Managed Services Packages Details 2025
Last Updated 3.11.2025
Guarantees (For All Managed Services Packages)
- Information
Privacy
We are committed to honoring our clients' preferences regarding the confidentiality of their proprietary business information. In alignment with our privacy policy, we maintain the confidentiality of such information with the same degree of care as we do for our own confidential information, and we do not disclose it to third parties. - 3rd Party Cybersecurity Audit To Ensure We
Remain Secure
Vector Choice engages a third-party Chief Information Security Officer (CISO) firm to conduct ongoing monitoring and assessment of our cybersecurity stance. This measure ensures the implementation of robust security protocols to safeguard the interests of our clientele. - Make Things Right If We Fall Short
In the event that our initial services do not meet the stipulated requirements, we will promptly address and rectify the issue to ensure compliance and satisfaction.
Guarantees (For Fundamental, Vigilance Pro, and Compliance Pro Packages)
- Meet Service Level Expectations
We hold our teams to the highest standard and we strive to meet our Service Level Expectation by taking a probabilistic-based approach where we forecast realistic work expectations to the overall fixed time that work items are likely to take in a certain process. - 100% Satisfaction
Guarantee
Should you find any aspect of our service unsatisfactory, we commit to initiating corrective measures promptly to resolve your concerns in accordance with our service agreement and our service level expectations. If at any time you're not 100% satisfied, please reach out to concerns@vectorchoice.com. - Service Phone
Calls Always Answered By A Tech
Our policy guarantees that all telephonic service inquiries via the client support line will be directly received by a technical support representative from 7 a.m. to 6 p.m. Local Time, Monday through Friday, excluding holidays.
https://vectorchoice.com/holidayschedule
Guarantees (For Vigilance Pro and Compliance Pro Packages)
- Try Us Before You
Commit*
FOR NEW CLIENTS ONLY*: Irrespective of the addendum duration, the initial three-month period shall operate on a month-to-month basis for all new clients. During this term, a notice period of 30 days is requisite for termination. Subsequent to this initial term, the agreed-upon contract term length will then commence. - Never Leave A
Service Voicemail
We guarantee that when you call our client support line (877-827-6787) during regular support hours (Monday through Friday, 7 a.m. to 6 p.m. Local Time), you will never have to leave a voicemail. In the off chance that you do, we will provide you with a $25 credit on your next invoice.
If you experience this, please report it to concerns@vectorchoice.com within 30 days with the date and time of the voicemail. (Note: if you choose to leave a voicemail via our automated prompts, this does not apply.) - 30-Day Money-Back
Guarantee*
FOR NEW CLIENTS ONLY*: In the event that the Client is dissatisfied with the services rendered within the initial 30-day period, we will issue a full refund of the onboarding fee and the first month's service fee. Furthermore, we will facilitate the transition to an alternative service provider. Clients wishing to initiate this process should direct their request to concerns@vectorchoice.com.
Guarantees (For Vigilance Pro Package Only)
- Onsite, On-Time Guarantee
We assure punctual arrival for scheduled onsite services. In the event of an unforeseen delay, we guarantee to provide a minimum of 30 minutes' notice prior to the agreed appointment time.
- We Will BUY OUT Your Existing Provider's Contract*
FOR NEW CLIENTS ONLY*: Solely in Vector Choice's discretion, if Vector Choice agrees to buy out the remainder of the contract with your existing provider, we will buy out the contract based on the terms that you have with the existing provider. We will pay the provider the buyout fee and that amount will be prorated based on the initial term period contained in the written contract between you and Vector Choice. The prorated amount will be added to each month's invoice until the contract buyout is paid in full. If at any time the client terminates its contract with Vector Choice prior to the expiration of the initial term, the client must pay the remaining balance of the contract buyout from the previous provider plus any buyout of Vector Choice contract immediately.
