Additional DC Server Support

Daily monitoring and management of server and repair when needed. This is custom service and support for servers that ONLY function as Active Directory Domain Controller (a server dedicated to security authentication requests within a Windows Server Domain).  Network People engineers perform daily health checks before business hours.  This includes runtime and stability, backed, and critical errors.   Then engineers verify additional health and security checks through monitoring and management of antivirus, anti-malware, system checks, alerts, hard drive maintenance, specific scripted repairs of known issues, ticket creation and closure. If an issue is detected, a ticket is created notifying client and an engineer dispatched to perform the necessary service according to the SLA to restore normal functionality.  If ticket requires repair to be done onsite, the engineer will go onsite.  
(Monitoring + Management + Helpdesk + Proactive Maintenance) 

Advanced Security Monitoring

Proactive, persistent threat protection for your network that identifies your vulnerabilities and allows earlier detection of ransomware activity. This advanced security detection delivers: Vulnerability scanning, alert review and recommendations, remediation direction, detection and review of indications of compromise through ongoing scanning and monitoring for vulnerabilities. Network People engineers use state-of-the-art security tools that detect indications of compromise (IOC) on computers or servers in the network. When new or greater risks are identified, Network People alerts you. This security monitoring: • Highlights external and internal vulnerabilities to tighten your defenses • Enables earlier detection of potential ransomware incidents • Exposes attackers who abuse legitimate Windows applications and processes to bypass other security systems and establish persistence • Reviews incident reports that combine automated intelligence with human expertise to understand the scope and severity of potential threats • Prevents hackers from dwelling in your protected environments with step-by-step guidelines to harden your security and reduce future risk (Security + Monitoring + Compliance + Management + Proactive Maintenance + Accountability)

Azure Server Standard License

Server Standard Annual License for Azure Server (Software License) 

Azure AD Server Support

Custom service and support for Azure AD services which gives users seamless access to all applications to maintain productivity. Network People engineers perform additions and subtractions of Microsoft Licenses of all kinds on the Azure server and manage the users access, data, security, and overall licensing. Engineers also enable the connection of workstations and laptops to the Domain Controller of the Azure AD. If an issue is detected, a ticket is created notifying client and an engineer dispatched to perform the necessary service according to the SLA to restore normal functionality. If ticket requires repair to be done onsite, the engineer will go onsite. (Monitoring + Management + Helpdesk + Proactive Maintenance + Security + Compliance

Azure Cloud Server Support

Daily monitoring and management of cloud server and repair when needed to keep your network and team up and running. A private off premise cloud server hosted at a Microsoft data center used for storage, data bases, permissions access control, and file and print. Creates a highly redundant solution with flexibility for growth and scale. (Management + Security + Monitoring + Proactive Maintenance + Helpdesk) 

Azure Usage

Management and provision of Cloud hosting services. Monthly variable rate for cloud hosting expenses in the Azure data center for the following services: Bandwidth utilization, number of servers, total storage, and resources.(Management) 

Backup Server Alto 1TB

This disaster recovery tool offers comprehensive full server protection and minimizes network downtime. It prevents data loss, ensures quick full system restores, and easy recovery of individual files.  Redundancy (full image back-ups of your server) in two data centers outside the state of Florida. Allows us to do image backup as often every 15 minutes. NPI engineers confirm backup was tested, successful, and complete every morning before business and proactively fixing any problem that are detected.  (Disaster Recovery + Business Continuity + Security+ Compliance + Monitoring + Proactive Maintenance + Management + Helpdesk)

Cloud Backup & Archiving for Email & Office 365

This backup system for MS 365 protects from the threat of ransomware, data loss, or sabotage. This automated cloud-based backup and archiving system protects all OneDrive and Microsoft 365 data including (Word, Excel, Outlook, PowerPoint, Publisher, Access, OneNote, OneDrive, Teams, and many other applications in the MS 365 stack as well as personal documents and data stored in the OneDrive system). (Disaster Recovery + Proactive Maintenance + Security + Compliance + Disaster Recovery + Business Continuity + Helpdesk)

Vulnerability Scanning

This tool vulnerability assessment & management system to help safeguard their business critical systems and data. Built by MSP industry pioneers to solve the cybersecurity problems MSPs face, it leverages a collaborative model of product development that integrates MSP insights. Scan network gear such as routers; switches; access points; firewalls; end-user devices, such as laptops and desktops; printers; and servers and virtual machines.

