Managed Services Packages Details

Last updated 1/8/2025

Guarantees (For All Managed Services Packages)

  • Information Privacy
    We are committed to honoring our clients' preferences regarding the confidentiality of their proprietary business information. In alignment with our privacy policy, we maintain the confidentiality of such information with the same degree of care as we do for our own confidential information, and we do not disclose it to third parties.
  • 3rd Party Cybersecurity Audit to Ensure We Remain Secure
    Operation Technology Group, TJ’s MCS engages a third-party Chief Information Security Officer (CISO) firm to conduct ongoing monitoring and assessment of our cybersecurity stance. This measure ensures the implementation of robust security protocols to safeguard the interests of our clientele.
  • Make Things Right If We Fall Short
    In the event that our initial services do not meet the stipulated requirements, we will promptly address and rectify the issue to ensure compliance and satisfaction.

 

Guarantees (For Advanced IT Package only)

  • Meet Service Level Expectations
    We hold our teams to the highest standard and we strive to meet our Service Level Expectation by taking a probabilistic-based approach where we forecast realistic work expectations to the overall fixed time that work items are likely to take in a certain process.
  • 100% Satisfaction Guarantee
    Should you find any aspect of our service unsatisfactory; we commit to initiating corrective measures promptly to resolve your concerns in accordance with our service agreement and our service level expectations.
  • Try Us Before You Commit
    FOR NEW CLIENTS ONLY*: Irrespective of the addendum duration, the initial three-month period shall operate on a month-to-month basis for all new clients. During this term, a notice period of 60 days is requisite for termination. Subsequent to this initial term, the agreed-upon contract term length will commence.
  • Service Phone Calls Always Answered By A Tech
    Our policy guarantees that all telephonic service inquiries via the client support line will be directly received by a technical support representative from 7 a.m. to 6 p.m. Local Time, Monday through Friday, excluding holidays.
    https://optech.tech/holidayschedule/

 

Guarantees (For Premium IT Package only)

  • Meet Service Level Expectations
    We hold our teams to the highest standard and we strive to meet our Service Level Expectation by taking a probabilistic-based approach where we forecast realistic work expectations to the overall fixed time that work items are likely to take in a certain process.
  • 100% Satisfaction Guarantee
    Should you find any aspect of our service unsatisfactory; we commit to initiating corrective measures promptly to resolve your concerns in accordance with our service agreement and our service level expectations.
  • Try Us Before You Commit
    FOR NEW CLIENTS ONLY*: Irrespective of the addendum duration, the initial three-month period shall operate on a month-to-month basis for all new clients. During this term, a notice period of 60 days is requisite for termination. Subsequent to this initial term, the agreed-upon contract term length will commence.
  • Service Phone Calls Always Answered By A Tech
    Our policy guarantees that all telephonic service inquiries via the client support line will be directly received by a technical support representative from 7 a.m. to 6 p.m. Local Time, Monday through Friday, excluding holidays.
    https://optech.tech/holidayschedule/
  • Never Leave A Service Voicemail
    We guarantee that when you call our client support line (859-757-2844) during regular support hours (Monday through Thursday, 9 a.m. to 6 p.m. and Friday, 9 a.m. to 4 p.m. Local Time), you will never have to leave a voicemail. In the off chance that you do, we will provide you with a $25 credit on your next invoice. If you experience this, please report it to operations@optech.tech within 30 days with the date and time of the voicemail. (Note: if you choose to leave a voicemail via our automated prompts, this does not apply.)
  • 30-Day Money-Back Guarantee*
    FOR NEW CLIENTS ONLY*: In the event that the Client is dissatisfied with the services rendered within the initial 30-day period, we will issue a full refund of the onboarding fee and the first month's service fee. Furthermore, we will facilitate the transition to an alternative service provider. Clients wishing to initiate this process should direct their request to operations@optech.tech.
  • Onsite, On-Time Guarantee
    We assure punctual arrival for scheduled onsite services. In the event of an unforeseen delay, we guarantee to provide a minimum of 30 minutes' notice prior to the agreed appointment time.

 

 

 

Guarantees (For Elite IT Package only)

  • Meet Service Level Expectations
    We hold our teams to the highest standard and we strive to meet our Service Level Expectation by taking a probabilistic-based approach where we forecast realistic work expectations to the overall fixed time that work items are likely to take in a certain process.
  • 100% Satisfaction Guarantee
    Should you find any aspect of our service unsatisfactory; we commit to initiating corrective measures promptly to resolve your concerns in accordance with our service agreement and our service level expectations.
  • Try Us Before You Commit
    FOR NEW CLIENTS ONLY*: Irrespective of the addendum duration, the initial three-month period shall operate on a month-to-month basis for all new clients. During this term, a notice period of 60 days is requisite for termination. Subsequent to this initial term, the agreed-upon contract term length will commence.
  • Service Phone Calls Always Answered By A Tech
    Our policy guarantees that all telephonic service inquiries via the client support line will be directly received by a technical support representative from 7 a.m. to 6 p.m. Local Time, Monday through Friday, excluding holidays.
    https://optech.tech/holidayschedule/
  • Never Leave A Service Voicemail
    We guarantee that when you call our client support line (859-757-2844) during regular support hours (Monday through Thursday, 9 a.m. to 6 p.m. and Friday, 9 a.m. to 4 p.m. Local Time), you will never have to leave a voicemail. In the off chance that you do, we will provide you with a $25 credit on your next invoice. If you experience this, please report it to operations@optech.tech within 30 days with the date and time of the voicemail. (Note: if you choose to leave a voicemail via our automated prompts, this does not apply.)
  • 30-Day Money-Back Guarantee*
    FOR NEW CLIENTS ONLY*: In the event that the Client is dissatisfied with the services rendered within the initial 30-day period, we will issue a full refund of the onboarding fee and the first month's service fee. Furthermore, we will facilitate the transition to an alternative service provider. Clients wishing to initiate this process should direct their request to operations@optech.tech.
  • We will BUY OUT Your Existing Provider's Contract*
    Solely in Operation Technology Group, TJ’s MCS’s discretion, if Operation Technology Group, TJ’s MCS agrees to buy out the remainder of the contract with your existing provider, we will buy out the contract based on the terms that you have with the existing provider. We will pay the provider the buyout fee and that amount will be pro-rated based on the initial term period contained in the written contract between you and Operation Technology Group, TJ’s MCS. The prorated amount will be added to each month's invoice until the contract buyout is paid in full. If at any time the client terminates its contract with Operation Technology Group, TJ’s MCS prior to the expiration of the initial term, the client must pay the remaining balance of the contract buyout from the previous provider plus any buyout of Operation Technology Group, TJ’s MCS contract immediately.

