Plans that scale with your business— without mystery math.
See the operating lanes, compare response models, then run both a monthly cost estimate and ROI scenario before you ever send an email.
Illustrative pricing • final scope validated in discovery
10–14 day onboarding
Typical move from intake to active instrumentation
24/7 monitoring option
After-hours coverage for production-critical systems
Security + audit readiness
SOC 2, HIPAA, and control-evidence habits built in
Roadmaps with SLAs
Monthly operating reviews and clear escalation ownership
Choose your operating lane
Start with the level of support and security depth you actually need, then tailor the engagement once the environment and business goals are clear.
Essentials
$99 / user / mo
Reliable support, patching, backup oversight, and monitoring for teams that need a calm baseline fast.
Best for
Small teams standardising support and device hygiene
Response model
Standard business-hours response with monitored escalation
- Monitoring and alerting across endpoints
- Patch management with monthly reporting
- Backup oversight and restore coordination
- Helpdesk workflows with documented ownership
Growth
$149 / user / mo
Adds stronger identity, security baselines, and roadmap leadership for companies scaling their stack.
Best for
Hybrid teams that need proactive IT plus stronger governance
Response model
Priority response and quarterly roadmap reviews
- Everything in Essentials
- Identity hardening with MFA and SSO support
- Security baseline and policy templates
- Quarterly roadmap review with action items
Secure+
$199 / user / mo
Advanced security depth and incident readiness for regulated or high-visibility environments.
Best for
Healthcare, finance, SaaS, and audit-heavy teams
Response model
Accelerated security response plus readiness playbooks
- Everything in Growth
- Managed EDR and response workflows
- Security awareness program support
- Compliance readiness and evidence habits
Custom
Quoted
Built for multi-site operations, cloud-heavy estates, dedicated security programs, or product/platform engineering.
Best for
Complex environments with layered delivery or vCISO needs
Response model
Custom escalation matrix, SLAs, and operating cadence
- Custom device, server, and site-based pricing
- Dedicated security and architecture leadership
- Cloud migration or application workstreams
- Delivery model tuned to business-critical operations
SLA and capability comparison
Use this matrix to understand how support depth, security posture, and strategic involvement change as you move up the stack.
| Capability | Essentials | Growth | Secure+ | Custom |
|---|---|---|---|---|
| Helpdesk and support coverage | Business-hours + monitored escalation | Priority queue + proactive review | Priority queue + security-aware triage | Custom routing and escalation matrix |
| Endpoint / device management | Core monitoring and patching | Enhanced hygiene + policy controls | Advanced hardening and reporting | Cross-site and bespoke fleet strategy |
| Identity and access security | Foundational guidance | MFA, SSO, and access review support | Advanced identity governance | Program-level identity architecture |
| Incident readiness | Escalation playbook light | Documented response ownership | Managed response workflows | Dedicated security program alignment |
| Quarterly strategic reviews | Optional add-on | Included | Included with security emphasis | Included with executive cadence |
| Cloud / platform modernization | Light advisory | Planned workstreams | Security-led modernization | Dedicated engineering tracks |
Estimate monthly cost
Use the model to sanity-check budget before discovery. We’ll validate assumptions and produce a tighter scope once we understand your environment.
Tier
Add-ons
Estimated monthly total
$3,750
- Base
- $3,750
- Add-ons
- $0
Tip: For device-based pricing (servers/workstations), we’ll scope your inventory during discovery.
Model business impact
Translate reduced downtime, stronger security controls, and fewer emergency projects into a rough payback story for leadership.
Pricing FAQs
The most common questions around scope, timelines, and audit-ready delivery—answered before you need a meeting.
Yes. We frequently partner with internal IT, engineering, or security teams and take ownership of monitoring, escalations, project execution, or reporting where it helps most.
The biggest drivers are user/device counts, server footprint, compliance scope, after-hours response expectations, and whether the engagement includes security depth or cloud/platform workstreams.
Many SMB and mid-market environments can move from intake to active instrumentation within 10–14 days. More complex estates may require a phased rollout.
We help implement controls, evidence habits, and operational practices that support readiness. We do not act as your formal auditor, but we make auditor conversations much less painful.
Want a best-fit quote instead?
Send over user counts, critical apps, compliance needs, and any current pain points. We’ll reply with the right plan and the likely rollout shape.