Managed Services Packages Details
Last updated 4.25.2024
Guarantees (For All Managed Services Packages)
- Information
Privacy
We are committed to honoring our clients' preferences regarding the confidentiality of their proprietary business information. In alignment with our privacy policy, we maintain the confidentiality of such information with the same degree of care as we do for our own confidential information, and we do not disclose it to third parties.
- 3rd Party Cybersecurity Audit To Ensure We Remain Secure
Vector Choice engages a third-party Chief Information Security Officer (CISO) firm to conduct ongoing monitoring and assessment of our cybersecurity stance. This measure ensures the implementation of robust security protocols to safeguard the interests of our clientele.
- Make Things Right If We Fall Short
In the event that our initial services do not meet the stipulated requirements, we will promptly address and rectify the issue to ensure compliance and satisfaction.
- Meet Service Level Expectations
We hold our teams to the highest standard and we strive to meet our Service Level Expectation by taking a probabilistic-based approach where we forecast realistic work expectations to the overall fixed time that work items are likely to take in a certain process.
- 100% Satisfaction
Guarantee
Should you find any aspect of our service unsatisfactory, we commit to initiating corrective measures promptly to resolve your concerns in accordance with our service agreement and our service level expectations.
- Try Us Before You
Commit
FOR NEW CLIENTS ONLY*: Irrespective of the addendum duration, the initial three-month period shall operate on a month-to-month basis for all new clients. During this term, a notice period of 60 days is requisite for termination. Subsequent to this initial term, the agreed-upon contract term length will commence.
- Service Phone
Calls Always Answered By A Tech
Our policy guarantees that all telephonic service inquiries via the client support line will be directly received by a technical support representative from 7 a.m. to 6 p.m. Local Time, Monday through Friday, excluding holidays.
https://vectorchoice.com/holidayschedule
Guarantees (For Vigilance Pro Package only)
We guarantee that when you call our client support line (877-827-6787) during regular support hours (Monday through Friday, 7 a.m. to 6 p.m. Local Time), you will never have to leave a voicemail. In the off chance that you do, we will provide you with a $25 credit on your next invoice. If you experience this, please report it to accounting@vectorchoice.com within 30 days with the date and time of the voicemail. (Note: if you choose to leave a voicemail via our automated prompts, this does not apply.)
FOR NEW CLIENTS ONLY*: In the event that the Client is dissatisfied with the services rendered within the initial 30-day period, we will issue a full refund of the onboarding fee and the first month's service fee. Furthermore, we will facilitate the transition to an alternative service provider. Clients wishing to initiate this process should direct their request to owners@vectorchoice.com.
We assure punctual arrival for scheduled onsite services. In the event of an unforeseen delay, we guarantee to provide a minimum of 30 minutes' notice prior to the agreed appointment time.
- We will BUY OUT Your Existing Provider's Contract*
Solely in Vector Choice's discretion, if Vector Choice agrees to buy out the remainder of the contract with your existing provider, we will buyout the contract based on the terms that you have with the existing provider. We will pay the provider the buyout fee and that amount will be prorated based on the initial term period contained in the written contract between you and Vector Choice. The prorated amount will be added to each month's invoice until the contract buyout is paid in full. If at any time the client terminates its contract with Vector Choice prior to the expiration of the initial term, the client must pay the remaining balance of the contract buyout from the previous provider plus any buyout of Vector Choice contract immediately.
Support
We
offer remote support for all monitored business users, computers, servers,
sites, mobile devices, and tablets available during standard Support Hours from
Monday to Friday, 7:00 a.m. to 6:00 p.m. Local Time, excluding holidays. All support
time is billed at $170 per hour in 15-minute increments.
https://vectorchoice.com/holidayschedule
Vigilance Pro Package
We
offer remote support for all managed business users, computers, servers, sites,
mobile devices, and tablets available during standard Support Hours from Monday
to Friday, 7:00 a.m. to 6:00 p.m. Local Time, excluding holidays.
https://vectorchoice.com/holidayschedule
- Onsite Support
Safe
Start Package
During
designated Support Hours, we will provide support for client infrastructure
which includes all managed business users, computers, servers, sites, mobile
devices, and tablets at the client's premises as deemed necessary by Vector
Choice. All support time is billed at $195 per hour, 2-Hour Minimum + Trip Fee.
