MITS Overview

Just like oven mitts protect your hands from the heat, BigO Services MITS (Managed IT Services) is the protection for your network. Managed IT Services (MITS) looks after your computer system and networking needs, so you don’t have to. With this bundle, your IT systems will continually be monitored and managed by an experienced team of IT ninjas. No more worrying about the performance of your heavily relied on technology.

Your company will experience a smooth break through into the digital world with the reliance of the Managed IT Services provided by BigO Support. We even include security training that will promote internet awareness to employees and keep your company’s information safe. With this package you will receive:

  • Unlimited Remote IT support
  • Remote Monitoring and Management
  • Detailed System Reports
  • Enterprise Antivirus software
  • Local and Cloud Backups *Additional fees for cloud storage
  • Security Awareness Training

All under one package with one point of contact. It gets even better, utilizing remote access technology this can all be done during off-peak hours to minimize down time. Thanks to our proactive approach to identifying and correcting issues before they happen you will be prepared for any technological storms that may strike.

[lgc_column grid=”25″ tablet_grid=”50″ mobile_grid=”100″ last=”false”]

Monitoring and Management

[/lgc_column]
[lgc_column grid=”25″ tablet_grid=”50″ mobile_grid=”100″ last=”false”]

Cyber Threat Protection

[/lgc_column][lgc_column grid=”25″ tablet_grid=”50″ mobile_grid=”100″ last=”false”]

Backup and Recovery

[/lgc_column]
[lgc_column grid=”25″ tablet_grid=”50″ mobile_grid=”100″ last=”true”]

Security Awareness

[/lgc_column]


Remote Monitoring and Management (RMM)

Our Remote Monitoring and Management software, paired with a skilled technician, monitors and protects your network. RMM allows technicians to run updates, defragmentation, and repairs to your network systems in most cases without having to disrupt your business. All scans and updates occur outside of peak working hours, meaning less down time and less wasted money. Regular reports will give insight into your network. This allows you to plan and budget for any future technological expenses to improve your network. RMM gives you the benefits of technical support without the down time, while also working with you to improve your organizations cyber footprint.

[lgc_column grid=”33″ tablet_grid=”50″ mobile_grid=”100″ last=”false”]

Remote Management

Remote monitoring and management of your workstations, servers, routers, printers and other network devices to ensure your IT network is always healthy and secure.

[/lgc_column]
[lgc_column grid=”33″ tablet_grid=”50″ mobile_grid=”100″ last=”false”]

Patch Management

Identification and automatic updating of all software patches and hotfixes to all your devices, giving you the peace of mind that all patches are up-to-date, and your system will continue running at optimal performance.

[/lgc_column]
[lgc_column grid=”33″ tablet_grid=”50″ mobile_grid=”100″ last=”true”]

Antivirus Management

Comprehensive monitoring of antivirus reports critical threats. Remote deployment of virus definitions and updates so you know your system is always protected.

[/lgc_column]

[lgc_column grid=”33″ tablet_grid=”50″ mobile_grid=”100″ last=”false”]

System Monitoring

Monitoring Windows event logs and apply immediate remediation of critical events safeguard your network against unexpected crashes and data loss.

[/lgc_column]
[lgc_column grid=”33″ tablet_grid=”50″ mobile_grid=”100″ last=”false”]

Hardware and Software Inventory

Collection and tracking of hardware and software inventory from Windows, Mac, and Linux operating systems so you have a complete record of all your IT assets.

[/lgc_column]
[lgc_column grid=”33″ tablet_grid=”50″ mobile_grid=”100″ last=”true”]

Network Monitoring

Monitoring and controlling critical items in your infrastructure through powerful monitors and scripts to ensure potential issues are identified and resolved before they can affect your network performance.

[/lgc_column]


ESET Endpoint Antivirus

ESET Endpoint Antivirus is an award-winning multilayered anti-malware protection you’ll be safe from viruses, malware, and ransomware by using the following techniques:

[lgc_column grid=”33″ tablet_grid=”50″ mobile_grid=”100″ last=”false”]

Machine Learning

All ESET endpoint products currently use machine learning in conjunction with all our other layers of defense and have done so since 1997. Specifically, machine learning is used in the form of consolidated output and neural networks.

