Our Plans & Details

We specialize in providing comprehensive IT services tailored to meet the diverse needs of our customers.  To cater to varying requirements and budgets, we offer three bundled service plans: Silver, Gold, and Platinum. These plans include support, maintenance, antivirus, endpoint backups, ransomware detection, cybersecurity,  and more.  Bundling services together will ensure that everything is covered and nothing slips through the cracks.

details

Silver

Endpoint Maintenance, Monitoring, Antivirus + Ransomware Protection, Cloud Backups, Advanced Threat Detection + Response, SOC, SaaS Backups.  No IT/Help Desk Support Included (charged hourly rate based on business hours or after hours)

Gold

Endpoint Maintenance, Monitoring, Antivirus + Ransomware Protection, Cloud Backups, Advanced Threat Detection + Response, SOC, SaaS Backups.  IT/Help Desk Support Included. 10% off any purchase of Penetration Testing (either one time testing or quarterly testing).

Platinum

Endpoint Maintenance, Monitoring, Antivirus + Ransomware Protection, Cloud Backups, Advanced Threat Detection + Response, SOC, SaaS Backups.  IT/Help Desk Support Included. 15% off any purchase of Penetration Testing (either one time testing or quarterly testing).  1 license of Microsoft 365 Business Premium (includes Office software, and email account / hosting).

Bundled Services & Details

  • Endpoint Patching & Management

    Endpoint patching is handled by our installed agent that examines your computers and finds patches and updates that are needed so that your computer stays up to date. Endpoint management involves monitoring, managing, and securing the various endpoint devices within an organization. It includes tasks like:

    • Device Configuration: Setting up and maintaining the configuration of endpoint devices to ensure they comply with company policies.
    • Software Deployment: Installing and updating software applications on endpoint devices.
    • Security Enforcement: Implementing security policies and measures, such as antivirus software and firewalls, to protect endpoints.
    • Asset Tracking: Keeping an inventory of all endpoint devices to manage and secure them effectively.

    We carry out the best practices for Endpoint Patching and Management

    • Automate Patching: Utilize automated tools to ensure timely and consistent application of patches across all endpoints.
    • Regular Audits: Conduct regular audits to identify and address any missing patches or outdated software.
    • Segment Network: Isolate different segments of the network to limit the spread of potential attacks.
    • User Education: Train employees on the importance of updates and how to recognize potential security threats.
    • Incident Response Plan: Have a robust incident response plan in place to quickly address any security breaches.
  • Endpoint Cloud Backups

    Data is one of the most valuable assets a business can have. But with the increasing number of cyber threats, hardware failures, and human errors, the risk of data loss is higher than ever. Our Backup Agent that is installed will routinely perform incremental backups to the cloud to ensure your data is safe, secure, and recoverable.  Why are Endpoint Backups Essential?

    • Data Security: Ensures that critical business information is safeguarded against ransomware, malware, and other cyber threats.
    • Business Continuity: Minimizes downtime by enabling quick recovery of lost or corrupted data, keeping operations running smoothly.
    • Compliance: Helps meet regulatory requirements by ensuring data is regularly backed up and can be restored as needed.
    • Disaster Recovery: Provides a reliable method to recover data in case of unexpected disasters like hardware failures, natural calamities, or human errors.

    What Does Continuous Endpoint Backups Involve?

    • Automated Backups: Regular, automated backups that eliminate the need for manual intervention, ensuring data is consistently saved.
    • Cloud Integration: Leveraging cloud storage to provide scalable, secure, and accessible backup solutions.
    • Real-Time Monitoring: Continuous monitoring of endpoints to detect and resolve any backup issues promptly.
    • Incremental Backups: Efficiently backing up only the changes made since the last backup, saving time and storage space.
    • Data Encryption: Ensuring data is encrypted both in transit and at rest to maintain confidentiality and integrity.
    • Regular Testing: Periodically testing backup and recovery processes to ensure they work seamlessly when needed.
  • Antivirus Protection

    Antivirus protection is more critical than ever. With cyber threats evolving daily, having robust antivirus software is essential for safeguarding your business and personal data.  AV protection is important for:

    • Threat Detection and Prevention: Antivirus software continuously scans your system to detect and prevent malicious software, including viruses, ransomware, spyware, and more.
    • Data Protection: By preventing unauthorized access to your data, antivirus software helps protect sensitive information from being compromised.
    • System Performance: Effective antivirus solutions can enhance your system’s performance by removing malware that may slow down or damage your devices.
    • Peace of Mind: Knowing that your systems are protected against the latest threats allows you to focus on your business operations without constant security worries.

