Managed Service Provider
Proactive protection, monitoring & alerting for your business
Why managed services?
Managing and keeping internal IT operations running smoothly can be time consuming and complicated. With internal IT operations stretched thin, vulnerabilities often go undetected, patches are missed, and your business-critical data could be at risk. By using Magtech Solutions as your trusted IT service provider, we will focus on proactively protecting your business and handling your IT needs so you can focus on building your business.
By using Magtech as your managed IT service and support provider, you can rest assured that your business will be constantly up to date with the latest relevant technological innovations, run optimally, securely and efficiently on an affordable budget. Additionally, we partner with best-in-class technology vendors to ensure access to a wide range of leading technology providers, providing your organization with responsive support, layered cyber security solutions, cloud solutions, Magtech cloud back up, disaster recovery and genuine IT products.
Cognizant of the fact that each customer has unique needs, we customize our plans according to needs assessment and we also appoint a dedicated account manager who will work closely with you to deliver the technology that your organization needs today and the roadmap to evolve your needs for the future.
Furthermore, we also provide disaster recovery services and support so that your data can be readily restored in the event of a disaster. Whether you are looking to fully out source your entire IT infrastructure, co-source part of your IT services, consult some IT expertise or align your organizational strategy with IT, we are your to-go-to people.
What to expect from us
Improved productivity – We focus on maintaining and strengthening your business environment, so that you can focus on your business. With services like hard drive health checks, on-time patches, and regular vulnerability assessments, we’re able to provide you with up-to-date systems that minimize your downtime and help keep your employees productive.
Increased protection – Benefit from proactive protection. With our proactive protection approach, we can provide features like full-stack next generation AI-based protection to mitigate risks from ransomware, malware, and cryptominers.
Affordable expertise – Gain access to our experienced technicians and a knowledgeable support team at an affordable monthly cost. We understand the technical components needed to secure your business. You can focus on what you do best.
Industry compliance – We can adjust our approach to help you meet your unique industry standards and compliance requirements. Our technicians will help make sure that your business-critical data is safe, secure, and compliant.
Peace of mind – Sleep better at night and work more efficiently during the day! We’ve got your IT protection covered so you can focus on building a more profitable business.
OUR MANAGED SERVICES PLANS | |||
---|---|---|---|
ESSENTIALS | STANDARD | PREMIUM | |
Proactive Planning, Consulting and Reporting Services | |||
Onboarding Assessment | ✔ | ✔ | ✔ |
Virtual CIO Services | ADD-ON | ADD-ON | ADD-ON |
Support | |||
Unlimited Support* | ✔ | ✔ | ✔ |
Unlimited Emergency On-site Response | ADD-ON | ADD-ON | ✔ |
Scheduled On-site Dedicated Engineer | ✔ | ✔ | ✔ |
Unlimited After Hours Support | BILLABLE | BILLABLE | ✔ |
Scheduled Hardware Servicing | ✔ | ✔ | ✔ |
Support For User Applications | ✔ | ✔ | ✔ |
Proactive System Monitoring, Alerting & Maintenance For Core Infrastructure | |||
Windows Servers - Physical and Virtual | ✔ | ✔ | ✔ |
Desktops - Physical and Virtual | ✔ | ✔ | ✔ |
Firewalls - Physical and Virtual | ADD-ON | ✔ | ✔ |
Network and Network Switching - Physical and Virtual | ✔ | ✔ | ✔ |
Server, SAN and SaaS Backups | ADD-ON | ✔ | ✔ |
Cloud Application Services (Office 365, Azure, AWS e.t.c) | ADD-ON | ADD-ON | ✔ |
UPS Systems | ✔ | ✔ | ✔ |
Managed Patch Management and Updates | ✔ | ✔ | ✔ |
Security | |||
Managed Anti-Virus and Anti-Malware | ADD-ON | ✔ | ✔ |
Simulated Phishing Attack | ADD-ON | BI-ANNUALLY | QUARTERLY |
Vulnerability Scan and Penetration Tests | ADD-ON | BI-ANNUALLY | QUARTERLY |
Data Archiving | ADD-ON | ADD-ON | ADD-ON |
Management | |||
IT Documentation | ✔ | ✔ | ✔ |
Monthly Executive Report | ADD-ON | ADD-ON | ✔ |
Asset and Inventory Management Report | ADD-ON | ✔ | ✔ |
IT Budget Preperation | ADD-ON | ✔ | ✔ |
Technology Business Review Meeting | ADD-ON | BI-ANNUALLY | QUARTERLY |
Training | |||
Security Awareness Training | ✔ | ✔ | ✔ |
End-User Training Program | ADD-ON | ✔ | ✔ |
Technology Adoption Session | BI-ANNUALLY | QUARTERLY | MONTHLY |
Services | |||
Office 365 Backup | ADD-ON | ADD-ON | ✔ |
Backup, Recovery as a Service | ADD-ON | ADD-ON | ✔ |
Monthly Backup Testing | ADD-ON | ✔ | ✔ |
Simulated BDR Test | ADD-ON | ADD-ON | ✔ |
1. You can find your Guaranteed Response Times (SLA) listed in our MSP Agreement | |||
2. You can send in as many service requests as you like for any of the items in our Inclusion List |
Take the first step towards peace of mind.
REQUEST FREE CONSULTATION