 

Support

  • Remote Support

Essential IT Package
We offer remote support for all monitored business users, computers, servers, sites, mobile devices, and tablets available during standard Support Hours from Monday through Thursday, 9 a.m. to 6 p.m. and Friday, 9 a.m. to 4 p.m. Local Time, excluding holidays. All support time is billed at $170 per hour in 15-minute increments.
https://optech.tech/holidayschedule/

Advanced IT Package
We offer remote support for all managed business users, computers, servers, sites, mobile devices, and tablets available during standard Support Hours from Monday through Thursday, 9 a.m. to 6 p.m. and Friday, 9 a.m. to 4 p.m. Local Time, excluding holidays.
https://optech.tech/holidayschedule/

Premium IT Package
We offer remote support for all managed business users, computers, servers, sites, mobile devices, and tablets available during standard Support Hours from Monday through Thursday, 9 a.m. to 6 p.m. and Friday, 9 a.m. to 4 p.m. Local Time, excluding holidays.
https://optech.tech/holidayschedule/

Elite IT Package
We offer remote support for all managed business users, computers, servers, sites, mobile devices, and tablets available during standard Support Hours from Monday through Thursday, 9 a.m. to 6 p.m. and Friday, 9 a.m. to 4 p.m. Local Time, excluding holidays.
https://optech.tech/holidayschedule/

  • Onsite Support

Essential IT Package
During designated Support Hours, we will provide support for client infrastructure which includes all managed business users, computers, servers, sites, mobile devices, and tablets at the client's premises as deemed necessary by Operation Technology Group, TJ’s MCS. All support time is billed at $195 per hour, 2-Hour Minimum + Trip Fee. Support is available from Monday through Thursday, 9 a.m. to 6 p.m. and Friday, 9 a.m. to 4 p.m. Local Time, with the exception of designated holidays, which are detailed on Operation Technology Group, TJ’s MCS’s Holiday Schedule.
https://optech.tech/holidayschedule/

Advanced IT Package
During designated Support Hours, we will provide support for client infrastructure which includes all managed business users, computers, servers, sites, mobile devices, and tablets at the client's premises as deemed necessary by Operation Technology Group, TJ’s MCS. All support time is billed at $195 per hour, 1-Hour Minimum + Trip Fee. Support is available from Monday through Thursday, 9 a.m. to 6 p.m. and Friday, 9 a.m. to 4 p.m. Local Time, with the exception of designated holidays, which are detailed on Operation Technology Group, TJ’s MCS’s Holiday Schedule.
https://optech.tech/holidayschedule/

Premium IT Package
During designated Support Hours, we will provide support for client infrastructure which includes all managed business users, computers, servers, sites, mobile devices, and tablets at the client's premises as deemed necessary by Operation Technology Group, TJ’s MCS. This includes conducting regularly scheduled maintenance visits. Support is available from Monday through Thursday, 9 a.m. to 6 p.m. and Friday, 9 a.m. to 4 p.m. Local Time, with the exception of designated holidays, which are detailed on Operation Technology Group, TJ’s MCS’s Holiday Schedule.
https://optech.tech/holidayschedule/

Elite IT Package
During designated Support Hours, we will provide support for client infrastructure which includes all managed business users, computers, servers, sites, mobile devices, and tablets at the client's premises as deemed necessary by Operation Technology Group, TJ’s MCS. All support time is billed at $195 per hour, 1-Hour Minimum + Trip Fee. Support is available from Monday through Thursday, 9 a.m. to 6 p.m. and Friday, 9 a.m. to 4 p.m. Local Time, with the exception of designated holidays, which are detailed on Operation Technology Group, TJ’s MCS’s Holiday Schedule.
https://optech.tech/holidayschedule/

  • After-Hours & Weekend Support

Essential IT Package
After Hours & Weekend Support time is not part of your managed services addendum but is offered separately and billed at a remote rate of $70 per 15 minutes and/or onsite is billed at a rate of $275 Per Hour (with a 4-Hour Minimum) plus a trip fee. After hours is considered 6:01 p.m. to 7:59 a.m. Local Time, with the exception of designated holidays that are detailed on Operation Technology Group, TJ’s MCS’s Holiday Schedule.
https://optech.tech/holidayschedule/

Advanced IT Package
After Hours & Weekend Support time is not part of your managed services addendum but is offered separately and billed at a remote rate of $50 per 15 minutes and/or onsite is billed at a rate of $195 Per Hour (with a 2-Hour Minimum) plus a trip fee. After hours is considered 6:01 p.m. to 7:59 a.m. Local Time, with the exception of designated holidays that are detailed on Operation Technology Group, TJ’s MCS’s Holiday Schedule.
https://optech.tech/holidayschedule/

Premium IT Package
After Hours & Weekend Support time is not part of your managed services addendum but is offered separately and billed at a remote rate of $50 per 15 minutes and/or onsite is billed at a rate of $195 Per Hour (with a 2-Hour Minimum) plus a trip fee. After hours is considered 6:01 p.m. to 7:59 a.m. Local Time, with the exception of designated holidays that are detailed on Operation Technology Group, TJ’s MCS’s Holiday Schedule.
https://optech.tech/holidayschedule/

Elite IT Package
After Hours & Weekend Support time is not part of your managed services addendum but is offered separately and billed at a remote rate of $50 per 15 minutes and/or onsite is billed at a rate of $195 Per Hour (with a 2-Hour Minimum) plus a trip fee. After hours is considered 6:01 p.m. to 7:59 a.m. Local Time, with the exception of designated holidays that are detailed on Operation Technology Group, TJ’s MCS’s Holiday Schedule.
https://optech.tech/holidayschedule/

  • Holiday Support

Essential IT Package
Holiday Support time is not part of your managed services addendum but is offered separately and billed at a remote rate of $125 per 15 minutes (with a 2-hour minimum) and/or onsite is billed at a rate of $390 per hour (with an 8-hour minimum) plus a trip fee. Holiday support is considered any time during the 24-hour span of the designated holidays listed on the Operation Technology Group, TJ’s MCS Holiday Schedule.
https://optech.tech/holidayschedule/

Advanced IT Package
Holiday Support time is not part of your managed services addendum but is offered separately and billed at a remote rate of $90 per 15 minutes (with a 1-hour minimum) and/or onsite is billed at a rate of $390 per hour (with an 4-hour minimum) plus a trip fee. Holiday support is considered any time during the 24-hour span of the designated holidays listed on the Operation Technology Group, TJ’s MCS Holiday Schedule.
https://optech.tech/holidayschedule/