Support
- Remote Support
Safe Start Package
We offer remote support for all monitored business users, computers, servers, sites, mobile devices, and tablets available during standard Support Hours from Monday to Friday, 7:00 a.m. to 6:00 p.m. Local Time, excluding holidays. All support time is billed at $170 per hour in 15-minute increments.
https://vectorchoice.com/holidayschedule
Fundamental, Vigilance Pro, and Compliance Pro Packages
We offer remote support for all managed business users, computers, servers, sites, mobile devices, and tablets available during standard Support Hours from Monday to Friday, 7:00 a.m. to 6:00 p.m. Local Time, excluding holidays.
https://vectorchoice.com/holidayschedule - Onsite Support
Safe Start Package
During designated Support Hours, we will provide support for client infrastructure which includes all managed business users, computers, servers, sites, mobile devices, and tablets at the client's premises as deemed necessary by Vector Choice. All support time is billed at $195 per hour, 2-Hour Minimum + Trip Fee. Support is available from Monday to Friday, 8:00 a.m. to 6:00 p.m. Local Time, with the exception of designated holidays, which are detailed on Vector Choice's Holiday Schedule. https://vectorchoice.com/holidayschedule
Fundamental Package
During designated Support Hours, we will provide support for client infrastructure which includes all managed business users, computers, servers, sites, mobile devices, and tablets at the client's premises as deemed necessary by Vector Choice. All support time is billed at $195 per hour, 1-Hour Minimum + Trip Fee. Support is available from Monday to Friday, 8:00 a.m. to 6:00 p.m. Local Time, with the exception of designated holidays, which are detailed on Vector Choice's Holiday Schedule. https://vectorchoice.com/holidayschedule
Vigilance Pro Package
During designated Support Hours, we will provide support for client infrastructure which includes all managed business users, computers, servers, sites, mobile devices, and tablets at the client's premises as deemed necessary by Vector Choice. This includes conducting regularly scheduled maintenance visits. Support is available from Monday to Friday, 8:00 a.m. to 6:00 p.m. Local Time, with the exception of designated holidays, which are detailed on Vector Choice's Holiday Schedule. https://vectorchoice.com/holidayschedule
Compliance Pro Package
During designated Support Hours, we will provide support for client infrastructure which includes all managed business users, computers, servers, sites, mobile devices, and tablets at the client's premises as deemed necessary by Vector Choice. All support time is billed at $195 per hour, 1-Hour Minimum + Trip Fee. Support is available from Monday to Friday, 8:00 a.m. to 6:00 p.m. Local Time, with the exception of designated holidays, which are detailed on Vector Choice's Holiday Schedule. https://vectorchoice.com/holidayschedule - After-Hours &
Weekend Support
Safe Start Package
After Hours & Weekend Support time is not part of your managed services addendum but is offered separately and billed at a remote rate of $70 per 15 minutes and/or onsite is billed at a rate of $275 Per Hour (with a 4-Hour Minimum) plus a trip fee. After hours is considered 6:01 p.m. to 6:59 a.m. Local Time, with the exception of designated holidays that are detailed on Vector Choice's Holiday Schedule.
https://vectorchoice.com/holidayschedule
Fundamental, Vigilance Pro, and Compliance Pro Packages
After Hours & Weekend Support time is not part of your managed services addendum but is offered separately and billed at a remote rate of $50 per 15 minutes and/or onsite is billed at a rate of $195 Per Hour (with a 2-Hour Minimum) plus a trip fee. After hours is considered 6:01 p.m. to 6:59 a.m. Local Time, with the exception of designated holidays that are detailed on Vector Choice's Holiday Schedule.
https://vectorchoice.com/holidayschedule - Holiday Support
Safe Start Package
Holiday Support time is not part of your managed services addendum but is offered separately and billed at a remote rate of $125 per 15 minutes (with a 2-hour minimum) and/or onsite is billed at a rate of $390 per hour (with an 8-hour minimum) plus a trip fee. Holiday support is considered any time during the 24-hour span of the designated holidays listed on the Vector Choice Holiday Schedule found at https://vectorchoice.com/holidayschedule
Fundamental, Vigilance Pro, and Compliance Pro Packages
Holiday Support time is not part of your managed services addendum but is offered separately and billed at a remote rate of $90 per 15 minutes (with a 1-hour minimum) and/or onsite is billed at a rate of $390 per hour (with a 4-hour minimum) plus a trip fee. Holiday support is considered any time during the 24-hour span of the designated holidays listed on the Vector Choice Holiday Schedule found at https://vectorchoice.com/holidayschedule - Emergency -
Remote Response Time
Safe Start Package
Emergency Initial Response Time is 1 Hour or Less from the time the issue is reported via the Support Phone Number. Emergency Severity Level is described by the whole company or department not being able to function due to production system outage.