Customized Client Dashboard

Provides a real-time digital report on how your network, resources, and IT management are delivering value to your organization. This tool pulls information from multiple systems that monitor and protect your network as well as gathers data to help the business leader make decisions about technology, resources, and budgeting. It compiles it all into one easy to use and understand set of graphs and tables on one dashboard. (Strategy + Accountability + Monitoring)

Cyber Security Training

Your best assets are also your greatest security risk. Human error is the main cause of data and security breaches. At Network People, we’ve seen this firsthand. That’s why we are now providing ongoing security training for your employees that is tailored to the security threats and risks they face daily.  This includes everything from email phishing scams to what to do if they think there’s been a security breach. 

Security Awareness Training.  It should be fun!  The platform trains your employees with short, memorable security awareness stories. Our security awareness training content is fun, memorable, and will have your employees begging you to watch the next episode! 

Choose from a variety of fresh new training content, episodes, security awareness downloads, phishing simulations, and more.

Phishing Training for Employees. Phishing awareness training for employees is finally fun with Curricula. Level-up your phishing tests with an exciting new gamified experience you and your employees will love.

Reporting.  Our executive summary reports highlight your program at a glance, and detailed reports help you zoom in for compliance audits and more granular views that Compliance Auditors Will Love!
Get a snapshot all of your evidence and online training records in seconds.  Reporting will demonstrate compliance of your entire security awareness training program.

 

Datto: Siris Backup

A backup server with redundancy in two locations outside of Florida to keep your business running even in the middle of disasters such as ransomware, malware, hurricanes, network downtime, and human errors. It includes verified backups as often as every five minutes, data restoration, ransomware protection,and instant virtualization (if the server goes down, we’ll take the backup and make that the server within minutes so everyone gets back to work). All backed by Datto’s private cloud. NPI engineers confirm backup was tested, successful, and complete every morning before business and proactively fixing any problem that are detected.  Compliance + Monitoring + Proactive Maintenance + Management + Helpdesk)

Email Security Filtering for Business

Email Fraud Defense protects your employees, customers, and business partners from cyber criminals who spoof trusted email domains. It makes email authentication easy and reliable so you can stop email fraud before it reaches the inbox. It blocks socially engineered attacks such as business email compromise and consumer phishing and automatically adjusts to new vectors of attacks created by criminals. Simplify email authentication without blocking legitimate email. Provides: email antivirus, spam filtering, reporting, content filtering, outbound filtering, imposter email protection, and data loss prevention. (Monitoring + Security + Business Continuity + Proactive Maintenance + Management + Compliance + Helpdesk)

Email Security Filtering with Encryption

Email Fraud Defense protects your employees, customers, and business partners from cyber criminals who spoof trusted email domains. It makes email authentication easy and reliable, so you can stop email fraud before it reaches the inbox. It blocks socially engineered attacks such as business email compromise and consumer phishing and automatically adjusts to new vectors of attacks created by criminals. Simplify email authentication without blocking legitimate email. Provides: email antivirus, spam filtering, reporting, content filtering, outbound filtering, imposter email protection, and data loss prevention. Also includes Email encryption, attachment defense (sandboxing), and social media account protection. (Monitoring + Security + Business Continuity + Proactive Maintenance + Management + Compliance + Helpdesk)

Email Security Filtering with Encryption and Archiving

Email Fraud Defense protects your employees, customers, and business partners from cyber criminals who spoof trusted email domains. It makes email authentication easy and reliable, so you can stop email fraud before it reaches the inbox. It blocks socially engineered attacks such as business email compromise and consumer phishing and automatically adjusts to new vectors of attacks created by criminals. Simplify email authentication without blocking legitimate email. Provides: email antivirus, spam filtering, reporting, content filtering, outbound filtering, imposter email protection, and data loss prevention. Also includes Email encryption, Archiving, attachment defense (sandboxing), and social media account protection. (Monitoring + Security + Business Continuity + Proactive Maintenance + Management + Compliance + Helpdesk)