Support is available from Monday to Friday, 8:00 a.m. to 6:00 p.m. Local Time,
with the exception of designated holidays, which are detailed on Vector Choice's
Holiday Schedule.
https://vectorchoice.com/holidayschedule
Vigilance
Pro Package
During
designated Support Hours, we will provide support for client infrastructure
which includes all managed business users, computers, servers, sites, mobile
devices, and tablets at the client's premises as deemed necessary by Vector
Choice. This includes conducting regularly scheduled maintenance visits.
Support is available from Monday to Friday, 8:00 a.m. to 6:00 p.m. Local Time, with the
exception of designated holidays, which are detailed on Vector Choice's Holiday
Schedule.
https://vectorchoice.com/holidayschedule
- After-Hours & Weekend Support
Safe
Start Package
After
Hours & Weekend Support time is not
part of your managed services addendum but is offered separately and billed at a
remote rate of $70 per 15 minutes and/or onsite is billed at a rate of $275 Per
Hour (with a 4-Hour Minimum) plus a trip fee. After hours is considered 6:01
p.m. to 6:59 a.m. Local Time, with the exception of designated holidays that
are detailed on Vector Choice's Holiday Schedule.
https://vectorchoice.com/holidayschedule
Vigilance
Pro Package
After
Hours & Weekend Support time is not
part of your managed services addendum but is offered separately and billed at a
remote rate of $50 per 15 minutes and/or onsite is billed at a rate of $195 Per
Hour (with a 2-Hour Minimum) plus a trip fee. After hours is considered 6:01
p.m. to 6:59 a.m. Local Time, with the exception of designated holidays that
are detailed on Vector Choice's Holiday Schedule.
https://vectorchoice.com/holidayschedule
Safe
Start Package
Holiday
Support time is not part of
your managed services addendum but is offered separately and billed at a remote
rate of $125 per 15 minutes (with a 2-hour minimum) and/or onsite is billed at
a rate of $390 per hour (with an 8-hour minimum) plus a trip fee. Holiday
support is considered any time during the 24-hour span of the designated
holidays listed on the Vector Choice Holiday Schedule.
https://vectorchoice.com/holidayschedule
Vigilance
Pro Package
Holiday
Support time is not part of your managed services addendum but is
offered separately and billed at a remote rate of $90 per 15 minutes (with a 1-hour
minimum) and/or onsite is billed at a rate of $390 per hour (with a 4-hour minimum)
plus a trip fee. Holiday support is considered any time during the 24-hour span
of the designated holidays listed on the Vector Choice Holiday Schedule.
Safe
Start Package
Emergency
Initial Response Time is 1 Hour or Less from the time the issue is reported via
the Support Phone Number. Emergency Severity Level is described by the whole
company or department not being able to function due to production system
outage.
Vigilance
Pro Package
Emergency
Initial Response Time is 30 Minutes or Less from the time the issue is reported
via the Support Phone Number. Emergency Severity Level is described by the
whole company or department not being able to function due to production system
outage.
- Emergency - Onsite Response Time
Emergency
Onsite Response Time for this package is as available from the time the issue
is determined that onsite support is needed. Our goal is same business day. Emergency
Severity Level is described by the whole company or department not being able to function due to
production system outage and requires an onsite visit to resolve the issue during
normal business hours.
Vigilance
Pro Package
Emergency
Onsite Response Time for this package is as available from the time the issue
is determined that onsite support is needed. Our guarantee is same calendar
day. Emergency Severity Level is described by the whole company or department
not being able to function due to production system outage and requires an
onsite visit to resolve the issue during normal business hours.
What Constitutes As
An Emergency?
An Emergency is
described by the whole company or department not being able to function due to
production system outage.
Data Breach Or Security Incident:
An occurrence that
actually or potentially jeopardizes the confidentiality, integrity, or availability
of an information system or the information the system processes, stores, or
transmits or that constitutes a violation or imminent threat of violation of
security policies, security procedures, or acceptable use policies.
When a core
business application or software system used by the client experiences a
critical failure, rendering it inoperable and affecting business processes.
Network
Infrastructure Failure:
If there's a
significant disruption or failure in the client's network infrastructure,
leading to loss of connectivity, inability to access resources, or
communication breakdown.
