Build Your ProActive Ecosystem
Modern IT built for security, continuity, and compliance — not just support tickets. Keep your team moving with Zero-Trust access, insurance-ready backups, and automation that fixes issues before users feel them.
View Plans & PricingWhat You Get With ProActive Ecosystem
We own the risk surface across identity, endpoints, cloud, backups, and network — and prove it with regular reviews.
Zero-Trust Security
Identity-aware access, mandatory MFA, and 24/7 endpoint protection across your entire environment.
Cloud-First Network
SASE that protects users anywhere — no legacy firewall dependence.
Cyber Insurance Ready
MFA, EDR/XDR, tested backups, and awareness training that match carrier checklists.
Instant Continuity
Server failover + workstation backups keep you operating during outages.
Intelligent Automation
Self-healing remediation for common risks and IT issues.
Compliance Enablement
HIPAA, GDPR, FTC Safeguards, and audit support in higher tiers.
For Startups & Small Offices
Real security, backup, and guidance for teams of 1–6 users — without hiring in-house IT.
Custom Buildout
For startups & small offices (1–6 users)
Minimum $750/mo (covers up to 6 users)
- Core Platform: Centralized identity & device management
- Endpoint Security: Anti-malware, DNS filtering, safe email
- Backup Foundation: Workstation file-level protection
- Human Firewall: Training & phishing simulations
- Support: Business-hours helpdesk & remote assist
- Monthly Reviews: Patching, device health, risks
- Bonus: Choose ONE (MDR, Passwordless, Continuity, or Cloud Gateway)
DE Essentials Monitoring
Baseline visibility & protection (1–3 users)
Flat rate for 1–3 users
- Monitoring agents on covered systems
- Automatic patching & update enforcement
- Security alerts for malware & risky activity
- Basic XDR security for up to 3 devices
- Monthly health & security status reports
- Ticket submission for on-demand support
For Growing Teams
Full security ops, managed backups, zero-trust networking, and continuity for 5–50 users.
Managed Security & Continuity
Secure-by-default operations for cloud-first teams
$1,200/mo minimum (5 users)
- CloudShield SASE: Identity-aware access
- Identity & Access: MFA/SSO & permissions
- Advanced Endpoint: XDR + 24/7 MDR
- Email Security: Anti-phish, encryption, DLP
- Continuity: Instant failover for critical systems
- Training & phishing simulations
- Passwordless data protection (Atakama)
- Unlimited business-hours help desk
- Automation & self-healing
- Quarterly DR validation for insurers
Network Integration & Infrastructure
Security modernization for existing network hardware
Minimum covers 10 users
- SASE overlay without rip-and-replace
- Support for Meraki, Cisco, SonicWall, UniFi
- Includes: Everything in Managed Security & Continuity
- Remote access control & segmentation
- Lifecycle planning w/ minimal downtime
- Current-state diagrams & addressing
- Upgrade paths: Office Network, CloudShield, Unified
For Regulated Industries
Multi-site orgs with audits, board accountability, or contractual compliance requirements.
Managed Compliance (Zero-Trust)
Compliance-driven operations with executive reporting
$3,500/mo minimum (10 users)
- Includes: Full Network Integration stack
- HIPAA, GDPR, FTC Safeguards alignment
- vCISO services & board reporting
- Annual pen test & remediation
- Live SOC reporting & forensic logging
- Defined incident response
- DLP enforcement & vendor review
- Insurance documentation
Enterprise & Multi-Site
Flexible governance for 50–200+ users
Based on users, sites, and requirements
- Centralized policy across locations
- 24/7 SOC with named contacts
- Network design & rollout (HW + SASE)
- Multi-region DR & warm-site options
- Roadmap & lifecycle planning
- Priority escalation handling
- Custom frameworks (FINRA, CMMC, PCI, NIST)
Compare ProActive Ecosystem Plans
Find the right level of protection and management
| Features & Services | Custom Buildout $750 + $125/user | Essentials Monitor $500/site | Managed Security $240/user | Network Integration $2,500 + $250/user | Compliance $350/user |
|---|---|---|---|---|---|
| Security & Protection | |||||
| Endpoint Security (EDR/XDR) | ✓ | Basic | ✓ | ✓ | ✓ |
| 24/7 Managed Detection & Response (MDR) | Optional | ✗ | ✓ | ✓ | ✓ |
| Email Security & Anti-Phishing | ✓ | ✗ | ✓ | ✓ | ✓ |
| Security Awareness Training | ✓ | ✗ | ✓ | ✓ | ✓ |
| Data Loss Prevention (DLP) | ✗ | ✗ | ✓ | ✓ | ✓ |
| Baseline Threat Protection | ✓ | ✓ | ✓ | ✓ | ✓ |
| Data Safeguards & Identity Controls | ✓ | ✓ | ✓ | ✓ | ✓ |
| SaaS App Security Monitoring | Optional | ✗ | ✓ | ✓ | ✓ |
| Dark Web Monitoring | ✗ | ✗ | ✓ | ✓ | ✓ |
| SIEM / SOC | ✗ | ✗ | ✓ | ✓ | ✓ |
| Security & Compliance Reporting | ✗ | ✗ | Monthly | Monthly | Weekly |
| Identity & Access | |||||
| Centralized Identity Management | ✓ | ✗ | ✓ | ✓ | ✓ |
| Multi-Factor Authentication (MFA) | ✓ | ✗ | ✓ | ✓ | ✓ |