Gateway Security For Firewall

Daily firewall management for prevention and detection against threat actors/hackers. Network People engineers manage the firewall and daily review the best settings and configurations and latest software (Firmware) to tune the firewall in order to provide the best prevention and detection against threat actors/hackers. (Security + Compliance + Monitoring + Proactive Maintenance + Management)

Hardware as a Service Support

Support for the management of hardware and software (inventory, purchase, replacement, and vendor support) Basic support for Hardware as a Service to manage inventory, asset allocation, sourcing of product, warranty, and vendor issues. (Management + Compliance + Proactive Maintenance + Accounting)

H365 Email MDR 

Managed Detection and Response (MDR) for Microsoft 365 product.

Service Description:

1. We possess advanced technology and specialized knowledge across various IT domains, including cybersecurity, enabling us to provide reliable solutions, proactive maintenance, and effective troubleshooting
2. We offer 24/7 monitoring of your IT systems, ensuring issues are identified and addressed promptly. This proactive approach minimizes downtime and disruptions and reduces the risk of breaches and data loss, which are crucial for businesses like yours. Additionally: You get access to a team of professionals at a fraction of the cost of building out your own security team, enabling you to concentrate on your core business.

How we protect against BEC:

1. We have a powerful managed detection and response (MDR) solution included in our security services that secures your cloud identities and applications from BEC scams.
2. By detecting and responding to suspicious user activity, permission changes, and anomalous access behavior, and backed by a 24/7 SOC team, our solution empowers us to fight back against attackers on your behalf, with no gaps or lags in coverage during the peak seasons, off hours, or holidays.

About Business Email Compromise (BEC):
Since BEC attacks are generally humancentric,the methods of protection and prevention must also be human-centric.

By partnering with us, you get access to a team of dedicated security experts who are working for you day and night to catch and contain BEC attacks.

Managed Active-IT User

Unlimited management and helpdesk support for a user (Onsite & Remote). During normal business hours Network People technician repairs desktop/laptop, verifies monitoring and management of desktop(s) is done correctly and successfully. This includes antivirus, anti-malware, system checks, alerts, hard drive maintenance, specific scripted repairs of known issues, ticket creation and closure. If Network People detects an issue with any of the above, a ticket is created notifying client and a technician is dispatched to perform the necessary service according to the SLA to restore normal functionality. If ticket requires repair to be done onsite, the technician will go onsite. All the following repairs will be performed under the “unlimited” coverage. *Replace or repair hardware (actual hardware part must be purchased by client) *Conference with vendor to get warranty repair that client deserves *Restore deleted files (requires backup server) *Provide training, advice, troubleshooting, and general user support (Management + Helpdesk + Security + Compliance + Proactive Maintenance + Disaster Recovery + Business Continuity)

Managed Active-IT Chromebook User

Remote services covered. Hardware/troubleshooting/repair is OOSA.

Managed Active-IT Remote Only User

Unlimited management and helpdesk support for a user (Remote Only). During normal business hours Network People technician repairs desktop/laptop, verifies monitoring and management of desktop(s) is done correctly and successfully. This includes antivirus, anti-malware, system checks, alerts, hard drive maintenance, specific scripted repairs of known issues, ticket creation and closure. If Network People detects an issue with any of the above, a ticket is created notifying client and a technician is dispatched to perform the necessary service according to the SLA to restore normal functionality. If ticket requires repair to be done onsite, the technician will go onsite. All the following repairs will be performed under the “unlimited” coverage. *Replace or repair hardware (actual hardware part must be purchased by client) *Conference with vendor to get warranty repair that client deserves *Restore deleted files (requires backup server) *Provide training, advice, troubleshooting, and general user support (Management + Helpdesk + Security + Compliance + Proactive Maintenance + Disaster Recovery + Business Continuity)