[/lgc_column]
[lgc_column grid=”33″ tablet_grid=”50″ mobile_grid=”100″ last=”false”]

Ransomware Shield

An additional layer protecting users from ransomware. This technology monitors and evaluates all executed applications based on their behavior and reputation. It is designed to detect and block processes that resemble the behavior of ransomware.

[/lgc_column]
[lgc_column grid=”33″ tablet_grid=”50″ mobile_grid=”100″ last=”true”]

Network Attack Protection

Our technology improves detection of known vulnerabilities on the network level. It constitutes another important layer of protection against spreading malware, network-conducted attacks, and exploitation of vulnerabilities for which a patch has not yet been released or deployed.

[/lgc_column]

[lgc_column grid=”33″ tablet_grid=”50″ mobile_grid=”100″ last=”false”]

Advanced Memory Scanner

A unique ESET technology which effectively addresses an important issue of modern malware—heavy use of obfuscation and/or encryption. Advanced Memory Scanner monitors the behavior of a malicious process and scans it once it decloaks in memory.

[/lgc_column]
[lgc_column grid=”33″ tablet_grid=”50″ mobile_grid=”100″ last=”false”]

In-Product Sandbox

Helps to identify the real behavior hidden underneath the surface of obfuscated malware. Utilizing this technology, ESET solutions emulate different components of computer hardware and software to execute a suspicious sample in an isolated virtualized environment.

[/lgc_column]
[lgc_column grid=”33″ tablet_grid=”50″ mobile_grid=”100″ last=”true”]

Exploit Blocker

ESET Exploit Blocker monitors typically exploitable applications (browsers, document readers, email clients, Flash, Java, and more) and instead of just aiming at particular CVE identifiers, it focuses on exploitation techniques. When triggered, the threat is blocked immediately on the machine.

[/lgc_column]


Backups Plus (BP)

Backup Plus (BP) is a proven and complete data protection solution for IT environments of all shapes and sizes. With an easy-to-use, touch-friendly, web-based management console, you can reliably back up and recover physical, virtual, and cloud workloads wherever data lives. With BP Active Protection working to thwart ransomware, enhanced backup validation, and blockchain-based authentication of your backups with Acronis Notary, BP is the most reliable backup solution available today.

[lgc_column grid=”33″ tablet_grid=”50″ mobile_grid=”100″ last=”false”]

Complete Control

Maintain complete control over the location of your data, systems, and backups, improve regulatory compliance, and ensure data sovereignty.

[/lgc_column]
[lgc_column grid=”33″ tablet_grid=”50″ mobile_grid=”100″ last=”false”]

Full Disk-Image Backups

Safeguard your entire business by easily, reliably and frequently backing up the entire system as a single file. In the event of a data disaster, it allows for a move to new hardware and a swift restore of all information.

[/lgc_column]
[lgc_column grid=”33″ tablet_grid=”50″ mobile_grid=”100″ last=”true”]

Active Protect

Prevent ransomware attacks with BP Active Protection, which detects and proactively blocks unauthorized encryption of files and backups.

[/lgc_column]

[lgc_column grid=”33″ tablet_grid=”50″ mobile_grid=”100″ last=”false”]

Compliance and Validity

Improve compliance and establish validity of recovery with Acronis Notary™, which ensures authenticity and integrity of your data and backups with blockchain.

[/lgc_column]
[lgc_column grid=”33″ tablet_grid=”50″ mobile_grid=”100″ last=”false”]

Granular Recovery

Search for specific documents, emails, and the like, and restore just the data you need without having to recover the full databases or systems.

[/lgc_column]
[lgc_column grid=”33″ tablet_grid=”50″ mobile_grid=”100″ last=”true”]

Compatibility

Backup Plus is not just limited to all versions of Windows, Mac, and Linux workstations but also servers, virtual machines, mobile devices, Office 365, and websites.