Fundamental and Vigilance Pro Packages
Emergency Initial Response Time is 30 Minutes or Less from the time the issue is reported via the Support Phone Number. Emergency Severity Level is described by the whole company or department not being able to function due to production system outage.
Compliance Pro Package
Emergency Initial Response Time is 15 Minutes or Less from the time the issue is reported via the Support Phone Number. Emergency Severity Level is described by the whole company or department not being able to function due to production system outage. - Emergency -
Onsite Response Time
Safe Start Package
Emergency Onsite Response Time for this package is as available from the time the issue is determined that onsite support is needed. Our goal is same business day. Emergency Severity Level is described by the whole company or department not being able to function due to production system outage and requires an onsite visit to resolve the issue during normal business hours.
Fundamental and Compliance Pro Packages
Emergency Onsite Response Time for this package is next business day from the time the issue is determined that onsite support is needed. Our goal is same calendar day. Emergency Severity Level is described by the whole company or department not being able to function due to production system outage and requires an onsite visit to resolve the issue during normal business hours.
Vigilance Pro Package
Emergency Onsite Response Time for this package is as available from the time the issue is determined that onsite support is needed. Our guarantee is same calendar day. Emergency Severity Level is described by the whole company or department not being able to function due to production system outage and requires an onsite visit to resolve the issue during normal business hours.
What Constitutes As An Emergency?
An Emergency is described by the whole company or department not being able to function due to production system outage.
Data Breach Or Security Incident:
An occurrence that actually or potentially jeopardizes the confidentiality, integrity, or availability of an information system or the information the system processes, stores, or transmits or that constitutes a violation or imminent threat of violation of security policies, security procedures, or acceptable use policies.
Major Software Failure:
When a core business application or software system used by the client experiences a critical failure, rendering it inoperable and affecting business processes.
Network Infrastructure Failure:
If there's a significant disruption or failure in the client's network infrastructure, leading to loss of connectivity, inability to access resources, or communication breakdown.
Loss Of Business-Critical Services:
If services or processes that are crucial for the client's daily operations, such as email, file sharing, or customer support systems become unavailable.
Hardware Failure:
In the case of a critical hardware component failure (e.g. server, storage device) that impacts the client's ability to function properly.
Data Loss:
If the client experiences significant data loss due to hardware failure or software corruption, resulting in potential loss of revenue, compliance violations, or reputational damage.
Severe Performance Degradation:
When the client's systems or applications experience severe slowdowns or performance issues that hinder their ability to deliver services effectively. - Cybersecurity
Event
Safe Start and Fundamental Packages
A Cybersecurity Event is described as an occurrence that actually or potentially jeopardizes the confidentiality, integrity, or availability of an information system or the information the system processes, stores, or transmits or that constitutes a violation or imminent threat of violation of security policies, security procedures, or acceptable use policies with evidence of a security breach, unauthorized access, or any form of cyber-attack that compromises sensitive data, systems, or networks by a third-party actor, whereas the client's or client employee's negligence allowed the compromise. We will collect a $5,000 retainer and bill at a rate of $500 per hour for two cybersecurity engineers working on the issue. Once the initial retainer is met, we will bill for another $5,000 in continuance until the problem is resolved. Vector Choice will provide / facilitate the first three (3) hours of cyber incident triage per calendar year at only $250 per hour, without the requirement of a retainer.
Vigilance Pro and Compliance Pro Packages
A Cybersecurity Event is described as evidence of a security breach, unauthorized access, or any form of cyber-attack that compromises sensitive data, systems, or networks by a third-party actor, whereas the client's or client employee's negligence allowed the compromise. We will collect a $5,000 retainer and bill at a rate of $350 per hour for two cybersecurity engineers working on the issue. Once the initial retainer is met, we will bill for another $5,000 in continuance until the problem is resolved. Vector Choice will provide / facilitate the first five (5) hours of cyber incident triage per calendar year at no cost and without the requirement of a retainer. - Small Projects
Safe Start and Fundamental Packages
Small Projects are not included in the Safe Start or Fundamental Packages.