Loss Of
Business-Critical Services:
If services or
processes that are crucial for the client's daily operations, such as email,
file sharing, or customer support systems become unavailable.
Hardware Failure:
In the case of a
critical hardware component failure (e.g. server, storage device) that impacts
the client's ability to function properly.
Data Loss:
If the client
experiences significant data loss due to hardware failure or software
corruption, resulting in potential loss of revenue, compliance violations, or
reputational damage.
Severe Performance
Degradation:
When
the client's systems or applications experience severe slowdowns or performance
issues that hinder their ability to deliver services effectively.
- Cybersecurity Event
Safe
Start Package
A Cybersecurity
Event is described as an occurrence that actually or potentially jeopardizes
the confidentiality, integrity, or availability of an information system or the
information the system processes, stores, or transmits or that constitutes a violation or imminent threat of
violation of security policies, security procedures, or acceptable use policies
with evidence of a security breach, unauthorized access, or any form of
cyber-attack that compromises sensitive data, systems, or networks by a third-party
actor, whereas the client's or client employee's negligence allowed the compromise.
We will collect a $5,000 retainer and bill at a rate of $495 per hour per cybersecurity
engineer working on the issue. Once the initial retainer is met, we will bill
for another $5,000 in continuance until the problem is resolved. Vector Choice
will provide / facilitate the first three (3) hours of cyber incident triage
per calendar year at only $495 per hour.
Vigilance
Pro Package
A
Cybersecurity Event is described as evidence of a security breach, unauthorized
access, or any form of cyber-attack that compromises sensitive data, systems,
or networks by a third-party actor, whereas the client's or client employee's negligence
allowed the compromise. We will collect a $5,000 retainer and bill at a rate of
$375 per hour per cybersecurity engineer working on the issue. Once the initial
retainer is met, we will bill for another $5,000 in continuance until the problem
is resolved. Vector Choice will provide / facilitate the first five (5) hours
of cyber incident triage per calendar year at no cost.
- Small Projects
Safe
Start Package
Small
Projects are not included in the Safe Start Package.
Vigilance
Pro Package
If Vector Choice determines a ticket request is a
separate Project (as described in the Client's Addendum), Vector Choice will
obtain the Client's approval before moving forward. As a rule of thumb, we
follow the "3 5's rule" when deciphering what is or isn't a project. If it is
anticipated to take more than five (5) hours, includes more than five (5)
steps, or affects more than five (5) users, it is a Project. The "3 5's rule" excludes onboarding and
structured cabling. All onboarding fees
are due before work can commence. Vector Choice will include three (3) new
computer setups per month at no additional charge for Vigilance Pro managed
services clients. Vigilance Pro Clients will receive 10 free hours per year to
be used toward small projects.
- Block Hours
A
minimum of a $2,000 time block budget is required in the Safe Start Package and
must be pre-paid. We will bill our time against the $2,000 based on the fee structure
of remote, onsite, after hours/weekend, holiday support. Once the time block is
used and dropped under $250, an additional $2,000 time block will be billed. The
time block will expire if not used within 24-months of receiving payment.
Block Hours do not come with the Vigilance Pro
Package, but if interested, please see Account Manager.
- Dedicated Onsite Resource
Safe
Start Package
A
dedicated onsite resource IS NOT
part of the Safe Start package but is an option to purchase separately in
4-hour increments.
Vigilance
Pro Package
A
dedicated onsite resource IS NOT
part of the Vigilance Pro package but is an option to purchase separately in
4-hour increments.
Proactive Account Management (For All Managed Services
Packages)
- Weekly Cybersecurity & Tech Tips
On "Tech Tip Tuesday" we send out Cybersecurity & Tech Tips to all end users for educational and Cybersecurity purposes.
- Payment & Invoice Portal
We provide a convenient and easy-to-use payment portal where we accept credit card and ACH payments.
- Self-Service Portal
We provide a fully functional portal where you can pull reports, review tickets and where we provide custom ticket templates for your convenience.
- Monthly Newsletter
We send out a Vector Choice monthly newsletter to share with you the latest in business, gadgets, and any "In The News" information you need to know about Vector Choice.
- Dark Web Monitoring Report
We send out a Monthly Dark Web Monitoring Report along with notifying you by creating a ticket of any breaches that we find about your company's data on the Dark Web.