    How Antivirus Protects:

    • Real-Time Scanning: Continuously monitors files and activities on your system to detect and block threats as they occur.
    • Regular Updates: Antivirus software frequently updates its virus definitions to recognize and defend against the latest threats.
    • Heuristic Analysis: Uses behavior-based detection to identify new or unknown threats by analyzing how they act, even if they are not yet in the virus database.
    • Quarantine and Removal: Isolates suspicious files to prevent them from causing harm and allows for safe removal of confirmed threats.
    • Email and Web Protection: Scans incoming emails and websites for malicious content, preventing phishing attacks and other online threats.
    • Firewall Integration: Works alongside your system’s firewall to provide a comprehensive defense against external attacks.

  • Ransomware Protection

    Ransomware attacks are becoming increasingly common and sophisticated. These malicious attacks can cripple businesses by encrypting critical data and demanding a ransom for its release. Understanding the importance of ransomware protection and implementing robust security measures is essential for safeguarding your organization.  Ransomware is important for:

    • Financial Impact: Ransom demands can be exorbitant, and the costs associated with downtime, data recovery, and potential fines can devastate a business.
    • Data Security: Ransomware can compromise sensitive information, leading to data breaches and loss of customer trust.
    • Business Continuity: An attack can halt operations, causing significant disruptions and affecting productivity.
    • Regulatory Compliance: Many industries have strict data protection regulations, and failing to protect against ransomware can result in hefty penalties.

    Ransomware protects by using:

    • Real-Time Threat Detection: Monitors and identifies suspicious activities in real-time, stopping ransomware before it can execute.
    • Behavioral Analysis: Uses advanced algorithms to detect abnormal behavior patterns that may indicate a ransomware attack.
    • Email Filtering: Scans and filters out malicious emails that often serve as the entry point for ransomware.
    • Endpoint Protection: Secures all endpoints, including desktops, laptops, and mobile devices, to prevent ransomware from spreading.
    • Data Encryption: Ensures that sensitive data remains encrypted and inaccessible to unauthorized users.
    • Regular Backups: Maintains up-to-date backups of all critical data, enabling quick recovery without paying a ransom.
    • User Training: Educates employees on recognizing phishing attempts and other tactics used to deploy ransomware.
  • Security Ops Center (SOC) Response

    In an era where cyber threats are becoming increasingly sophisticated, having a Security Operations Center (SOC) is essential for any organization serious about protecting its digital assets. A SOC is the frontline defense in monitoring, detecting, and responding to cyber threats in real-time.  A Security Ops Team is important for :

    • Continuous Monitoring: A SOC provides 24/7 monitoring of your network, ensuring that potential threats are identified and addressed promptly.
    • Threat Detection and Response: With advanced tools and skilled analysts, a SOC can quickly detect anomalies and respond to incidents, minimizing potential damage.
    • Improved Incident Management: A centralized team dedicated to cybersecurity ensures that incidents are managed efficiently and effectively, reducing downtime and operational disruption.
    • Regulatory Compliance: Many industries have stringent cybersecurity requirements. A SOC helps ensure compliance by maintaining robust security protocols and documenting incident responses.
    • Proactive Defense: By continuously analyzing threats and vulnerabilities, a SOC can implement proactive measures to strengthen your security posture.