Premium IT Package
Holiday Support time is not part of your managed services addendum but is offered separately and billed at a remote rate of $90 per 15 minutes (with a 1-hour minimum) and/or onsite is billed at a rate of $390 per hour (with a 4-hour minimum) plus a trip fee. Holiday support is considered any time during the 24-hour span of the designated holidays listed on the Operation Technology Group, TJ’s MCS Holiday Schedule.
https://optech.tech/holidayschedule/

Essential IT Package
Holiday Support time is not part of your managed services addendum but is offered separately and billed at a remote rate of $90 per 15 minutes (with a 1-hour minimum) and/or onsite is billed at a rate of $390 per hour (with an 4-hour minimum) plus a trip fee. Holiday support is considered any time during the 24-hour span of the designated holidays listed on the Operation Technology Group, TJ’s MCS Holiday Schedule.
https://optech.tech/holidayschedule/

 

  • Block Hours

Essential IT Package
A minimum of a $2,000 time block budget is required in the Essential IT Package and must be pre-paid. We will bill our time against the $2,000 based on the fee structure of remote, onsite, after hours/weekend, holiday support. Once the time block is used and dropped under $250, an additional $2,000 time block will be billed. The time block will expire if not used within 24-months of receiving payment.

Advanced IT Package
Block Hours do not come with the Premium IT Package, but if interested, please see Account Manager.

Premium IT Package
Block Hours do not come with the Premium IT Package, but if interested, please see Account Manager.

Elite IT Package
Block Hours do not come with the Premium IT Package, but if interested, please see Account Manager.

  • Dedicated Onsite Resource

Essential IT Package
A dedicated onsite resource IS NOT part of the Essential IT package but is an option to purchase separately in 4-hour increments.

Advanced IT Package
A dedicated onsite resource IS NOT part of the Advanced IT package but is an option to purchase separately in 4-hour increments.

Premium IT Package
A dedicated onsite resource IS NOT part of the Premium IT package but is an option to purchase separately in 4-hour increments.

Elite IT Package
A dedicated onsite resource IS NOT part of the Elite IT package but is an option to purchase separately in 4-hour increments.

 


Proactive Account Management (For All Managed Services Packages)

  • Weekly Cybersecurity & Tech Tips
    On "Tech Tip Tuesday" we send out Cybersecurity & Tech Tips to all end users for educational and Cybersecurity purposes.
  • Payment & Invoice Portal
    We provide a convenient and easy-to-use payment portal where we accept credit card and ACH payments.
  • Self-Service Portal
    We provide a fully functional portal where you can pull reports, review tickets and where we provide custom ticket templates for your convenience.
  • Monthly Newsletter
    We send out a Operation Technology Group, TJ’s MCS monthly newsletter to share with you the latest in business, gadgets, and any "In The News" information you need to know about Operation Technology Group, TJ’s MCS.

Proactive Account Management (For Advanced IT Package)

  • Dark Web Monitoring Report
    We send out a Monthly Dark Web Monitoring Report along with notifying you by creating a ticket of any breaches that we find about your company's data on the Dark Web.
  • Custom Employee Onboarding / Offboarding Form
    Inside our self-service portal, at client's request, we will provide you with the ability to create customized onboarding and offboarding forms for your users and computers. Our team will work with you to help set those up.


Proactive Account Management (For Premium IT Package)

  • Dark Web Monitoring Report
    We send out a Monthly Dark Web Monitoring Report along with notifying you by creating a ticket of any breaches that we find about your company's data on the Dark Web.
  • Monthly Quality Assurance Touchbase Email
    Your Account Manager will reach out to you via email or phone call monthly to see if you need any assistance from us and to make sure all is well in our partnership.
  • Custom Employee Onboarding / Offboarding Form
    Inside our self-service portal, at client's request, we will provide you with the ability to create customized onboarding and offboarding forms for your users and computers. Our team will work with you to help set those up.
  • Monthly Executive Summary Report
    We provide a report of the health of your network along with ticket trends and SLE reporting.
  • Dedicated Account Manager
    Your Account Manager will be your key point of contact at Operation Technology Group, TJ’s MCS and a key advocate for making sure the services that you've purchased from Operation Technology Group, TJ’s MCS are delivered at the highest level of standard.
  • Real-Time Dashboard
    We provide a dashboard to see real-time ticket statuses, SLE reports, survey scores, and much more.

Proactive Account Management (For Elite IT Package)

  • Dark Web Monitoring Report
    We send out a Monthly Dark Web Monitoring Report along with notifying you by creating a ticket of any breaches that we find about your company's data on the Dark Web.
  • Monthly Quality Assurance Touchbase Email
    Your Account Manager will reach out to you via email or phone call monthly to see if you need any assistance from us and to make sure all is well in our partnership.
  • Custom Employee Onboarding / Offboarding Form
    Inside our self-service portal, at client's request, we will provide you with the ability to create customized onboarding and offboarding forms for your users and computers. Our team will work with you to help set those up.
  • Monthly Executive Summary Report
    We provide a report of the health of your network along with ticket trends and SLE reporting.
  • Dedicated Account Manager
    Your Account Manager will be your key point of contact at Operation Technology Group, TJ’s MCS and a key advocate for making sure the services that you've purchased from Operation Technology Group, TJ’s MCS are delivered at the highest level of standard.
  • Real-Time Dashboard
    We provide a dashboard to see real-time ticket statuses, SLE reports, survey scores, and much more.
  • Quarterly Meeting with Compliance Expert
    Your compliance expert will setup quarterly meetings to discuss up to date compliance required for your specific business.

 


User Management (For All Managed Services Packages)

  • Email Spam Filtering
    As part of a layered security approach, robust spam / malware filtering services are included to help protect you from email threats.
  • Access Permissions Violation Monitoring
    Access controls and User Behavior Analytics (UBA) will be implemented to monitor and alert for failed logins, unapproved region-based logins, and logins outside of the users learned working habits.

    *Requires appropriate Microsoft licensing and client defined parameters.

  • Suspicious Exposure of Sensitive Information Monitoring
    Email monitoring and device scanning will be used to detect client defined sensitive data controls.

    *Covered data types include: Personally Identifiable Information (PII), Payment Card Information (PCI), Protected Health Information (PHI), Non-Public Information (NPI)
    **Requires appropriate Microsoft licensing and client defined parameters.

  • M365 Suspected Attacks Monitoring
    Managed M365 accounts will be monitored for known and suspected threat actor attacks.

    *Requires appropriate Microsoft licensing and client defined parameters.

  • Mass Data Deletion / Download Monitoring
    Managed cloud connected accounts will be monitored for mass data deletion and downloading indicative of insider threats and threat actor access.

    *Requires appropriate Microsoft licensing and client defined parameters.

  • M365 User Account Monitoring
    M365 Defense provides around-the-clock M365 security monitoring and policy enforcement. With M365 Defense, cyber analysts will monitor and harden your M365 environment and user accounts.

