now managed and billed separately to our Managed Services Plans. Click here for Microsoft Licensing information.

Product v / Tier > Managed Cloud Email Managed Business Managed Platinum
12-Month commitment. $45/user/month $99/user/month $159/user/month
Advanced Email Security Designed to protect your organisation from a variety of email-based threats, including spam, phishing, and malware. Key features include advanced spam filtering, phishing protection, malware detection, email encryption, content filtering, user and role-based access controls, reporting and analytics, and integration with real-time threat intelligence feeds. This solution enhances overall email security, reduces the risk of malicious attacks, and provide Colton Computers with the tools to manage and monitor email threats effectively.
Antivirus Advanced endpoint protection solution that goes beyond traditional antivirus. It offers features such as behavioural analysis, exploit prevention, ransomware protection, and centralised management to safeguard against a wide range of cyber threats.
Cloud Backup Service Providing your organisation with a secure solution for backing up critical data to the cloud. This service is designed to protect against data loss, including accidental deletion, hardware failure and cyber threats. It will safeguard your information in the event of unexpected data loss or system failure.
Cyber Threat Training Provides your organisation phishing simulation and training. The purpose of Cyber Threat Training is to help your organisation educate your employees about the dangers of phishing attacks, which are a common method used by cybercriminals to trick individuals into revealing sensitive information, such as usernames and passwords. This is done by simulation phishing emails that mimic real-world phishing scenarios, helping organisations assess their vulnerability to such attacks.
Cybersecurity protection Captures critical Logon data for every client, giving you a full month look-back for every User logon, logoff, computer unlock and computer.
Disk Encryption Encryption is a process of converting information or data into a code to prevent unauthorised access, thereby protecting its confidentiality. In simple terms, encryption involves using algorithms (mathematical procedures) to transform plain, readable data into an unreadable format known as ciphertext. The original data can only be recovered (decrypted) with the appropriate key. Hence if a device is lost or stolen company data is secure.
Domain Name Hosting Standard Domain Registration for 1 domain (premium domains may incur an additional cost). DNS Hosting on our redundant DNS cluster (Australia and US Name Servers. All DNS Record changes and updates covered. Servers back up daily and records can be recovered for up to 90 days. Colton Computers will assist with Website Redirects, CNAME, MX Records along with txt and other identify records relating to the domain. 1 3 10
Help Desk – Advanced Support: Our support team will cover you for items listed in the above as well as support for all licenses included in the quotation.
Support hours 7:00am – 7:00pm Monday to Friday and 8:00am – 12:00pm Saturday.
Help Desk – Basic Support Benefit from unlimited remote support for the setup and troubleshooting of your managed cloud account, covering email, Office Online, and multi-factor authentication. All other remote and on-site support falls outside the inclusive scope and is billed separately at our standard rate. Support of hardware is not included in Basic Support.
Help Desk – Intermediary Support Includes unlimited remote support for managed users and supported devices, ensuring uninterrupted operations. This includes troubleshooting supported hardware and software, user set up and support, and management of your IT environment. However, please note that on-site support is not covered and will be billed separately at our standard rate.
Multi-Factor Authentication Multifactor Authentication (MFA) is a security system that requires more than one method of identification from independent categories of authentication to verify the identity of a user. The goal of MFA is to add an extra layer of security to prevent unauthorised access to systems, applications, or data.
Password Manager This tool simplifies the process of generating, accessing and organising passwords, enhancing overall digital security. CCTs Password manager is integrated into Microsoft 365 meaning that users only need to remember one password and use one MFA token to access all company passwords, along with allowing users to share credentials securely.
Remote Monitoring We use a Remote Monitoring and Management system to automate various IT tasks, monitor systems and manage your devices remotely. This gives you a peace of mind your computers and server are being maintained.
Signature Manager Allows organisations to create and centrally manage professional and consistent email signatures for all users. This ensures that email communications maintain a standardised and branded appearance.
Third Party Application Management Automatically updates your third party applications* in the background, ensuring you have the latest versions without having to manually check and update each program. Ad-free installer that only installs the selected applications without any additional, unnecessary programs (Bloatware).
*Applications are based on a pre-defined approved list by Colton Computers, available on request.
Vulnerability Scanner Vulnerability scanners look at all software and systems on a PC and or the network and check them for known vulnerabilities (A security vulnerability is a weakness or error in a system, software, or device’s code that, when exploited, can compromise the confidentiality, availability, and integrity of data stored in them) this is logged and reported on so patching and mitigation of the vulnerabilities can be tracked and the risks managed.
Workstation Patching and Monitoring The process of applying updates, patches, and fixes to your operating system, software applications (supplied by Colton Computers) to address security vulnerabilities, improve software performance and fix buys or issues that may impact your stability and functionality of your PC.

Add on packs

Pack Managed Cloud Email Managed Business Managed Platinum
Microsoft 365 Apps for Business includes the applications that you’re familiar with, such as Word, Excel, PowerPoint, Outlook, OneNote, Access (PC only), Publisher (PC only), Skype for Business, and Teams. You also get 1 TB of OneDrive cloud storage per user to store and share files, plus you can access the latest features and capabilities with monthly updates. $15 Included Included
Employee Cyber Threat Training Provides your organisation phishing simulation and training. The purpose of Cyber Threat Training is to help your organisation educate your employees about the dangers of phishing attacks, which are a common method used by cybercriminals to trick individuals into revealing sensitive information, such as usernames and passwords. This is done by simulation phishing emails that mimic real-world phishing scenarios, helping organisations assess their vulnerability to such attacks. $7.50 ($100 minimum) Included Included
Exclaimer Allows organisations to create and centrally manage professional and consistent email signatures for all users. This ensures that email communications maintain a standardized and branded appearance. $5 (min 10 users) $5 (Min 10 users) Included
LastPass This tool simplifies the process of generating, accessing and organising passwords, enhancing overall digital security. CCTs Password manager is integrated into Microsoft 365 meaning that users only need to remember one password and use one MFA token to access all company passwords, along with allowing users to share credentials securely. $10 $10 Included
Managed Workstation This plan is designed for PCs that are not assigned to a specific user and may be access by multiple employees. This may include reception desk computers, shared PC for doctors and nurses to access in a hospital setting or on manufacturing shop floor. CCT will install and maintain Antivirus and Patch Management for PCs not assigned to users covered by another plan. $26.50 $26.50 (additional Workstations only) Included
Fixed Fee Run Up charges This set up cost applies to CCT procured hardware. $350 $350 Included

For a comprehensive and fully managed solution to suit your organisation’s technological maturity and turn IT from an operating expense to a profitable tool, get in touch today.

Are you already completely sick of IT? Let Us help!