- Monthly Quality Assurance Touchbase Email
Your Account Manager will reach out to you via email or phone call monthly to see if you need any assistance from us and to make sure all is well in our partnership.
- Custom Employee Onboarding / Offboarding Form
Inside our self-service portal, at client's request, we will provide you with the ability to create customized onboarding and offboarding forms for your users and computers. Our team will work with you to help set those up.
Proactive Account Management (For Vigilance Pro
Package only)
- Strategic Business Reviews
Vector Choice Account Manager will collaborate with client's key stakeholders on a regular basis to develop an IT strategy in alignment with the short- and long-term objectives of the client's organization. A detailed roadmap and predictable budget will be provided to ensure major projects and expenses are planned for well in advance.
- Monthly Executive Summary Report
We provide a report of the health of your network along with ticket trends and SLE reporting.
- Dedicated Account Manager
Your Account Manager will be your key point of contact at Vector Choice and a key advocate for making sure the services that you've purchased from Vector Choice are delivered at the highest level of standard.
We provide a dashboard to see real-time ticket statuses, SLE reports, survey scores, and much more.
User Management (For All Managed Services Packages)
- User Management
Provide troubleshooting and support for managed user related issues, including access permissions and group memberships.
As part of a layered security approach, robust spam / malware filtering services are included to help protect you from email threats.
- Access
Permissions Violation Monitoring
Access controls and User Behavior Analytics (UBA) will be implemented to monitor and alert for failed logins, unapproved region-based logins, and logins outside of the users learned working habits.
*Requires appropriate Microsoft licensing and client defined parameters.
Email monitoring and device scanning will be used to detect client defined sensitive data controls.
*Covered data types include: Personally Identifiable Information (PII), Payment Card Information (PCI), Protected Health Information (PHI), Non-Public Information (NPI)
**Requires appropriate Microsoft licensing and client defined parameters.
- M365 Suspected
Attacks Monitoring
Managed M365 accounts will be monitored for known and suspected threat actor attacks.
*Requires appropriate Microsoft licensing and client defined parameters.
- Mass Data
Deletion / Download Monitoring
Managed cloud connected accounts will be monitored for mass data deletion and downloading indicative of insider threats and threat actor access.
*Requires appropriate Microsoft licensing and client defined parameters.
- M365 User Account
Monitoring
M365 Defense provides around-the-clock M365 security monitoring and policy enforcement. With M365 Defense, cyber analysts will monitor and harden your M365 environment and user accounts.
*Requires appropriate Microsoft licensing and client defined parameters.
- White and
Blacklist in Spam Filter
We can allow or disallow certain mail flow based on different categories / preferences.
- Password Manager
A password manager is used to store passwords in a central location and protect them with encryption. This simplifies password management by eliminating the need to memorize multiple passwords for different accounts.
- 2FA / MFA
Multi-factor authentication provides an additional layer of security when logging into supported systems. It's the concept of something you know (password) plus something you have (phone).
- M365 Or Google
Workspace Support And License Management
We facilitate the purchase and maintenance of licenses for M365 and Google Workspace. We provide support and troubleshooting for managed M365 and Google Workspace accounts. No development is included in support of these products.
User Management (For Vigilance Pro Package only)
- User Training
We provide your company with live virtual training for your users when it comes to your technology needs. We will provide up to 1 hour of training per company per quarter.
- M365 or Google
Workspace Backup
Provide industry leading 256-bit encryption at rest and 128-bit in transit. Provide multiple snapshots at regular intervals throughout the day. This ensures that the backups keep up with your demands and provide you with peace of mind.
- Phishing
Simulation
Best-in-class, fully automated simulated phishing attacks, thousands of templates with unlimited usage, and community phishing templates.
- On-Demand
Training
We provide access to Award-Winning eLearning Courses for Microsoft Products along with cyber security awareness training sessions available with certificate of completion. This is a self-paced training course for your employees.
- Data Loss
Prevention
Vector Choice will build policies to control who and what devices can access managed M365 infrastructure and data. *Requires appropriate Microsoft licensing, Mobile Device Management (MDM), and client defined parameters.
- New User Setup
We provide up to 3 new user and/or computer setups per month included in this Vigilance Pro package. Any additional users and/or computers will be billed at a flat fee of $375.