    *Requires appropriate Microsoft licensing and client defined parameters.

  • White and Blacklist in Spam Filter
    We can allow or disallow certain mail flow based on different categories / preferences.


User Management (For Premium IT Package only)

  • User Management (Remote Support)
    Provide troubleshooting and support for managed user related issues, including access permissions and group memberships.
  • Password Vault
    Safely store all your passwords in a secure, digital vault for easy access for you to have multiple passwords at the click of your finger.
  • Microsoft 365 or Google Workspace Support and License Management
    We purchase and maintain the licenses for Microsoft 365 and Google Workspace. We provide support and troubleshooting for managed M365 and Google Workspace accounts. No development is included in support of these products.
  • User Management (On-Site Support)
    If technician finds unable to manage user remotely, an on-site service call is provided for troubleshooting and support for managed user related issues.
  • 2FA / MFA
    Multi-factor authentication provides an additional layer of security when logging into supported systems. It's the concept of something you know (password) plus something you have (phone).
  • Password Manager
    A password manager is used to store passwords in a central location and protect them with encryption. This simplifies password management by eliminating the need to memorize multiple passwords for different accounts.
  • User Training
    We provide your company with live virtual training for your users when it comes to your technology needs. We will provide up to 1 hour of training per company per quarter.
  • M365 or Google Workspace Backup
    Provide industry leading 256-bit encryption at rest and 128-bit in transit. Provide multiple snapshots at regular intervals throughout the day. This ensures that the backups keep up with your demands and provide you with peace of mind.
  • Phishing Simulation
    Best-in-class, fully automated simulated phishing attacks, thousands of templates with unlimited usage, and community phishing templates.
  • On-Demand Training
    We provide access to Award-Winning eLearning Courses for Microsoft Products along with cyber security awareness training sessions available with certificate of completion. This is a self-paced training course for your employees.
  • New User Setup
    We provide up to 3 new users and/or computer setups per month included in this Premium IT package. Any additional users and/or computers will be billed at a flat fee of $375.

User Management (For Elite IT Package only)

  • User Management (Remote Support)
    Provide troubleshooting and support for managed user related issues, including access permissions and group memberships.
  • Password Vault
    Safely store all your passwords in a secure, digital vault for easy access for you to have multiple passwords at the click of your finger.
  • Microsoft 365 or Google Workspace Support and License Management
    We purchase and maintain the licenses for Microsoft 365 and Google Workspace. We provide support and troubleshooting for managed M365 and Google Workspace accounts. No development is included in support of these products.
  • 2FA / MFA
    Multi-factor authentication provides an additional layer of security when logging into supported systems. It's the concept of something you know (password) plus something you have (phone).
  • Password Manager
    A password manager is used to store passwords in a central location and protect them with encryption. This simplifies password management by eliminating the need to memorize multiple passwords for different accounts.
  • User Training
    We provide your company with live virtual training for your users when it comes to your technology needs. We will provide up to 1 hour of training per company per quarter.
  • M365 or Google Workspace Backup
    Provide industry leading 256-bit encryption at rest and 128-bit in transit. Provide multiple snapshots at regular intervals throughout the day. This ensures that the backups keep up with your demands and provide you with peace of mind.
  • Phishing Simulation
    Best-in-class, fully automated simulated phishing attacks, thousands of templates with unlimited usage, and community phishing templates.
  • On-Demand Training
    We provide access to Award-Winning eLearning Courses for Microsoft Products along with cyber security awareness training sessions available with certificate of completion. This is a self-paced training course for your employees.
  • Data Loss Prevention
    Operation Technology Group, TJ’s MCS will build policies to control who and what devices can access managed M365 infrastructure and data. *Requires appropriate Microsoft licensing, Mobile Device Management (MDM), and client defined parameters.
  • New User Setup
    We provide up to 3 new users and/or computer setups per month included in this Premium IT package. Any additional users and/or computers will be billed at a flat fee of $375.

 


Computer Management (For All Managed Services Packages)

  • Endpoint Protection
    An end-to-end approach to cybersecurity deeply rooted in artificial intelligence (AI) and machine learning (ML). Helps detect and prevent attacks from malware.
  • Antivirus
    Antivirus software is a type of program that scans, detects, prevents, and removes viruses and other malware from a computer. It can also help protect against identity theft, phishing, and fraud.
  • Ransomware Detection
    Antivirus solutions can detect some ransomware but are unable to completely protect you from ransomware attacks. You need anti-ransomware to protect you from viruses that have constantly changing algorithms. Antivirus solutions can only protect you against viruses that have clear definitions. Ransomware works in a manner that the anti-virus companies are not able to keep up with the ever-changing algorithms.
  • 24 / 7 / 365 Device Management and Alerting
    We provide 24/7/365 Management and Alerting for all supported devices under this addendum.
  • Scheduled Preventative Maintenance
    We provide scheduled maintenance for all supported computers under this addendum.
  • Patch Management - Microsoft
    Our Network Operations Center team identifies, approves, and automates installation of necessary security patches. The installation is scheduled for pre-determined times to ensure security vulnerabilities are minimized.

    *Additional patch management may be supported as requested by client and approved by Operation Technology Group, TJ’s MCS.

  • Automatic Escalation and Resolution Of Alerts
    Our remote monitoring and management system provides the ability for us to escalate alerts to the appropriate engineers for resolution.
  • Service Auto-Healing
    We have the ability to create auto-healing functions in our system if we find there are reoccurring issues that we can solve through automation.
  • Firmware Updates
    We provide firmware updates for all managed computers.
  • Computer File Backup
  • Web Gateway / Content Filtering Security
    We will build and maintain web content filters based on client defined website categories.

Computer Management (For Advanced IT Package only)

  • Remote Support & Fix – Computer Issues
    Operation Technology Group, TJ’s MCS will provide computer break fix and managed software troubleshooting. Unmanaged software will receive best effort support or act as technical liaison with product support.

    *Remote support will be performed unless the technician determines onsite repair is necessary.

  • Application Control
    A powerful tool that allows us to permit, deny or restrict applications from running on your devices. A gold standard when it comes to blocking ransomware, viruses, and other software-based threats.

Computer Management (For Premium IT Package only)

  • Application Control
    A powerful tool that allows us to permit, deny or restrict applications from running on your devices. A gold standard when it comes to blocking ransomware, viruses, and other software-based threats.
  • M365 / Azure / InTune Support
    We will provide support and changes to the Azure and InTune environment to optimize best performance and security. We will also manage the appropriate licenses when they pertain to Azure and InTune with the guidance of the client.

    *Requires appropriate Microsoft licensing, Mobile Device Management (MDM), and client defined parameters.

