Managed IT

Simply Secure provides complete Managed IT Services with Cybersecurity Protection and Response, covering all network devices, applications and endpoints, integrated into our 24×7 contact center with multi-channel support which enables us to effectively respond to our customers.

Our Managed IT services include:

  • Multi-Channel Help Desk Support – Help Desk support uses ITIL® best practice processes and procedures, with 24×7 Support, via email, telephone, social media, web chat or text.
  • Issue Management – Identify, classify, report and resolve issues within agreed SLA. Make distinction between problems versus incidents, with emphasis on fixing the underlying problems, which reduces repeated customer escalations.

  • Server & Network System Monitoring – 24×7 monitoring of server & network systems with proactive communication and escalation based on the severity of any incidents.
  • Patch Management Services & Preventative Maintenance – Centralized patch management of all systems, which ensures resources are properly protected, managed, and maintained.
  • Business Continuity and Disaster Recovery – Support, develop and implement, Business Continuity and Disaster Recovery Plan, which includes replication and recovery of production environment to an off-site Data Center.

  • Remote Backup – Nightly backup of critical servers and validate recovery process.
  • Email System Management – Management and administration of email systems and accounts.
  • Antivirus, AntiSpam & Antispyware Protection – Deployment of Active Next-Gen EDR to defend against security threats including phishing, ransomware, malware, spam, viruses.
  • Networking Configuration & Support – Proactive management configuration and monitoring of switches, firewalls, routers, servers, Wi-Fi systems, active directory and other networking equipment.
  • Security Systems Monitoring – Proactive monitoring and management of security systems, including firewalls, intrusion prevention, secure remote access, and any advanced security solutions being utilized.
  • Warranty and Asset Inventory Management – Maintain hardware and asset registry that includes Desktops, Laptops, Switches, Routers, Wi-Fi Access Points, Servers, Printers/Scanners, Fax Machines, IP Phones, Projectors, Monitors etc. Notification of potential service or warranty issues.
  • Software Licensing Control – Responsible for software applications licensing compliance and maintenance.
  • Device Support – Support existing and future desktop and laptop hardware. Recommend maintenance, repair, replacement for failed equipment, and the acquisition and provisioning for new equipment as needed.
  • Printer Management – Coordinate with third party service providers to ensure service availability for existing printers, copiers, and scanners.
  • Desktop / Laptop Software Standardization – Establish a process for identifying standardization and management of desktop images and ensuring that staff are using current products as well as current OS and browser versions.
  • Software Licensing and Upgrades
  • Lifecycle Management of Hardware Units – Implement a process for end-of-life notification, replacement, and asset decommissioning/disposal.
  • Break Fixes and Installation – Offer planned and on-call break/fix services, including emergency response to technology related issues.
  • Move, Add, Change (MAC) – Implement standard process regarding changes to location, configuration of equipment or software, and installation of additional equipment or software as needed.
  • Monthly Reporting – Provide reporting on, helpdesk performance, system health, uptime, threats, mitigations strategies, incident responses.
  • IT Policy Review and Development – Assist in the development of customized policies related to the use of technology.
  • End-User Training – Offer Security Awareness Training to teach staff and employees about current threats, terms, standards, and compliance to help them avoid a security incident on an ongoing basis.
  • Vulnerability Testing – Conduct monthly Vulnerability Assessments and act on results.
  • Managed SOC-as-a-Service – Offer Managed SOC-as-a-Service (SOC -Security Operating Center) to monitor your environment and ensure proactive detection and response to threats, intrusions, and attacks.
  • Incident Response – Provide an incident response plan for suspected breaches and incident which may impair the business.