Computer Management (For All Managed Services
Packages)
- Endpoint
Protection
An end-to-end approach to cybersecurity deeply rooted in artificial intelligence (AI) and machine learning (ML). Helps detect and prevent attacks from malware.
- Application
Control
A powerful tool that allows us to permit, deny or restrict applications from running on your devices. A gold standard when it comes to blocking ransomware, viruses, and other software-based threats.
- 24 / 7 / 365 Device
Management And Alerting
We provide 24/7/365 Management and Alerting for all supported devices under this addendum.
- Scheduled
Preventative Maintenance
We provide scheduled maintenance for all supported computers under this addendum.
- Patch Management
- Microsoft
Our Network Operations Center team identifies, approves, and automates installation of necessary security patches. The installation is scheduled for pre-determined times to ensure security vulnerabilities are minimized.
*Additional patch management may be supported as requested by client and approved by Vector Choice.
- Automatic
Escalation And Resolution Of Alerts
Our remote monitoring and management system provides the ability for us to escalate alerts to the appropriate engineers for resolution.
- Service Auto-Healing
We have the ability to create auto-healing functions in our system if we find there are reoccurring issues that we can solve through automation.
- Firmware Updates
We provide firmware updates for all managed computers.
Computer Management (For Vigilance Pro Package only)
- M365 / Azure /
InTune Support
We will provide support and changes to the Azure and InTune environment to optimize best performance and security. We will also manage the appropriate licenses when it pertains to Azure and InTune with the guidance of the client.
*Requires appropriate Microsoft licensing, Mobile Device Management (MDM), and client defined parameters.
- Support & Fix
Computer Issues
Vector Choice will provide computer break fix and managed software troubleshooting. Unmanaged software will receive best effort support or act as technical liaison with product support.
*Remote support will be performed unless the technician determines onsite repair is necessary.
- Computer
Encryption Management
Vector Choice will manage computer encryption on managed devices that support encryption.
- Ring-Fencing
Vector Choice will manage and maintain controls to limit computer system services, processes, and drivers to only their intended functions adding a layer of security against malware, ransomware, and threat actor exploitation.
- Custom Alerts
We provide the ability to setup custom alerts for service and applications as requested by client.
- Data Loss
Prevention
Vector Choice will build policies to control who and what devices can access managed M365 infrastructure and data.
*Requires appropriate Microsoft licensing, Mobile Device Management (MDM), and client defined parameters.
- Cyber Attack
Remediation
Vector Choice will provide or facilitate the first five (5) hours of cyber incident triage per calendar year. Cyber Attack/Hack due to client's or client employee's negligence are not covered.
*Incident Response (IR) is billed hourly beyond the included hours at a rate of $375/hour per security engineer required.
- Automated
Software Deployment
Vector Choice will deploy managed software automatically on all managed devices.
*Vector Choice can help deploy unmanaged software at scale for an additional cost or block of hours.
- Provision
Computer
*Labor Only; All Hardware and Software Costs Will Be Additional
Vector Choice will configure managed computers to match the clients approved desired state for new hires. These devices will be required to meet the Vector Choice minimum baseline requirements (i.e. Hardware, system specifications [CPU, RAM, storage space, etc. and current operating system). We provide up to 3 computer setups per month included in this package. Any additional computers will be billed at a flat fee of $375 per new computer setup.
- Installation Of
New Software
Labor Only; All Hardware and Software Costs Will Be Additional. Vector Choice will provide managed software troubleshooting and support. Unmanaged software will receive best effort support or act as technical liaison with product support.
- Web Gateway / Content
Filtering Security
We will build and maintain web content filters based on client defined website categories.
Computer
Management (Add On / Additional Billing)
- SIEM
SIEM logs nearly every bit of under-the-hood activity on a computer, network access, security changes, permissions changes, etc. Those behaviors are then used to trigger alerts when an unusual or potentially malicious string of behaviors is detected. SIEMs also provide Vector Choice with a means of tracing a security incident back to its source which is traditionally a blind spot for IT professionals. 30-Day Retention is included, additional retention available for purchase by request.
- MDR / SOC
A team of cyber security experts actively identifying and remediating security threats. Takes in huge amounts of security / behavioral data from PCs and servers to identify suspicious patterns or actions. These behaviors are then reviewed by our security professionals. Another team of "threat hunters" are proactively looking for signs of compromise.