  • Support & Fix Computer Issues
    Operation Technology Group, TJ’s MCS will provide computer break fix and managed software troubleshooting. Unmanaged software will receive best effort support or act as technical liaison with product support.

    *Remote support will be performed unless the technician determines onsite repair is necessary.

  • Malware Sandboxing
    Suspicious and malicious content will be quarantined to a segmented part of the computer system. Analysis of the content will be performed and determined based on cybersecurity Tactics, Techniques and Procedures (TTPs) modeling.
  • Computer Encryption Management
    Operation Technology Group, TJ’s MCS will manage computer encryption on managed devices that support encryption.
  • Ring-Fencing
    Operation Technology Group, TJ’s MCS will manage and maintain controls to limit computer system services, processes, and drivers to only their intended functions adding a layer of security against malware, ransomware, and threat actor exploitation.
  • Custom Alerts
    We provide the ability to setup custom alerts for service and applications as requested by client.
  • Data Loss Prevention
    Operation Technology Group, TJ’s MCS will build policies to control who and what devices can access managed M365 infrastructure and data.

    *Requires appropriate Microsoft licensing, Mobile Device Management (MDM), and client defined parameters.

  • Cyber Attack Remediation
    Operation Technology Group, TJ’s MCS will provide or facilitate the first five (5) hours of cyber incident triage per calendar year. Cyber Attack/Hack due to client's or client employee's negligence are not covered.

    *Incident Response (IR) is billed hourly beyond the included hours at a rate of $375/hour per security engineer required.

  • Automated Software Deployment
    Operation Technology Group, TJ’s MCS will deploy managed software automatically on all managed devices.

    *Operation Technology Group, TJ’s MCS can help deploy unmanaged software at scale for an additional cost or block of hours.

  • Provision Computer
    *Labor Only; All Hardware and Software Costs Will Be Additional

    Operation Technology Group, TJ’s MCS will configure managed computers to match the clients approved desired state for new hires. These devices will be required to meet the Operation Technology Group, TJ’s MCS minimum baseline requirements (i.e. Hardware, system specifications [CPU, RAM, storage space, etc. and current operating system). We provide up to 3 computer setups per month included in this package. Any additional computers will be billed at a flat fee of $375 per new computer setup.

  • Installation Of New Software
    Labor Only; All Hardware and Software Costs Will Be Additional. Operation Technology Group, TJ’s MCS will provide managed software troubleshooting and support. Unmanaged software will receive best-effort support or act as technical liaison with product support.
  • MDR / SOC
    A team of cyber security experts actively identifying and remediating security threats. Takes in huge amounts of security / behavioral data from PCs and servers to identify suspicious patterns or actions. These behaviors are then reviewed by our security professionals. Another team of "threat hunters" are proactively looking for signs of compromise.

Computer Management (For Elite IT Package only)

  • Application Control
    A powerful tool that allows us to permit, deny or restrict applications from running on your devices. A gold standard when it comes to blocking ransomware, viruses, and other software-based threats.
  • M365 / Azure / InTune Support
    We will provide support and changes to the Azure and InTune environment to optimize best performance and security. We will also manage the appropriate licenses when they pertain to Azure and InTune with the guidance of the client.

    *Requires appropriate Microsoft licensing, Mobile Device Management (MDM), and client defined parameters.

  • Support & Fix Computer Issues
    Operation Technology Group, TJ’s MCS will provide computer break fix and managed software troubleshooting. Unmanaged software will receive best effort support or act as technical liaison with product support.

    *Remote support will be performed unless the technician determines onsite (not included) repair is necessary.

  • Malware Sandboxing
    Suspicious and malicious content will be quarantined to a segmented part of the computer system. Analysis of the content will be performed and determined based on cybersecurity Tactics, Techniques and Procedures (TTPs) modeling.
  • Computer Encryption Management
    Operation Technology Group, TJ’s MCS will manage computer encryption on managed devices that support encryption.
  • Ring-Fencing
    Operation Technology Group, TJ’s MCS will manage and maintain controls to limit computer system services, processes, and drivers to only their intended functions adding a layer of security against malware, ransomware, and threat actor exploitation.
  • Custom Alerts
    We provide the ability to setup custom alerts for service and applications as requested by client.
  • Data Loss Prevention
    Operation Technology Group, TJ’s MCS will build policies to control who and what devices can access managed M365 infrastructure and data.

    *Requires appropriate Microsoft licensing, Mobile Device Management (MDM), and client defined parameters.

  • Cyber Attack Remediation
    Operation Technology Group, TJ’s MCS will provide or facilitate the first five (5) hours of cyber incident triage per calendar year. Cyber Attack/Hack due to client's or client employee's negligence are not covered.

    *Incident Response (IR) is billed hourly beyond the included hours at a rate of $375/hour per security engineer required.

  • Automated Software Deployment
    Operation Technology Group, TJ’s MCS will deploy managed software automatically on all managed devices.

    *Operation Technology Group, TJ’s MCS can help deploy unmanaged software at scale for an additional cost or block of hours.

  • Provision Computer
    *Labor Only; All Hardware and Software Costs Will Be Additional

    Operation Technology Group, TJ’s MCS will configure managed computers to match the clients approved desired state for new hires. These devices will be required to meet the Operation Technology Group, TJ’s MCS minimum baseline requirements (i.e. Hardware, system specifications [CPU, RAM, storage space, etc. and current operating system). We provide up to 3 computer setups per month included in this package. Any additional computers will be billed at a flat fee of $375 per new computer setup.

  • Installation Of New Software
    Labor Only; All Hardware and Software Costs Will Be Additional. Operation Technology Group, TJ’s MCS will provide managed software troubleshooting and support. Unmanaged software will receive best-effort support or act as technical liaison with product support.
  • MDR / SOC
    A team of cyber security experts actively identifying and remediating security threats. Takes in huge amounts of security / behavioral data from PCs and servers to identify suspicious patterns or actions. These behaviors are then reviewed by our security professionals. Another team of "threat hunters" are proactively looking for signs of compromise.
  • SIEM
    SIEM logs nearly every bit of under-the-hood activity on a computer, network access, security changes, permissions changes, etc. Those behaviors are then used to trigger alerts when an unusual or potentially malicious string of behaviors is detected. SIEMs also provide Operation Technology Group, TJ’s MCS with a means of tracing a security incident back to its source which is traditionally a blind spot for IT professionals. 30-Day Retention is included, additional retention available for purchase by request.