    Key Features of a SOC

    • Real-Time Threat Monitoring: Uses sophisticated tools to continuously monitor network traffic and user activity for signs of malicious behavior.
    • Incident Response: Provides a structured approach to handle security incidents, including identification, containment, eradication, and recovery.
    • Threat Intelligence: Leverages global threat intelligence feeds to stay ahead of emerging threats and update defenses accordingly.
    • Vulnerability Management: Regularly scans and assesses the network for vulnerabilities, ensuring that patches and updates are applied promptly.
    • Advanced Analytics: Uses machine learning and AI to detect complex threats that traditional security measures might miss.
    • Security Information and Event Management (SIEM): Integrates and analyzes data from various sources to provide a comprehensive view of the security landscape.
    • Compliance Reporting: Generates detailed reports to help meet regulatory and compliance requirements.
  • SaaS Backups (Google / M365)

    Businesses rely heavily on SaaS applications like Google GSuite and Microsoft 365 for daily operations. While these platforms offer robust security, they are not immune to data loss caused by human error, cyber threats, or system failures. Implementing SaaS protection and backups is crucial for safeguarding your critical business data.

    SaaS Protection is: 

    • Data Loss Prevention: Protects against accidental deletions, overwrites, and data corruption caused by user errors.
    • Cyber Threat Mitigation: Shields your data from ransomware attacks, phishing scams, and other cyber threats.
    • Regulatory Compliance: Helps meet industry regulations by ensuring that data is securely backed up and easily recoverable.
    • Business Continuity: Minimizes downtime by enabling rapid recovery of lost or compromised data, keeping your business operations running smoothly.
    • Operational Efficiency: Provides peace of mind, allowing IT teams to focus on strategic initiatives rather than data recovery efforts.

    Key Features of SaaS Protection and Backups

    • Automated Backups: Regular, automated backups ensure that your data is consistently saved without manual intervention.
    • Granular Recovery: Allows for the restoration of specific emails, files, or entire accounts, providing flexibility in data recovery.
    • Continuous Monitoring: Monitors your SaaS environments for unusual activities and potential threats, enabling proactive defense.
    • Version Control: Maintains multiple versions of your files, allowing you to recover from any point in time.
    • Secure Encryption: Ensures that your data is encrypted both in transit and at rest, maintaining confidentiality and integrity.
    • User-Friendly Interface: Simplifies backup management and data recovery with an intuitive dashboard and easy-to-use tools.
    • Compliance Support: Generates detailed audit logs and compliance reports to help meet regulatory requirements.
  • IT Support (Included in Gold & Platinum Plans)

    Businesses of all sizes rely on robust IT support to maintain smooth operations and drive growth. Partnering with a Managed Service Provider (MSP) for IT support offers numerous benefits, from enhanced security to cost savings. Additionally, for businesses with existing IT teams, Co-Managed IT services provide the perfect blend of internal and external expertise.

    Why is Having an MSP Important?

    • Proactive Maintenance: MSPs offer proactive monitoring and maintenance, preventing issues before they disrupt operations.
    • Expertise and Knowledge: Access to a team of IT experts who stay up-to-date with the latest technologies and best practices.
    • Cost Efficiency: Predictable monthly costs and reduced need for in-house IT staff can lead to significant savings.
    • Enhanced Security: MSPs implement advanced security measures to protect your data and systems from cyber threats.
    • Scalability: Easily scale your IT resources up or down based on your business needs without the hassle of managing additional staff.

    Key Features of MSP IT Support

    • 24/7 Monitoring and Support: Round-the-clock monitoring and support ensure that any issues are addressed immediately, minimizing downtime.
    • Data Backup and Recovery: Regular backups and a solid recovery plan ensure business continuity in case of data loss or disasters.
    • Network Management: Comprehensive management of your network infrastructure to ensure optimal performance and security.
    • Help Desk Services: Dedicated support team available to assist with technical issues and user queries.
    • IT Consulting and Strategy: Strategic advice and planning to align IT with business goals and drive growth.
    • Vendor Management: Handling relationships with hardware and software vendors to streamline procurement and support processes.

    The Option of Co-Managed IT Services

    For businesses with existing IT teams, Co-Managed IT services offer a collaborative approach:

    • Shared Responsibility: Blend internal IT expertise with the specialized skills of an MSP for comprehensive support.
    • Flexible Support: MSPs can fill in gaps, provide additional resources during peak times, or offer specialized expertise.
    • Enhanced Efficiency: Free up your internal IT team to focus on strategic initiatives while the MSP handles routine tasks and maintenance.
    • Knowledge Transfer: Access to MSP’s expertise can help train and develop your in-house team, enhancing their skills and capabilities.