- All The Time VPN
For Computers
Vector Choice provides VPN for your remote users, so they always have secure connections.
Backup & Recovery - Computer
- Computer File
Backup
Vector Choice will provide a file level backup of the following file extensions up to 250G of storage, with a retention of 30 days.
- Additional Storage
For Computer File Backup
Additional storage is available for purchase at increments of 50G.
- Image-Based
Backup
If you would like for us to backup your entire computer with bare metal backup, it is available for purchase.
Backup & Recovery - Server
- Server Data Backup
Vector Choice will provide 1TB of server data backup per managed server with a retention of 90-days. Any additional storage or retention is available for purchase.
*Client compliance requirements may dictate the length of data retention where applicable.
Backup & Recovery - Disaster Recovery Backup
- BDR Backup
Vector Choice will provide leased Backup and Disaster Recovery appliances housed at the client owned office location to perform a bare metal backup and ongoing file and folder level backup of the managed servers.
*All BDR services are custom quoted based on the needs. It is not included in any of our packages by default.
Server Management (For All Managed Services Packages)
- Endpoint
Protection
An end-to-end approach to cybersecurity deeply rooted in artificial intelligence (AI) and machine learning (ML). Helps detect and prevent attacks from malware.
- 24 / 7 / 365 Server
Management And Alerting
We provide 24 / 7 / 365 Management and Alerting for all supported devices under this addendum.
- Scheduled
Preventative Maintenance
We provide scheduled maintenance for all supported servers under this addendum.
- Patch Management
- Microsoft
Our Network Operations Center team identifies, approves, and automates installation of necessary security patches. The installation is scheduled for pre-determined times to ensure security vulnerabilities are minimized.
*Additional patch management may be supported as requested by client and approved by Vector Choice.
- Automatic
Escalation And Resolution Of Alerts
Our remote monitoring and management system provides the ability for us to escalate alerts to the appropriate engineers for resolution.
- Firmware Updates
We provide firmware updates for all managed servers.
- Application
Control
A powerful tool that allows us to permit, deny or restrict applications from running on your devices. A gold standard when it comes to blocking ransomware, viruses, and other software-based threats.
- Service Auto-Healing
We have the ability to create auto-healing functions in our system if we find there are reoccurring issues that we can solve through automation.
Server Management
(For Vigilance Pro Package only)
- M365 / Azure /
InTune Support
We will provide support and changes to the Azure and InTune environment to optimize best performance and security. We will also manage the appropriate licenses when it pertains to Azure and InTune with the guidance of the client.
*Requires appropriate Microsoft licensing, Mobile Device Management (MDM), and client defined parameters.
- Server Disk Encryption
Management
Vector Choice will enable and maintain server disk encryption on managed servers.
- Ring-Fencing
Vector Choice will manage and maintain controls to limit server services, processes, and drivers to only their intended functions adding a layer of security against malware, ransomware, and threat actor exploitation.
- Remote Support
& Fix - Server Issues
Vector Choice will provide server break fix and managed software troubleshooting. Unmanaged software will receive best effort support or act as technical liaison with product support.
*Remote support will be performed unless the technician determines onsite repair is necessary.
- Custom Alerts
We provide the ability to setup custom alerts for service and applications as needed.
- Data Loss
Prevention
Vector Choice will build policies to control who and what devices can access managed M365 infrastructure and data.
* Requires appropriate Microsoft licensing, Mobile Device Management (MDM), and client defined parameters.
- Cyber Attack
Remediation
Vector Choice will provide or facilitate the first five (5) hours of cyber incident triage per calendar year. Cyber Attack/Hack due to client's or client employee's negligence are not covered.
*Incident Response (IR) is billed hourly beyond the included hours at a rate of $375/hour per security engineer required.
- Automated
Software Deployment
Vector Choice will deploy managed software automatically on all managed devices.
*Vector Choice can help deploy unmanaged software at scale for an additional cost or block of hours.
- Onsite Support
& Fix - Server Issues
Vector Choice will provide server break/fix and troubleshooting. End-of-Life hardware will receive best effort support or Vector Choice will facilitate vendor support on the client's behalf.
*Remote support will be performed unless the technician determines onsite repair is necessary.