 


Computer Management (Add On / Additional Billing)

  • SIEM
    SIEM logs nearly every bit of under-the-hood activity on a computer, network access, security changes, permissions changes, etc. Those behaviors are then used to trigger alerts when an unusual or potentially malicious string of behaviors is detected. SIEMs also provide Operation Technology Group, TJ’s MCS with a means of tracing a security incident back to its source which is traditionally a blind spot for IT professionals. 30-Day Retention is included, additional retention available for purchase by request.
  • MDR / SOC
    A team of cyber security experts actively identifying and remediating security threats. Takes in huge amounts of security / behavioral data from PCs and servers to identify suspicious patterns or actions. These behaviors are then reviewed by our security professionals. Another team of "threat hunters" are proactively looking for signs of compromise.
  • All The Time VPN for Computers
    Operation Technology Group, TJ’s MCS provides VPN for your remote users, so they always have secure connections.

 


Backup & Recovery - Computer

  • Computer File Backup
    Operation Technology Group, TJ’s MCS will provide a file level backup of the following file extensions up to 250G of storage, with a retention of 30 days.
  • Additional Storage for Computer File Backup
    Additional storage is available for purchase at increments of 50G.
  • Image-Based Backup
    If you would like for us to backup your entire computer with bare metal backup, it is available for purchase.


Backup & Recovery - Server

  • Server Data Backup
    Operation Technology Group, TJ’s MCS will provide 1TB of server data backup per managed server with a retention of 90-days. Any additional storage or retention is available for purchase.

    *Client compliance requirements may dictate the length of data retention where applicable.


Backup & Recovery - Disaster Recovery Backup

  • BDR Backup
    Operation Technology Group, TJ’s MCS will provide leased Backup and Disaster Recovery appliances housed at the client owned office location to perform a bare metal backup and ongoing file and folder level backup of the managed servers.

    *All BDR services are custom quoted based on the needs. It is not included in any of our packages by default.


Server Management (For All Managed Services Packages)

  • Endpoint Protection
    An end-to-end approach to cybersecurity deeply rooted in artificial intelligence (AI) and machine learning (ML). Helps detect and prevent attacks from malware.
  • Antivirus
    Antivirus software is a type of program that scans, detects, prevents, and removes viruses and other malware from a computer. It can also help protect against identity theft, phishing, and fraud.
  • Ransomware Detection
    Antivirus solutions can detect some ransomware but are unable to completely protect you from ransomware attacks. You need anti-ransomware to protect you from viruses that have constantly changing algorithms. Antivirus solutions can only protect you against viruses that have clear definitions. Ransomware works in a manner that the anti-virus companies are not able to keep up with the ever-changing algorithms.
  • 24 / 7 / 365 Server Management and Alerting
    We provide 24 / 7 / 365 Management and Alerting for all supported devices under this addendum.
  • Scheduled Preventative Maintenance
    We provide scheduled maintenance for all supported servers under this addendum.
  • Patch Management - Microsoft
    Our Network Operations Center team identifies, approves, and automates installation of necessary security patches. The installation is scheduled for pre-determined times to ensure security vulnerabilities are minimized.

    *Additional patch management may be supported as requested by client and approved by Operation Technology Group, TJ’s MCS.

  • Automatic Escalation and Resolution Of Alerts
    Our remote monitoring and management system provides the ability for us to escalate alerts to the appropriate engineers for resolution.
  • Firmware Updates
    We provide firmware updates for all managed servers.
  • Service Auto-Healing
    We have the ability to create auto-healing functions in our system if we find there are reoccurring issues that we can solve through automation.
  • Server File Backup
    Backing up your most crucial data is one of the most important things you can do for your company, but like everything, all backups are not created equal. You want to make sure the types of backups that are being performed and also the retention period of those backups if you ever need to recover.

Server Management (For Advanced IT Package only)

  • Web Gateway / Content Filtering Security
    We will build and maintain web content filters based on client defined website categories.
  • Application Control
    A powerful tool that allows us to permit, deny or restrict applications from running on your devices. A gold standard when it comes to blocking ransomware, viruses, and other software-based threats.
  • Remote Support & Fix - Server Issues
    Operation Technology Group, TJ’s MCS will provide server break fix and managed software troubleshooting. Unmanaged software will receive best effort support or act as technical liaison with product support.

    *Remote support will be performed unless the technician determines onsite repair is necessary.

Server Management (For Premium IT Package only)

  • Web Gateway / Content Filtering Security
    We will build and maintain web content filters based on client defined website categories.
  • Application Control
    A powerful tool that allows us to permit, deny or restrict applications from running on your devices. A gold standard when it comes to blocking ransomware, viruses, and other software-based threats.
  • M365 / Azure / InTune Support
    We will provide support and changes to the Azure and InTune environment to optimize best performance and security. We will also manage the appropriate licenses when they pertain to Azure and InTune with the guidance of the client.

    *Requires appropriate Microsoft licensing, Mobile Device Management (MDM), and client defined parameters.

  • Malware Sandboxing
    Suspicious and malicious content will be quarantined to a segmented part of the computer system. Analysis of the content will be performed and determined based on cybersecurity Tactics, Techniques and Procedures (TTPs) modeling.
  • Server Disk Encryption Management
    Operation Technology Group, TJ’s MCS will enable and maintain server disk encryption on managed servers.
  • Ring-Fencing
    Operation Technology Group, TJ’s MCS will manage and maintain controls to limit server services, processes, and drivers to only their intended functions adding a layer of security against malware, ransomware, and threat actor exploitation.
  • Remote Support & Fix - Server Issues
    Operation Technology Group, TJ’s MCS will provide server break fix and managed software troubleshooting. Unmanaged software will receive best effort support or act as technical liaison with product support.

    *Remote support will be performed unless the technician determines onsite repair is necessary.

  • Custom Alerts
    We provide the ability to setup custom alerts for service and applications as needed.
  • Data Loss Prevention
    Operation Technology Group, TJ’s MCS will build policies to control who and what devices can access managed M365 infrastructure and data.

    * Requires appropriate Microsoft licensing, Mobile Device Management (MDM), and client defined parameters.

  • Cyber Attack Remediation
    Operation Technology Group, TJ’s MCS will provide or facilitate the first five (5) hours of cyber incident triage per calendar year. Cyber Attack/Hack due to client's or client employee's negligence are not covered.

    *Incident Response (IR) is billed hourly beyond the included hours at a rate of $375/hour per security engineer required.

  • Automated Software Deployment
    Operation Technology Group, TJ’s MCS will deploy managed software automatically on all managed devices.

    *Operation Technology Group, TJ’s MCS can help deploy unmanaged software at scale for an additional cost or block of hours.

  • Onsite Support & Fix - Server Issues
    Operation Technology Group, TJ’s MCS will provide server break/fix and troubleshooting. End-of-Life hardware will receive best-effort support or Operation Technology Group, TJ’s MCS will facilitate vendor support on the client's behalf.

    *Remote support will be performed unless the technician determines onsite repair is necessary.