Managed Cloud Backup for Workstations

Tool that provides daily backup for workstations and is monitored for success. Full image backup of computer’s hard drive up to 1 TB into offsite data center replicated in two locations outside the state of Florida. Backups occur once per day. It provides: a full image cloud backup, screenshot verification, restore and virtualization of the entire PC, including files and data stored locally. (Disaster Recovery + Monitoring + Proactive Maintenance + Security + Helpdesk)

MAC Time Machine Backup

Monitoring of the backup for a MAC. Alerts when the backup has not been successful for 7 days. Works with our Remote Management Tool (Mac). *This service requires external hard drive or NAS device.

Managed Endpoint SOC Protection

Advanced endpoint detection and protection combined with SOC-based response and remediation services. On-demand security operations. Always-on threat coverage. Next-gen threat detection and remediation. *Protection: Deliver complete endpoint protection and monitoring. Out static artificial intelligence (AI) prevents attacks before they start by monitoring and analyzing client IT environments. *Threat detection: Behavioral AI constantly monitors and maps each running process for incongruous behaviors and recognizes many thousands of virus and malware attack variants, including cryptomining attacks, as well as the root causes of these malicious behaviors by quickly identifying and diagnosing corrupt source processes and system settings. *Response and remediation: When malicious behavior is detected, Managed Endpoint will activate remediation steps including scrubbing the system of any remnant of an attack, such as malicious processes or registry keys, and performing system rollback, if required, to restore system and data access. *Managed detection and response (MDR): Implement advanced operations without the need for in-house security expertise. *Next-gen endpoint security: Provides unique malware detection and remediation technology. This solution incorporates innovative prevention technology, providing visibility into the root causes and origins of the threat, reversing the malicious operations of ransomware and remediating them at an agile speed, when needed. (Security + Monitoring + Compliance + Management + Proactive Maintenance + Accountability)

Network Map

Professional Network Mapping tool that auto-senses devices on the network that have an IP address and makes a visual diagram of those devices for ease of inventory and security. Also helps with securing the network when rogue devices are autosensed—such devices can be removed from the network to prevent unauthorized or malicious access. (Management + Monitoring + Proactive Maintenance + Security + Accountability + Compliance)

Parallells Monitoring & Support (MAC)

Support for parallels running on a MAC. Technical support to troubleshoot, configure, and train user for help with parallel software running on top of the MAC.  (Management + Proactive Maintenance + Helpdesk)

Privileged Access Management

A system to stop hackers from remotely escalating permissions on the desktops and installing malicious code or ransomware or pivoting to another computer or server on the network. It allows users to escalate permissions to install applications or printers but do so in a secure approach that doesn’t leave the system vulnerable to outside breaches. (Security + Monitoring + Compliance + Management + Helpdesk)

Remote Management Tool

A monitoring and management tool that saves time and money by giving NP engineers the ability to securely remote into the machine with the user’s permission and diagnose and solve the problem or provide user training if needed. IT allows Network People engineers to have a full team of resources, knowledge, and tools to identify and solve problems. This includes providing information so in depth about every computer and server on the network that our engineers have real time information about the firmware of the bios, the version of the operating system, all the software installed on system and their versions, technical information about setup of the computer, all the drivers, data, and much more. In addition, Network People has programmed custom scripts to identify issues automatically and resolve those issues without any user involvement. This saves you time and money. These custom scripts are continuously improved by watching for problems in the hundreds of networks that we manage, which helps us to identify and proactively prevent problems on your network. (Security + Monitoring + Compliance + Management + Proactive Maintenance)

Remote Management Tool (Mac)

Actively monitors for problems on devices before they happen and prevents downtime. Remote monitoring for and remediation of issues. Keeps track of every device in your network regardless of location. Real-time visibility of your inventory. (Security + Monitoring + Management + Compliance)