- 24 / 7 / 365
Backup Monitoring, Alert Management
Vector Choice will manage, monitor, troubleshoot and remediate alerts of backup related issues on managed servers.
*Client compliance requirements will dictate the length of data retention where applicable or a rolling 90 days based on agreement package.
**Compliance as a Service clients will get additional backup restore testing, validation, and reporting.
- Web Gateway / Content
Filtering Security
We will build and maintain web content filters based on client defined website categories.
Server Management
(Add On / Additional Billing)
- SIEM
SIEM logs nearly every bit of under-the-hood activity on a server, network access, security changes, permissions changes, etc. Those behaviors are then used to trigger alerts when an unusual or potentially malicious string of behaviors is detected. SIEMs also provide Vector Choice with a means of tracing a security incident back to its source which is traditionally a blind spot for IT professionals. 30-Day Retention is included, additional retention available for purchase by request.
**Compliance as a Service clients will get additional log retention.
- MDR / SOC
A team of cyber security experts actively identifying and remediating security threats. Takes in huge amounts of security / behavioral data from servers to identify suspicious patterns or actions. These behaviors are then reviewed by our security professionals. Another team of "threat hunters" are proactively looking for signs of compromise.
Site Management
- Dark Web
Monitoring
A combination of human and machine intelligence with powerful search capabilities to scour the dark web to identify, analyze and actively monitor for your organization's compromised credentials 24 / 7 / 365, alerting you to potential trouble, fast.
- Power Management
In the case of internet service or power outage, the power management device automatically restarts your router / firewall / server in an attempt to automatically restore connectivity to your business. - Network
Monitoring and Alerting for All Network Devices and Peripherals
Visibility into Network Traffic flow, helping to identify issues or inconsistencies causing slow-downs or interruptions in your network infrastructure.
- Network Management
Vector Choice will provide network management and support for all office infrastructure equipment. End-of-Life hardware will receive best effort support or Vector Choice will facilitate vendor support on the client's behalf.
*Remote support will be performed unless the technician determines onsite repair is necessary.
Site Management
(Add On / Additional Billing)
- Firewall With IDS
/ IPS as-a-Service
We will provide a firewall equipped with IDS and IPS. Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) are security features found in industry leading firewalls. They monitor the events occurring in your network and analyzing them for signs of possible incidents or threats.
- Power Management
With UPS
In the case of internet service or power outage, the power management device automatically restarts your router / firewall / server in an attempt to automatically restore connectivity to your business. This includes a battery backup in the event of total power failure.
True Compliance
- Governance, Risk
and Compliance Center
We will build and maintain a custom GRC portal to plan, track and document your compliance to standards such as PCI DSS, HIPAA, NIST CSF, System and Organization Controls (SOC), Cyber Insurance, GDPR, CIS V.8, FTC Safeguards, NYDFS. We provide only one standard per purchased compliance agreement.
- Written Policies
We will draft, track, disseminate and help you implement all the written policies necessary to satisfy the security controls associated with your compliance goals.
- Plan Of Action And
Milestones (POAM)
We will identify shortcomings or deficiencies in your compliance program and build a POAM to serve as a project planner to help you forecast spend, assign responsibility, and make informed risk decisions.
- Network Diagram
As part of onboarding, we will create a Network Diagram to visually depict the internal network topologies and components down to the host/device level. We will update this network diagram on a yearly basis or when newly managed core infrastructure devices are added or removed.
- Monthly Audit Log
Creation
Audit logs are generated by many sources, including security software such as antivirus software, firewalls, and intrusion detection and prevention systems; operating systems on servers, workstations, and networking equipment; and applications. Vector Choice will create and store the logs required to meet your security and compliance goals.
- Monthly Audit Log
Review
Vector Choice will review the audit logs to ensure the endpoints you are collecting logs from match up with what is in your inventory and configure any new endpoints to generate logs as needed.
- Monthly
Compliance Report
We will provide a monthly executive summary to identify progress on any ongoing compliance projects, verify the status quo, and update you on any changes that threaten your compliance goals.
- Vendor Compliance
Management
We will assist in managing security and compliance requirements as requested with your other vendors.
- Disaster Recovery
Plan
We will assist in creating, reviewing, and updating your Disaster Recovery Plan.
- Disaster Recovery
Testing
On an annual basis, we will assist you in testing your Disaster Recovery Plan.