  • 24 / 7 / 365 Backup Monitoring, Alert Management
    Operation Technology Group, TJ’s MCS will manage, monitor, troubleshoot and remediate alerts of backup related issues on managed servers.

    *Client compliance requirements will dictate the length of data retention where applicable or a rolling 90 days based on agreement package.
    **Compliance as a Service clients will get additional backup restore testing, validation, and reporting.

  • SIEM
    SIEM logs nearly every bit of under-the-hood activity on a server, network access, security changes, permissions changes, etc. Those behaviors are then used to trigger alerts when an unusual or potentially malicious string of behaviors is detected. SIEMs also provide Operation Technology Group, TJ’s MCS with a means of tracing a security incident back to its source which is traditionally a blind spot for IT professionals. 30-Day Retention is included, additional retention available for purchase by request.

    **Compliance as a Service clients will get additional log retention.

Server Management (For Elite IT Package only)

  • Web Gateway / Content Filtering Security
    We will build and maintain web content filters based on client defined website categories.
  • Application Control
    A powerful tool that allows us to permit, deny or restrict applications from running on your devices. A gold standard when it comes to blocking ransomware, viruses, and other software-based threats.
  • M365 / Azure / InTune Support
    We will provide support and changes to the Azure and InTune environment to optimize best performance and security. We will also manage the appropriate licenses when they pertain to Azure and InTune with the guidance of the client.

    *Requires appropriate Microsoft licensing, Mobile Device Management (MDM), and client defined parameters.

  • Malware Sandboxing
    Suspicious and malicious content will be quarantined to a segmented part of the computer system. Analysis of the content will be performed and determined based on cybersecurity Tactics, Techniques and Procedures (TTPs) modeling.
  • Server Disk Encryption Management
    Operation Technology Group, TJ’s MCS will enable and maintain server disk encryption on managed servers.
  • Ring-Fencing
    Operation Technology Group, TJ’s MCS will manage and maintain controls to limit server services, processes, and drivers to only their intended functions adding a layer of security against malware, ransomware, and threat actor exploitation.
  • Remote Support & Fix - Server Issues
    Operation Technology Group, TJ’s MCS will provide server break fix and managed software troubleshooting. Unmanaged software will receive best effort support or act as technical liaison with product support.

    *Remote support will be performed unless the technician determines onsite repair is necessary.

  • Custom Alerts
    We provide the ability to setup custom alerts for service and applications as needed.
  • Data Loss Prevention
    Operation Technology Group, TJ’s MCS will build policies to control who and what devices can access managed M365 infrastructure and data.

    * Requires appropriate Microsoft licensing, Mobile Device Management (MDM), and client defined parameters.

  • Cyber Attack Remediation
    Operation Technology Group, TJ’s MCS will provide or facilitate the first five (5) hours of cyber incident triage per calendar year. Cyber Attack/Hack due to client's or client employee's negligence are not covered.

    *Incident Response (IR) is billed hourly beyond the included hours at a rate of $375/hour per security engineer required.

  • Automated Software Deployment
    Operation Technology Group, TJ’s MCS will deploy managed software automatically on all managed devices.

    *Operation Technology Group, TJ’s MCS can help deploy unmanaged software at scale for an additional cost or block of hours.

  • 24 / 7 / 365 Backup Monitoring, Alert Management
    Operation Technology Group, TJ’s MCS will manage, monitor, troubleshoot and remediate alerts of backup related issues on managed servers.

    *Client compliance requirements will dictate the length of data retention where applicable or a rolling 90 days based on agreement package.
    **Compliance as a Service clients will get additional backup restore testing, validation, and reporting.

  • SIEM
    SIEM logs nearly every bit of under-the-hood activity on a server, network access, security changes, permissions changes, etc. Those behaviors are then used to trigger alerts when an unusual or potentially malicious string of behaviors is detected. SIEMs also provide Operation Technology Group, TJ’s MCS with a means of tracing a security incident back to its source which is traditionally a blind spot for IT professionals. 30-Day Retention is included, additional retention available for purchase by request.

    **Compliance as a Service clients will get additional log retention.

  • MDR / SOC
    A team of cyber security experts actively identifying and remediating security threats. Takes in huge amounts of security / behavioral data from servers to identify suspicious patterns or actions. These behaviors are then reviewed by our security professionals. Another team of "threat hunters" are proactively looking for signs of compromise.


Server Management (Add On / Additional Billing)

  • SIEM
    SIEM logs nearly every bit of under-the-hood activity on a server, network access, security changes, permissions changes, etc. Those behaviors are then used to trigger alerts when an unusual or potentially malicious string of behaviors is detected. SIEMs also provide Operation Technology Group, TJ’s MCS with a means of tracing a security incident back to its source which is traditionally a blind spot for IT professionals. 30-Day Retention is included, additional retention available for purchase by request.

    **Compliance as a Service clients will get additional log retention.

  • MDR / SOC
    A team of cyber security experts actively identifying and remediating security threats. Takes in huge amounts of security / behavioral data from servers to identify suspicious patterns or actions. These behaviors are then reviewed by our security professionals. Another team of "threat hunters" are proactively looking for signs of compromise.


Site Management

  • Dark Web Monitoring
    A combination of human and machine intelligence with powerful search capabilities to scour the dark web to identify, analyze and actively monitor for your organization's compromised credentials 24 / 7 / 365, alerting you to potential trouble, fast.
  • Power Management
    In the case of internet service or power outage, the power management device automatically restarts your router / firewall / server in an attempt to automatically restore connectivity to your business.
  • Network Monitoring and Alerting for All Network Devices and Peripherals
    Visibility into Network Traffic flow, helping to identify issues or inconsistencies causing slow-downs or interruptions in your network infrastructure.
  • Network Management
    Operation Technology Group, TJ’s MCS will provide network management and support for all office infrastructure equipment. End-of-Life hardware will receive best-effort support or Operation Technology Group, TJ’s MCS will facilitate vendor support on the client's behalf.

    *Remote support will be performed unless the technician determines onsite repair is necessary.

  • Annual IT Assessment
    An annual IT assessment is a review of a company's IT systems and infrastructure to identify areas for improvement.


Site Management (Add On / Additional Billing)

  • Firewall With IDS / IPS as-a-Service
    We will provide a firewall equipped with IDS and IPS. Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) are security features found in industry leading firewalls. They monitor the events occurring in your network and analyze them for signs of possible incidents or threats.
  • Power Management With UPS
    In the case of internet service or power outage, the power management device automatically restarts your router / firewall / server in an attempt to automatically restore connectivity to your business. This includes a battery backup in the event of total power failure.
  • Site-to-Site VPN
    A "site-to-site VPN" refers to a virtual private network connection that securely links two or more geographically separate networks, like different branch offices of a company, by creating an encrypted tunnel between them, allowing data to be exchanged privately over the public internet; essentially acting as a secure, virtual "private wire" between locations.


