Simple, transparent pricing. No surprises. No hidden fees.
Three service tiers designed to match your risk profile, compliance obligations, and growth stage. Every tier includes our standardized Datto RMM / ThreatLocker technology stack.
- 24/7 RMM monitoring & alerting (Datto RMM)
- Automated OS & third-party patch management
- Help desk support 24×7 (Tier 1–2)
- Microsoft 365 administration & M365 backup
- Endpoint antivirus & dark web monitoring
- Backup monitoring via Datto BCDR
- Asset inventory, MDM & lifecycle management
- Onboarding & offboarding workflows
- Security awareness training & phishing simulations
- Password management & credential vault
- Monthly performance & health reporting
- Everything in ESSENTIAL-CARE, plus:
- Advanced EDR — behavioral endpoint detection
- ThreatLocker Zero Trust — default-deny + Ringfencing™
- DNS/web filtering — blocks malicious traffic
- Email security — anti-phishing & BEC protection
- MFA enforcement & identity baseline hardening
- Monthly vulnerability scanning & remediation
- 24/7 alert triage — SOC-lite with escalation paths
- Backup management & restore testing (Datto BCDR)
- Quarterly security review & risk summary
- ThreatLocker Cyber Hero MDR — 24/7 human SOC
- Everything in SECURE-CARE, plus:
- Compliance framework alignment (CJIS, HIPAA, CMMC, GLBA)
- Full GRC platform — policy library, risk register
- Gap analysis & remediation tracking
- Audit readiness support & evidence management
- Automated internal & external penetration testing
- Active Directory attack simulation
- Incident response plan & tabletop exercises
- Vendor/third-party risk management
- Log retention & compliance reporting
- vCISO quarterly strategy sessions
- Ohio Safe Harbor program documentation
The numbers that make the decision obvious.
Pricing Questions
All pricing is per user, not per device. A user with a desktop, laptop, and phone counts as one user — not three devices. It's simpler, more predictable, and better aligned to how your business actually scales.
Standard agreements are 12–36 months. Longer terms typically qualify for preferred pricing. We work with you to structure terms that match your budget cycle and business planning horizon.
Absolutely. We design our tiers as an upgrade path — many clients start at ESSENTIAL-CARE or SECURE-CARE and move to COMPLY-CARE as compliance pressure increases. Upgrades are seamless within your existing agreement.
Onboarding and implementation are scoped separately based on your environment size and complexity. We provide a complete onboarding quote as part of your proposal so there are no surprises at kickoff.
Users are added at your contracted per-user rate. No penalty fees for growth. You add the user and we provision them to your documented security baseline — typically within one business day.
Get a precise quote for your organization.
Pricing is customized to your environment size, complexity, and compliance obligations. Start with a free assessment.