Vigilance Pro and Compliance Pro Packages
If Vector Choice determines a ticket request is a separate Project (as described in the Client's Addendum), Vector Choice will obtain the Client's approval before moving forward. As a rule of thumb, we follow the "3 5's rule" when deciphering what is or isn't a project. If it is anticipated to take more than five (5) hours, include more than five (5) steps, or affect more than five (5) users, it is a Project. The "3 5's rule" excludes onboarding and structured cabling. All onboarding fees are due before work can commence. Vector Choice will include three (3) new computer setups per month at no additional charge for Vigilance Pro and Compliance Pro Managed Services Clients. These Clients will receive 10 free hours per year to be used toward small projects. - Support Hours
Bundle
Safe Start Package
A minimum of a $2,000 time block budget is required in the Safe Start Package and must be pre-paid. We will bill our time against the $2,000 based on the fee structure of remote, onsite, after hours/weekend, holiday support. Once the time block is used and dropped under $250, an additional $2,000 time block will be billed. The time block will expire if not used within 24-months of receiving payment.
https://vectorchoice.com/ratecard
Fundamentals, Vigilance Pro and Compliance Packages
Block Hours do not come with the Fundamentals, Vigilance Pro, or Compliance Pro Packages, but if interested, please see Account Manager. - Dedicated Onsite Resource
All Managed Services Packages
A dedicated onsite resource IS NOT part of the Managed Services packages but it is an option to purchase separately in 4-hour increments.
Proactive Account Management (For All Managed Services Packages)
- Strategic Business Reviews
Vector Choice Account Manager will collaborate with client's key stakeholders on a regular basis to develop an IT strategy in alignment with the short- and long-term objectives of the client's organization. A detailed roadmap and predictable budget will be provided to ensure major projects and expenses are planned for well in advance. - Weekly Cybersecurity & Tech Tips
On "Tech Tip Tuesday" we send out Cybersecurity & Tech Tips to all end users for educational and Cybersecurity purposes. - Payment & Invoice Portal
We provide a convenient and easy-to-use payment portal where we accept credit card and ACH payments. - Self-Service Portal
We provide a fully functional portal where you can pull reports, review tickets and where we provide custom ticket templates for your convenience. - Monthly Newsletter
We send out a Vector Choice monthly newsletter to share with you the latest in business, gadgets, and any "In The News" information you need to know about Vector Choice.
- Custom Employee Onboarding / Offboarding Form
Inside our self-service portal, at client's request, we will provide you with the ability to create customized onboarding and offboarding forms for your users and computers. Our team will work with you to help set those up. - Dark Web Monitoring Report
We provide a Dark Web Monitoring Report during our Strategic Business Reviews, along with notifying you by creating a ticket of any breaches that we find about your company's data on the Dark Web.
Proactive Account Management (For Vigilance Pro and
Compliance Pro Packages)
- Monthly Quality Assurance Touchbase Email
Your Account Manager will reach out to you via email or phone call monthly to see if you need any assistance from us and to make sure all is well in our partnership. - Monthly Executive Summary Report
We provide a report of the health of your network along with ticket trends and SLE reporting. - Dedicated Account Manager
Your Account Manager will be your key point of contact at Vector Choice and a key advocate for making sure the services that you've purchased from Vector Choice are delivered at the highest level of standard. - Real-Time Dashboard
We provide a dashboard to see real-time ticket statuses, SLE reports, survey scores, and much more.
Proactive Account Management (For Compliance Pro
Package only)
- Quarterly Meeting With Compliance Expert
Our Security and Compliance Expert will meet with you on a quarterly basis to review any and all security and compliance concerns.
- Email Spam
Filtering
As part of a layered security approach, robust spam / malware filtering services are included to help protect you from email threats. - White and
Blacklist in Spam Filter
We can allow or disallow certain mail flow based on different categories / preferences. - Access
Permissions Violation Monitoring
Access controls and User Behavior Analytics (UBA) will be implemented to monitor and alert for failed logins, unapproved region-based logins, and logins outside of the users learned working habits.
*Requires appropriate Microsoft licensing and client defined parameters. - Suspicious
Exposure Of Sensitive Information Monitoring
Email monitoring and device scanning will be used to detect client defined sensitive data controls.