- Data Flow Chart
Vector Choice will identify your critical data, map it, and help you understand who is using it and who is responsible for it. We will provide data flow chart mapping on an annual basis for the purchased compliance standard.
- Network &
Security Assessment Reporting
Vector Choice will scan and assess the security of the managed network components and machines as required.
vCISO
Management & Resources
Vector Choice will provide a vCISO at a flat fee of $500 per month, which includes all the items below in the vCISO section. Any additional time required or requested for vCISO services outside the scope will be billed at $385 per hour in 30-minute increments. We will provide a proposal for any additional vCISO services to be billed. This gives you the ability to list Vector Choice as the certified and qualified CISO for your organization. We also have a custom option for vCISO services.
- Vulnerability
Scanning
Vector Choice will perform internal and external vulnerability assessments of the client environment as required.
- Penetration
Testing
Vector Choice will perform simulated penetration test(s) against the client's managed digital environment as required.
- Security Vendor
Management
Vector Choice will manage security vendor relationships and validate the vendors are maintaining the client required security and compliance standards.
- Create Written
System Security Plan
Vector Choice will create a System Security Plan curated to the client's business driven needs.
*This requires client involvement and end user interviews must be conducted.
- Attend Executive
Leadership Meeting
Our vCISO will attend up to 4 scheduled executive leadership meetings per year to provide strategic and business continuity updates. vCISO will provide reports to highlight ROI and IT/Security budget planning.
- Review And Report
IT Security Training Results
vCISO will review reports and Vector Choice will provide results in either the TBRs or the vCISO Executive / Board Meeting.
- Attend And Update
Board Members (if applicable)
vCISO will attend up to 2 scheduled board member meetings per year to provide strategic and business continuity updates. vCISO will provide reports to highlight ROI and IT/Security budget planning.
- Review and Report
Vulnerability Assessment
vCISO will review vulnerability assessments to client designated Point of Contact. Executive summary will be provided at meetings.
- Review and Report
Security Analysis
vCISO will provide status reports on client security posture, changes to standards and regulations, and status of adherence to System Security Plan (SSP).
- Review and Report
Inventory Data Assets
vCISO will provide an inventory of software in use and data flow analysis if applicable to compliance standards.
- Review and Report
Threat Intelligence Emails
vCISO will provide reports to the client as threats emerge in their environment.
- Review and Report
Security Deliverables
vCISO will track and report security metrics as defined by the SSP and validate security aligns with business continuity.
Managed Tablet
- Tablet Device Management
(MDM)
Mobile Device Management software allows us to automate, control, and secure administrative policies on your employees' business-owned tablets.
* Requires appropriate Microsoft licensing, Mobile Device Management (MDM), and client defined parameters.
- Support & Fix
Tablet Issues (Remote Only)
We provide remote support for all business tablets. This does not include repairs to damaged or malfunctioning tablets.
Managed Tablet
(Add On / Additional Billing)
- All The Time VPN
For Tablets
Vector Choice provides VPN for your remote users, so they always have secure connections.
We can provide Application Control through MDM or InTune.
* Requires appropriate Microsoft licensing, Mobile Device Management (MDM), and client defined parameters.
Managed Mobile
- Mobile Device
Management (MDM)
Mobile Device Management software allows us to automate, control, and secure administrative policies on your employees' business-owned mobile devices.
* Requires appropriate Microsoft licensing, Mobile Device Management (MDM), and client defined parameters.
- Support & Fix
Mobile Issues (Remote Only)
We provide remote support for all business-owned mobile devices. This does not include repairs to damaged or malfunctioning mobile devices.
Managed Mobile
(Add On / Additional Billing)
- All The Time VPN
For Mobile
Vector Choice provides VPN for your remote users, so they always have secure connections.
- Application
Control
We can provide Application Control through MDM or InTune.
* Requires appropriate Microsoft licensing, Mobile Device Management (MDM), and client defined parameters.
Additional Notes
- All information listed above is enforced unless otherwise agreed upon in the Managed Services Addendum
- For New Clients
Only
The definition of "new client" is someone that has never done business with us or with an entity we have acquired prior to signing this Addendum.
- We bill labor for
any discovery or audit requests related to lawsuits, compliance regulations, and
third-party audits.
- Anything not specifically mentioned above is excluded.