True Compliance

  • Governance, Risk and Compliance Center
    We will build and maintain a custom GRC portal to plan, track and document your compliance to standards such as PCI DSS, HIPAA, NIST CSF, System and Organization Controls (SOC), Cyber Insurance, GDPR, CIS V.8, FTC Safeguards, NYDFS. We provide only one standard per purchased compliance agreement.
  • Written Policies
    We will draft, track, disseminate and help you implement all the written policies necessary to satisfy the security controls associated with your compliance goals.
  • Plan Of Action and Milestones (POAM)
    We will identify shortcomings or deficiencies in your compliance program and build a POAM to serve as a project planner to help you forecast spending, assign responsibility, and make informed risk decisions.
  • Network Diagram
    As part of onboarding, we will create a Network Diagram to visually depict the internal network topologies and components down to the host/device level. We will update this network diagram on a yearly basis or when newly managed core infrastructure devices are added or removed.
  • Monthly Audit Log Creation
    Audit logs are generated by many sources, including security software such as antivirus software, firewalls, and intrusion detection and prevention systems; operating systems on servers, workstations, and networking equipment; and applications. Operation Technology Group, TJ’s MCS will create and store the logs required to meet your security and compliance goals.
  • Monthly Audit Log Review
    Operation Technology Group, TJ’s MCS will review the audit logs to ensure the endpoints you are collecting logs from match up with what is in your inventory and configure any new endpoints to generate logs as needed.
  • Monthly Compliance Report
    We will provide a monthly executive summary to identify progress on any ongoing compliance projects, verify the status quo, and update you on any changes that threaten your compliance goals.
  • Vendor Compliance Management
    We will assist in managing security and compliance requirements as requested with your other vendors.
  • Disaster Recovery Plan
    We will assist in creating, reviewing, and updating your Disaster Recovery Plan.
  • Disaster Recovery Testing
    On an annual basis, we will assist you in testing your Disaster Recovery Plan.
  • Data Flow Chart
    Operation Technology Group, TJ’s MCS will identify your critical data, map it, and help you understand who is using it and who is responsible for it. We will provide data flow chart mapping on an annual basis for the purchased compliance standard.
  • Network & Security Assessment Reporting
    Operation Technology Group, TJ’s MCS will scan and assess the security of the managed network components and machines as required.


vCISO

  • Management & Resources

Operation Technology Group, TJ’s MCS will provide a vCISO at a flat fee of $500 per month, which includes all the items below in the vCISO section. Any additional time required or requested for vCISO services outside the scope will be billed at $385 per hour in 30-minute increments. We will provide a proposal for any additional vCISO services to be billed. This gives you the ability to list Operation Technology Group, TJ’s MCS as the certified and qualified CISO for your organization. We also have a custom option for vCISO services.

  • Vulnerability Scanning
    Operation Technology Group, TJ’s MCS will perform internal and external vulnerability assessments of the client environment as required.
  • Penetration Testing
    Operation Technology Group, TJ’s MCS will perform simulated penetration test(s) against the client's managed digital environment as required.
  • Security Vendor Management
    Operation Technology Group, TJ’s MCS will manage security vendor relationships and validate the vendors are maintaining the client required security and compliance standards.
  • Create Written System Security Plan
    Operation Technology Group, TJ’s MCS will create a System Security Plan curated to the client's business driven needs.

    *This requires client involvement and end user interviews must be conducted.

  • Attend Executive Leadership Meeting
    Our vCISO will attend up to 4 scheduled executive leadership meetings per year to provide strategic and business continuity updates. vCISO will provide reports to highlight ROI and IT/Security budget planning.
  • Review And Report IT Security Training Results
    vCISO will review reports and Operation Technology Group, TJ’s MCS will provide results in either the TBRs or the vCISO Executive / Board Meeting.
  • Attend And Update Board Members (if applicable)
    vCISO will attend up to 2 scheduled board member meetings per year to provide strategic and business continuity updates. vCISO will provide reports to highlight ROI and IT/Security budget planning.
  • Review and Report Vulnerability Assessment
    vCISO will review vulnerability assessments to client designated Point of Contact. An executive summary will be provided at meetings.
  • Review and Report Security Analysis
    vCISO will provide status reports on client security posture, changes to standards and regulations, and status of adherence to System Security Plan (SSP).
  • Review and Report Inventory Data Assets
    vCISO will provide an inventory of software in use and data flow analysis if applicable to compliance standards.
  • Review and Report Threat Intelligence Emails
    vCISO will provide reports to the client as threats emerge in their environment.
  • Review and Report Security Deliverables
    vCISO will track and report security metrics as defined by the SSP and validate security aligns with business continuity.


Managed Tablet

  • Tablet Device Management (MDM)
    Mobile Device Management software allows us to automate, control, and secure administrative policies on your employees' business-owned tablets.

    * Requires appropriate Microsoft licensing, Mobile Device Management (MDM), and client defined parameters.

  • Support & Fix Tablet Issues (Remote Only)
    We provide remote support for all business tablets. This does not include repairs to damaged or malfunctioning tablets.


Managed Tablet (Add On / Additional Billing)

  • All The Time VPN for Tablets
    Operation Technology Group, TJ’s MCS provides VPN for your remote users, so they always have secure connections.
  • Application Control
    We can provide Application Control through MDM or InTune.

    * Requires appropriate Microsoft licensing, Mobile Device Management (MDM), and client defined parameters.

Managed Mobile

  • Mobile Device Management (MDM)
    Mobile Device Management software allows us to automate, control, and secure administrative policies on your employees' business-owned mobile devices.

    * Requires appropriate Microsoft licensing, Mobile Device Management (MDM), and client defined parameters.

  • Support & Fix Mobile Issues (Remote Only)
    We provide remote support for all business-owned mobile devices. This does not include repairs to damaged or malfunctioning mobile devices.

Managed Mobile (Add On / Additional Billing)

  • All The Time VPN for Mobile
    Operation Technology Group, TJ’s MCS provides VPN for your remote users, so they always have secure connections.
  • Application Control
    We can provide Application Control through MDM or InTune.

    * Requires appropriate Microsoft licensing, Mobile Device Management (MDM), and client defined parameters.

Additional Notes

  • All information listed above is enforced unless otherwise agreed upon in the Managed Services Addendum
  • For New Clients Only
    The definition of "new client" is someone that has never done business with us or with an entity we have acquired prior to signing this Addendum.
  • We bill labor for any discovery or audit requests related to lawsuits, compliance regulations, and third-party audits.
  • Anything not specifically mentioned above is excluded.