[/lgc_column]


Security Essentials & Training (SET)

Security Essentials & Training (SET) is all about preparing your staff for the dangers of the cyber world. With SET you will receive online interactive training for all your staff members. In addition, you will also receive 1 Dark Web Breach Assessment, and 1 Simulated Phishing campaign.

[lgc_column grid=”33″ tablet_grid=”50″ mobile_grid=”100″ last=”false”]

Security Training Course

The Security Training course is an online interactive video series focuses on how to spot potential threat and how to react if a breach does occur. After completing the course videos users will be required to pass an interactive exam to receive a certification of completion, which is a great way to show the world your team is prepared to handle real life cyber threats.

[/lgc_column]
[lgc_column grid=”33″ tablet_grid=”50″ mobile_grid=”100″ last=”false”]

Dark Web Breach Assessment

Our team of trained technicians will also perform a Dark Web Breach Assessment on your company’s domain(s) (max. 3 domains) and email addresses. We scan the dark web for accounts that have already been involved in a breach, like the 2013 yahoo.com data breach, and inform you which users were affected.

[/lgc_column]
[lgc_column grid=”33″ tablet_grid=”50″ mobile_grid=”100″ last=”true”]

Simulated Phishing Campaign

Keep your staff on their toes and confirm training has being retained by preforming a Simulated Phishing campaign. We will send safe phishing email to your users and generate a report showing which users fall victim to the “attack” so extra training can be given to those users that require it.

[/lgc_column]

* Security Plus (SP)

Security Plus (SP) adds even more to your Security Essentials & Training packages.  In addition to everything included with SET you’ll receive Unlimited Dark Web Breach Assessments, Unlimited Simulated Phishing Campaigns, Employee Vulnerability Assessment (EVA), Security Risk Assessment, Security Policies & Procedures, Monthly Security Newsletters, and Weekly Micro-Training Security Videos.

[lgc_column grid=”33″ tablet_grid=”50″ mobile_grid=”100″ last=”false”]

Security Policies & Procedures

A platform for delivering easy-to-understand, written security policies and procedures. The policies address topics such as network security, computer use, bring your own device, physical security, and termination. Employees are required to electronically sign and acknowledge understanding of each policy.

[/lgc_column]
[lgc_column grid=”33″ tablet_grid=”50″ mobile_grid=”100″ last=”false”]

EVA

Employee Vulnerability Assessment (EVA) provides you with an insight into which users run the highest risk of causing a data breach. By combing users Security Training Scores, Simulated Phishing Attack Fail Rate, and External Data Breach Rates each user is given an Employee Secure Score (ESS). Users then compete to be on top of the interactive leaderboard and receive tips and reminders on ways to improve their security best practices.

[/lgc_column]
[lgc_column grid=”33″ tablet_grid=”50″ mobile_grid=”100″ last=”true”]

Security Risk Assessment

The Security Risk Assessment starts by answer a few questions that then generates a detailed report showing where security gaps are within your organization. We then provide you with recommendations on ways to address these gaps so you can get a handle on the problem before a breach happens.

[/lgc_column]

[lgc_column grid=”50″ tablet_grid=”50″ mobile_grid=”100″ last=”false”]

Monthly Security Newsletters

Since security threats are constantly changing it is important to keep your users up to date with the latest trends. We’ll send your users a monthly security awareness eNewsletter with fun tips to keep users safe both in the office and at home.

[/lgc_column]
[lgc_column grid=”50″ tablet_grid=”50″ mobile_grid=”100″ last=”true”]

Weekly Micro-Training Security videos

Engaging and interactive micro-training lessons emailed weekly to your users. The lessons are focused on current important topics like phishing scams, ransomware, and the physical protection of devices.

[/lgc_column]

*Security Insurance (SI)

Security Insurance (SI) is an add-on to Security Essentials & Training (SET) that provide additional assistance in cases that a breach does happen.  With a $100,000 insurance policy backed by AIG and access to Breach Forensics Team, Breach Counseling Services, and Breach Notification and Monitoring to affected individuals.  You’ll have the peace of mind knowing that if a breach does happen we’ll be here to help mitigate the damage and get you through it.