*Covered data types include: Personally Identifiable Information (PII), Payment Card Information (PCI), Protected Health Information (PHI), Non-Public Information (NPI)
**Requires appropriate Microsoft licensing and client defined parameters. - M365 Suspected
Attacks Monitoring
Managed M365 accounts will be monitored for known and suspected threat actor attacks.
*Requires appropriate Microsoft licensing and client defined parameters. - Mass Data
Deletion / Download Monitoring
Managed cloud connected accounts will be monitored for mass data deletion and downloading indicative of insider threats and threat actor access.
*Requires appropriate Microsoft licensing and client defined parameters. - M365 or Google
Workspace Backup
Provide industry leading 256-bit encryption at rest and 128-bit in transit. Provide multiple snapshots at regular intervals throughout the day. This ensures that the backups keep up with your demands and provide you with peace of mind.
- User Management
(remote Support)
Provide troubleshooting and support for managed user related issues, including access permissions and group memberships.
- M365 User Account
Monitoring
M365 Defense provides around-the-clock M365 security monitoring and policy enforcement. With M365 Defense, cyber analysts will monitor and harden your M365 environment and user accounts.
*Requires appropriate Microsoft licensing and client defined parameters. - M365 Or Google
Workspace Support And License Management
We facilitate the purchase and maintenance of licenses for M365 and Google Workspace. We provide support and troubleshooting for managed M365 and Google Workspace accounts. No development or training is included in support of these products under our Managed Services Packages. If you would like development or training, please contact your Account Manager. - New User Setup
We provide up to 3 new user and/or computer setups per month included in these packages. Any additional users and/or computers will be billed at a flat fee of $375. - 2FA / MFA
We provide a business grade Multi-factor authentication tool for all client end users to use. This provides an additional layer of security when logging into supported systems. It's the concept of something you know (password) plus something you have (phone). - Password Manager
We provide a business grade password manager for all client end users to use. This is used to store passwords in a central location and protect them with encryption. This simplifies password management by eliminating the need to memorize multiple passwords for different accounts. - User Training
We provide your company with live virtual training for your users when it comes to your technology needs. We will provide up to 1 hour of training per company per quarter if requested. - Phishing
Simulation
Best-in-class, fully automated simulated phishing attacks, thousands of templates with unlimited usage, and community phishing templates. We will provide reports of the results of the simulations to our Key Contact. - On-Demand
Training
We provide access to Award-Winning eLearning Courses for Microsoft Products along with cyber security awareness training sessions available with certificate of completion. This is a self-paced training course for your employees.
- User Management (Onsite
Support)
During designated Support Hours, we will provide support for business users at the client's premises as deemed necessary by Vector Choice. Support is available from Monday to Friday, 8:00 a.m. to 6:00 p.m. Local Time, with the exception of designated holidays, which are detailed on Vector Choice's Holiday Schedule. https://vectorchoice.com/holidayschedule
User Management (For Compliance Pro Package only)
- Data Loss
Prevention
Vector Choice will build policies to control who and what devices can access managed M365 infrastructure and data. *Requires appropriate Microsoft licensing, Mobile Device Management (MDM), and client defined parameters.
Our Endpoint Detection and Response (EDR) software is a cybersecurity tool designed to monitor, detect and respond to threats on endpoints. Our EDR solution provides comprehensive protection against a wide range of cyberthreats, including malware, ransomware and advanced persistent threats (APTs).- Antivirus
Our antivirus product is a program designed to detect and remove viruses and other kinds of malicious software from your workstations. - Ransomware
Detection
Our ransomware detection identifies malware that has infected a workstation and prevents it from encrypting files. The goal is to stop the ransomware and help users recover their data. - 24 / 7 / 365 Proactive
Management & Alerts
We provide 24/7/365 Management and Alerting for all supported devices under this addendum. - Scheduled
Preventative Maintenance
We provide scheduled maintenance for all supported computers under this addendum. - Patch Management
- Microsoft
Our Network Operations Center team identifies, approves, and automates installation of necessary security patches. The installation is scheduled for pre-determined times to ensure security vulnerabilities are minimized.