    * Project work will incur additional charges
    * IT Support Services on the Silver Plan will be charged on an hourly basis

  • 10-15% Off Quarterly Pen-Testing

    In an era where cyber threats are increasingly sophisticated, maintaining robust security measures is crucial for protecting your business. Penetration testing, or pen-testing, plays a vital role in identifying and addressing vulnerabilities before malicious actors can exploit them. While annual testing has been the norm, conducting penetration tests quarterly offers significant advantages in staying ahead of emerging threats.

    Why is Penetration Testing Important?

    • Identify Vulnerabilities: Pen-testing simulates real-world attacks to uncover security weaknesses in your systems, networks, and applications.
    • Mitigate Risks: By identifying and addressing vulnerabilities, pen-testing helps prevent data breaches and other security incidents.
    • Ensure Compliance: Regular testing helps meet regulatory requirements and industry standards, ensuring your business remains compliant.
    • Protect Reputation: Proactively addressing security gaps helps maintain customer trust and protects your business reputation.
    • Enhance Security Posture: Continuous improvement of security measures through regular testing strengthens your overall cybersecurity framework.

    Why Quarterly Penetration Testing?

    • Stay Ahead of Threats: Cyber threats evolve rapidly. Quarterly testing ensures you identify and address new vulnerabilities more quickly.
    • Minimize Risk Exposure: Reducing the time between tests decreases the window of opportunity for attackers to exploit vulnerabilities.
    • Agile Response: Regular testing allows for a more agile response to emerging threats and changes in your IT environment.
    • Continuous Improvement: Frequent testing supports ongoing improvement of your security measures, making your defenses stronger over time.

    What is Involved in Penetration Testing?

    • Planning and Scoping: Define the scope of the test, including the systems, networks, and applications to be evaluated.
    • Reconnaissance: Gather information about the target to identify potential entry points and vulnerabilities.
    • Vulnerability Analysis: Identify and prioritize vulnerabilities that could be exploited.
    • Exploitation: Simulate attacks to exploit identified vulnerabilities and assess the potential impact.
    • Post-Exploitation: Determine the extent of access gained and the potential for further exploitation.
    • Reporting: Provide a detailed report outlining findings, potential impacts, and recommended remediation steps.
    • Remediation: Address identified vulnerabilities and strengthen security measures.
    • Verification: Conduct follow-up testing to ensure that vulnerabilities have been effectively mitigated.

    10% off of Pen-Testing when purchasing a Gold/Platinum quarterly plan

    15% off of Pen-Testing when purchasing a Gold/Platinum yearly plan

  • M365 Business Premium (Platinum Plan Only)

    1 License of Microsoft 365 Business Premium (with an email migration/hosting agreement – extra charges may apply)

    You get the following features:

    • Desktop, web, and mobile versions of Word, Excel, PowerPoint, and Outlook.
    • Custom business email (you@yourbusiness.com) with Outlook.
    • Chat, call, collaborate, meet online, and host webinars for up to 300 attendees using Microsoft Teams.
    • 1 TB of cloud storage per user with OneDrive.
    • Video editing and design tools through Clipchamp.
    • Enhanced cyberthreat protection against viruses and phishing attacks.

    This solution combines productivity tools with advanced security features, making it ideal for businesses with up to 300 employees.

Approach

Our Approach to Security

At Conducive IT, we believe that the best defense is a good offense. Our proactive and high-tech approach to IT support and cybersecurity ensures that your business stays ahead of threats and operates smoothly.

Utilizing cutting-edge technologies and a team of skilled experts, we provide continuous monitoring, advanced threat detection, and rapid incident response. Whether it’s managing your IT infrastructure, safeguarding your data, or optimizing your network, Conducive IT is dedicated to delivering top-tier security and support to keep your business running at its best.

Continuous Monitoring and Response

Constant threat detection, monitoring, maintenance, and SOC responses will ensure maximum security and will keep your business safe and keep it up and running

Contact Us

(800) 410-6098

3710 W 9800 S, South Jordan, Utah 84009

Monday-Friday: 8am – 5pm

Get Started

Let’s Chat about your Technology Needs and how we can help you out!