Server backup – Physical server

On-premises full image and file level server backup to protect your business and keep you up and running.  System schedules regular backups as often as hourly and creates differential backup sets (backups of recently changed files) for full recovery or file-based retrieval of data.   Image backups can be stored on local media (SAN, backup server, tape) and in redundant locations off-premises.   Backups are monitored and managed by the Network People team daily during normal business hours and tickets created automatically to have engineers repair if the backups fail. (Disaster Recovery + Management + Monitoring + Proactive Maintenance + Security + Compliance + Disaster Recovery + Business Continuity) 

Server backup – Virtual server

On-premises full image and file level server backup to protect your business and keep you up and running. System schedules regular backups as often as hourly and creates differential backup sets (backups of recently changed files) for full recovery or file-based retrieval of data.   Image backups can be stored on local media (SAN, backup server, tape) and in redundant locations off-premises.   Backups are monitored and managed by the Network People team daily during normal business hours and tickets created automatically to have engineers repair if the backups fail. (Disaster Recovery + Management + Monitoring + Proactive Maintenance + Security + Compliance + Disaster Recovery + Business Continuity) 

Server Room (NOC) Management

Maintain, configure, and support equipment in server room. Equipment includes rack, uninterruptable power supply (UPS), switch, firewall. *Labor to replace or repair hardware (actual hardware part must be purchased by client) *Conference with vendor to get warranty repair that client deserves *Fix normal, high, and critical issues (Disaster Recovery + Management + Monitoring + Proactive Maintenance + Security + Compliance + Disaster Recovery + Business Continuity + Helpdesk)

Unified Alerting, Documentation Management

Alerts to system compliance issues and resolves them which prevents downtime. Network People combines a powerful set of tools into a unified control panel to provide best in class alerting, documentation, inventory, and change management. Information about hardware and software is instantly gathered and documented. If the information shows that a system is out of compliance an alert is created. It also proactively identifies and resolves changes through these automated alerts and prevents downtime. Engineers can quickly evaluate the system using automated security, compliance, and network configuration alerts. The impact: The business can worry less because misconfigurations or security compliance issues are identified and alerted upon. Troubleshooting is easier because the history of the machine is recorded which makes it possible for engineers to go back in time to figure out what change caused the issue. (Disaster Recovery + Management + Monitoring + Proactive Maintenance + Security + Compliance)

Virtual Server Support

Daily monitoring and management of server and repair when needed to keep your network and team up and running. Network People engineers perform daily health checks before business hours. This includes runtime and stability, backed, critical errors. Then engineers verify additional health and security checks through monitoring and management of antivirus, anti-malware, system checks, alerts, hard drive maintenance, specific scripted repairs of known issues, ticket creation and closure. If an issue is detected, a ticket is created notifying client and an engineer is dispatched to perform the necessary service according to the SLA to restore normal functionality. If ticket requires repair to be done onsite, the engineer will go onsite. All the following repairs will be performed under the “unlimited” coverage of the server at no extra charge. Examples of such repairs include: *Fix Active Directory (AD) and Group Policy Objects (GPO) issues *Replace or repair hardware (actual hardware part must be purchased by client) *Conference with vendor to get warranty repair that client deserves *Restore data on hard drive or restore entire server (requires backup server) *Provide training, advice, troubleshooting, and general user support (Management + Helpdesk + Security + Compliance + Proactive Maintenance + Disaster Recovery + Business Continuity)

2FA Protection and Management

Prevents unauthorized access to email, Windows Domain, and Cloud accounts. This is designed to prevent unauthorized access to your network by requiring both a password and something you know (the second factor) to have access to the account. For example, a security code is sent to your cell phone. This system manages two-factor authentication (2FA, MFA) devices and improve security for remote desktop connections. This can be implemented for most third-party web facing applications including connecting to the corporate network remotely. Network People can manage the users to maintain high security and compliance, so the tool isn’t turned off by users, exposing the network to risk. (Security + Management + Compliance + Helpdesk)

3rd Party Application Updates

Maintains proper updates to network computers and servers to protect from hackers. Statistics show that as high as 97% of malicious code would be prevented from impacting computers and servers if they were properly and regularly updated. This tool and service allows your network computers and servers to maintain the proper updates both in Microsoft operating systems as well as third party applications. (Security + Compliance + Management + Proactive Maintenance)