*Additional patch management may be supported as requested by client and approved by Vector Choice. - Automatic
Escalation And Resolution Of Alerts
Our remote monitoring and management system provides the ability for us to escalate alerts to the appropriate engineers for resolution. - Firmware Updates
We provide firmware updates for all managed computers. - Service Auto-Healing
We have the ability to create auto-healing functions in our system if we find there are reoccurring issues that we can solve through automation. - Computer File
Backup
Vector Choice will provide a file level backup for business file extensions up to 250G of storage per computer, with a retention of 30 days.
« Additional Storage For Computer File Backup
Additional storage is available for purchase at increments of 50G.
« Image-Based Backup
If you would like for us to backup your entire computer with bare metal backup, it is available for purchase. - Web Gateway / Content
Filtering Security
We will build and maintain web content filters based on client defined website categories. - Application
Control
A powerful tool that allows us to permit, deny or restrict applications from running on your devices. A gold standard when it comes to blocking ransomware, viruses, and other software-based threats.
- Remote Support
& Fix Computer Issues
Vector Choice will provide computer break fix and managed software troubleshooting. Unmanaged software will receive best effort support or act as technical liaison with product support.
*Remote support will be performed unless the technician determines onsite repair is necessary.
A team of cyber security experts actively identifying and remediating security threats. Takes in huge amounts of security / behavioral data from workstations to identify suspicious patterns or actions. These behaviors are then reviewed by our security professionals. Another team of "threat hunters" are proactively looking for signs of compromise.- M365 Azure /
InTune Support
We will provide support and changes to the Azure and InTune environment to optimize best performance and security. We will also manage the appropriate licenses when it pertains to Azure and InTune with the guidance of the client.
*Requires appropriate Microsoft licensing, Mobile Device Management (MDM), and client defined parameters. - Malware
Sandboxing
Our Team uses this cybersecurity technique to isolate and analyze suspicious software in a virtual environment. This prevents malware from harming actual production systems. - Computer Disk Encryption
Management
Vector Choice will manage computer disk encryption on managed devices that support encryption. - Ring-Fencing
Vector Choice will manage and maintain controls to limit computer system services, processes, and drivers to only their intended functions adding a layer of security against malware, ransomware, and threat actor exploitation. - Custom Alerts
We provide the ability to setup custom alerts for service and applications as requested by client. - Data Loss
Prevention
Vector Choice will build policies to control who and what devices can access managed M365 infrastructure and data.
*Requires appropriate Microsoft licensing, Mobile Device Management (MDM), and client defined parameters. - Cyber Attack
Remediation
Vector Choice will provide or facilitate the first five (5) hours of cyber incident triage per calendar year. Cyber Attack/Hack due to client's or client employee's negligence are not covered.
*Incident Response (IR) is billed hourly beyond the included hours at a rate of $350/hour per security engineer required. - Automated
Software Deployment
Vector Choice will deploy managed software automatically on all managed devices.
*Vector Choice can help deploy unmanaged software at scale for an additional cost or block of hours. - Provision
Computer
*Labor Only; All Hardware and Software Costs Will Be Additional
Vector Choice will configure managed computers to match the client's approved desired state for new hires. These devices will be required to meet the Vector Choice minimum baseline requirements (i.e. Hardware, system specifications [CPU, RAM, storage space, etc. and current operating system). We provide up to 3 computer setups per month included in this package. Any additional computers will be billed at a flat fee of $375 per new computer setup. - Installation Of
New Software
*Labor Only; All Hardware and Software Costs Will Be Additional.
Vector Choice will provide managed software troubleshooting and support. Unmanaged software will receive best effort support or act as technical liaison with product support.
- On-Site Support
& Fix - Computer Issues
During designated Support Hours, we will provide support for business computers at the client's premises as deemed necessary by Vector Choice. Support is available from Monday to Friday, 8:00 a.m. to 6:00 p.m. Local Time, with the exception of designated holidays, which are detailed on Vector Choice's Holiday Schedule. https://vectorchoice.com/holidayschedule
- SIEM
Our SIEM logs nearly every bit of under-the-hood activity on a computer, network access, security changes, permissions changes, etc. Those behaviors are then used to trigger alerts when an unusual or potentially malicious string of behaviors is detected. SIEMs also provide Vector Choice with a means of tracing a security incident back to its source which is traditionally a blind spot for IT professionals. 90-Day Retention is included, additional retention available for purchase by request.
- All The Time VPN
For Computers
Vector Choice provides VPN for your remote users, so they always have secure connections.
- Endpoint Detection
& Response
Our Endpoint Detection and Response (EDR) software is a cybersecurity tool designed to monitor, detect and respond to threats on servers. Our EDR solution provides comprehensive protection against a wide range of cyberthreats, including malware, ransomware and advanced persistent threats (APTs). - Antivirus
Our antivirus product is a program designed to detect and remove viruses and other kinds of malicious software from your servers. - Ransomware
Detection
Our ransomware detection identifies malware that has infected a server and prevents it from encrypting files. The goal is to stop the ransomware and help you recover your server data. - 24 / 7 / 365 Proactive
Management & Alerts
We provide 24 / 7 / 365 Management and Alerting for all supported devices under this addendum. - Scheduled
Preventative Maintenance
We provide scheduled maintenance for all supported servers under this addendum - Patch Management
- Microsoft
Our Network Operations Center team identifies, approves, and automates installation of necessary security patches. The installation is scheduled for pre-determined times to ensure security vulnerabilities are minimized.
*Additional patch management may be supported as requested by client and approved by Vector Choice. - Automatic
Escalation & Resolution Of Alerts
Our remote monitoring and management system provides the ability for us to escalate alerts to the appropriate engineers for resolution. - Firmware Updates
We provide firmware updates for all managed servers. - Service Auto-Healing
We have the ability to create auto-healing functions in our system if we find there are reoccurring issues that we can solve through automation. - Server File Backup
Vector Choice will provide 1TB of server data backup per managed server with a retention of 90-days. Any additional storage or retention is available for purchase.
*Client compliance requirements may dictate the length of data retention where applicable. - Application
Control
A powerful tool that allows us to permit, deny or restrict applications from running on your devices. A gold standard when it comes to blocking ransomware, viruses, and other software-based threats.
- Web Gateway / Content
Filtering Security
We will build and maintain web content filters based on client defined website categories. - Remote Support
& Fix - Server Issues
Vector Choice will provide server break fix and managed software troubleshooting. Unmanaged software will receive best effort support or act as technical liaison with product support.
*Remote support will be performed unless the technician determines onsite repair is necessary.
- MDR / SOC
A team of cyber security experts actively identifying and remediating security threats. Takes in huge amounts of security / behavioral data from servers to identify suspicious patterns or actions. These behaviors are then reviewed by our security professionals. Another team of "threat hunters" are proactively looking for signs of compromise. - M365 Azure /
InTune Support
We will provide support and changes to the Azure and InTune environment to optimize best performance and security. We will also manage the appropriate licenses when it pertains to Azure and InTune with the guidance of the client.
*Requires appropriate Microsoft licensing, Mobile Device Management (MDM), and client defined parameters. - Malware
Sandboxing
Our Team uses this cybersecurity technique to isolate and analyze suspicious software in a virtual environment. This prevents malware from harming actual production systems. - Server Disk Encryption
Management
Vector Choice will enable and maintain server disk encryption on managed servers. - Ring-Fencing
Vector Choice will manage and maintain controls to limit server services, processes, and drivers to only their intended functions adding a layer of security against malware, ransomware, and threat actor exploitation. - Custom Alerts
We provide the ability to setup custom alerts for service and applications as needed. - Data Loss
Prevention
Vector Choice will build policies to control who and what devices can access managed M365 infrastructure and data.
* Requires appropriate Microsoft licensing, Mobile Device Management (MDM), and client defined parameters. - Cyber Attack Remediation
Vector Choice will provide or facilitate the first five (5) hours of cyber incident triage per calendar year. Cyber Attack/Hack due to client's or client employee's negligence are not covered.
*Incident Response (IR) is billed hourly beyond the included hours at a rate of $350/hour per security engineer required. - Automated
Software Deployment
Vector Choice will deploy managed software automatically on all managed servers.
*Vector Choice can help deploy unmanaged software at scale for an additional cost or block of hours. - 24 / 7 / 365
Backup Monitoring, Alert Management
Vector Choice will manage, monitor, troubleshoot and remediate alerts of backup related issues on managed servers.
*Client compliance requirements will dictate the length of data retention where applicable or a rolling 90 days based on agreement package.
**Compliance as a Service clients will get additional backup restore testing, validation, and reporting.
- Onsite Support
& Fix - Server Issues
Vector Choice will provide server break/fix and troubleshooting. End-of-Life hardware will receive best effort support or Vector Choice will facilitate vendor support on the client's behalf.
*Remote support will be performed unless the technician determines onsite repair is necessary.
- SIEM
SIEM logs nearly every bit of under-the-hood activity on a server, network access, security changes, permissions changes, etc. Those behaviors are then used to trigger alerts when an unusual or potentially malicious string of behaviors is detected. SIEMs also provide Vector Choice with a means of tracing a security incident back to its source which is traditionally a blind spot for IT professionals. 90-Day Retention is included, additional retention available for purchase by request.
**Compliance as a Service clients will get additional log retention.
- Dark Web
Monitoring
A combination of human and machine intelligence with powerful search capabilities to scour the dark web to identify, analyze and actively monitor for your organization's compromised credentials 24 / 7 / 365, alerting you to potential trouble, fast. - Power Management
In the case of internet service or power outage, the power management device automatically restarts your router / firewall / server in an attempt to automatically restore connectivity to your business. - Network
Monitoring and Alerting for All Network Devices and Peripherals
Our software provides visibility into Network Traffic flow, helping to identify issues or inconsistencies causing slow-downs or interruptions in your network infrastructure. - Network Management
Vector Choice will provide network management and support for all office infrastructure equipment. End-of-Life hardware will receive best effort support or Vector Choice will facilitate vendor support on the client's behalf.
*Remote support will be performed unless the technician determines onsite repair is necessary. - Annual IT
Assessment
With our comprehensive review of your organization's technology infrastructure, systems, and security, we identify potential risks, vulnerabilities, and areas for improvement. This helps us make sure technology resources are functioning effectively, secure, and aligned with your business needs.
- Firewall With IDS
/ IPS as-a-Service
We will provide a Firewall-as-a-Service equipped with IDS and IPS. Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) are security features found in industry leading firewalls. They monitor the events occurring in your network and analyzing them for signs of possible incidents or threats. - Power Management
With UPS
In the case of internet service or power outage, the power management device automatically restarts your router / firewall / server in an attempt to automatically restore connectivity to your business. This includes a battery backup in the event of total power failure.
- Tablet Device
Management (MDM)
Mobile Device Management software allows us to automate, control, and secure administrative policies on your employees' business-owned tablets.
* Requires appropriate Microsoft licensing, Mobile Device Management (MDM), and client defined parameters. - Support & Fix
Tablet Issues (Remote Only)
We provide remote support for all business tablets. This does not include repairs to damaged or malfunctioning tablets.
- All The Time VPN
For Tablets
Vector Choice provides VPN for your remote users, so they always have secure connections. - Application
Control
We can provide Application Control through MDM or InTune.
* Requires appropriate Microsoft licensing, Mobile Device Management (MDM), and client defined parameters.
- Mobile Device
Management (MDM)
Mobile Device Management software allows us to automate, control, and secure administrative policies on your employees' business-owned mobile devices.
* Requires appropriate Microsoft licensing, Mobile Device Management (MDM), and client defined parameters. - Support & Fix
Mobile Issues (Remote Only)
We provide remote support for all business-owned mobile devices. This does not include repairs to damaged or malfunctioning mobile devices.
- All The Time VPN
For Mobile
Vector Choice provides VPN for your remote users, so they always have secure connections. - Application
Control
We can provide Application Control through MDM or InTune.
* Requires appropriate Microsoft licensing, Mobile Device Management (MDM), and client defined parameters.
- All information
listed above is enforced unless otherwise agreed upon in the Managed Services
Addendum.
- For New Clients
Only
The definition of "new client" is someone that has never done business with us or with an entity we have acquired prior to signing this Addendum. - We bill labor for
any discovery or audit requests related to lawsuits, compliance regulations, and
third-party audits.
- Anything not specifically mentioned above is excluded.