| Passwordless Protection (Atakama) | Optional | ✗ | ✓ | ✓ | ✓ |
| Single Sign-On (SSO) | Optional | ✗ | ✓ | ✓ | ✓ |
| Network & Connectivity | |||||
| CloudShield SASE | Optional | ✗ | ✓ | ✓ | ✓ |
| Legacy Network Hardware Support | ✗ | ✗ | ✗ | ✓ | ✓ |
| Network Segmentation & Zero Trust | ✗ | ✗ | Basic | ✓ | ✓ |
| LAN / WAN Management | Add-On | Add-On | Add-On | ✓ | Included as needed |
| MDM (desktop & mobile) | Optional | Add-On | ✓ | Full policy | Full policy |
| Backup & Continuity | |||||
| Workstation Backups | ✓ | ✗ | ✓ | ✓ | ✓ |
| Instant Server Failover | Optional | ✗ | ✓ | ✓ | ✓ |
| Quarterly DR Testing | ✗ | ✗ | ✓ | ✓ | ✓ |
| Server Backup | Optional | Add-On | Key servers | Key servers | All servers |
| SaaS Suite Backup (mail/files) | Optional | Optional | ✓ | ✓ | ✓ |
| DR Runbooks | ✗ | ✗ | ✗ | ✗ | Included |
| Support & Management | |||||
| Remote Monitoring & Management | ✓ | ✓ | ✓ | ✓ | ✓ |
| Help Desk Support | Business Hours | On-Demand | Unlimited | Unlimited | Priority |
| Intelligent Automation | ✗ | ✗ | ✓ | ✓ | ✓ |
| IT Documentation & Knowledge Base | Standard | ✗ | Comprehensive | Full | Full + Client access |
| Asset & Warranty | Basic | ✗ | Full | Lifecycle + budgeting | Lifecycle + budgeting |
| Executive Reporting & QBRs | Semi-annual | ✗ | Quarterly | Quarterly | Monthly |
| IT Governance & Roadmaps | ✗ | ✗ | ✗ | ✗ | Included |
| vCIO | Semi-annual | ✗ | Quarterly | Quarterly | Monthly |
| Compliance & Governance | |||||
| Cyber Insurance Requirements Met | Basic | ✗ | ✓ | ✓ | ✓ |
| Regulatory Alignment (HIPAA, GDPR, FTC) | ✗ | ✗ | ✗ | ✗ | ✓ |
| vCISO Services | ✗ | ✗ | ✗ | ✗ | ✓ |
| Annual Penetration Testing | ✗ | ✗ | ✗ | ✗ | ✓ |
| Policies & ISMS | Add-On | ✗ | Included | Included | Included |
| Risk Register | ✗ | ✗ | Annual | Annual | Quarterly |
| Vendor Due Diligence | Basic | ✗ | Standard | Standard | Advanced |
| Compliance Portal & Reports | ✗ | ✗ | Included | Included | Included |
| Audit Preparation | ✗ | ✗ | ✗ | ✗ | Coached |
| Governance Workshops | ✗ | ✗ | Semi-annual | Semi-annual | Quarterly |
| Workplace & Productivity | |||||
| Account Setup & Offboarding (major suites) | Standard | ✗ | Standard + devices | Standard + devices | Advanced + automation |
| New-Hire Kits & Device Provisioning | Optional | ✗ | Included (standard builds) | Included (standard builds) | Included (custom builds) |
| Email, Calendar & Contacts | ✓ | ✗ | ✓ | ✓ | ✓ |
| Team Chat & Video Meetings | ✓ | ✗ | ✓ | ✓ | ✓ + Admin controls |
| Drive & Document Sharing | Team drives | ✗ | + retention | + retention | + data-loss protection |
| HR Forms & Approvals (PTO, access, changes) | Templates | ✗ | Automated flows | Automated flows | + HRIS sync |
| eSignature & Agreements | Optional | ✗ | ✓ | ✓ | ✓ + templates |
| Intranet & Announcements | Basic news page | ✗ | Branded hub | Branded hub | Hub + audiences |
| Training Library & How-To Guides | Starter set | ✗ | Role-based | Role-based | Role-based + custom |
| Identity & Access for Roles/Teams | Groups | ✗ | SSO mapping | SSO mapping | + conditional access |
| App Provisioning (SSO) | Manual | ✗ | Catalog-based | Catalog-based | Catalog + rules |
| Employee Lifecycle Analytics | ✗ | ✗ | Quarterly | Quarterly | Monthly |
Partner With Your Existing IT Team
Your team handles tickets & deskside support. We own security, identity, compliance, network, voice, and data protection — with governance that auditors & insurers accept.
Co-Managed Security Foundation
All specialty add-ons build on this baseline. It creates alignment, governance, and reporting.
Risk Assessment
- Full risk profile & gap analysis
- Prioritized remediation roadmap
- Executive score & register
Business Reviews
- 2× Technology Reviews / year
- Budget & lifecycle planning
- Roadmap alignment
Security Reviews
- 2× posture reviews / year
- Policy & response readiness
- Risk register updates
Protection Stack
- Cloud security enforcement
- Malware & phishing defense
- Email & endpoint protections
Lifecycle & Asset Planning
- Hardware & software lifecycle strategy
- Warranty / refresh budgeting
- Roadmap for critical upgrades
Governance & Alignment
- Exec-facing status & accountability
- Policy & standards alignment
- Action items tracked to owners
5 user minimum • Annual agreement
Specialty Add-On Services
Choose only what you need. We operate these while your IT runs day-to-day support.
Data Security
Encryption, access control, and secure sharing
- File & Email Encryption (Atakama)
- Zero-knowledge access control
- Multi-key protection (insider theft)
- DLP with policy-based controls
- Secure file transfer enablement
- Ransomware impact mitigation
- Monthly exposure/access reports
Network Architecture
Secure network design & enforcement
- Segmentation & Zero-Trust access
- Firewall/remote access/VPN policy
- Branch connectivity & SASE integration
- Wi-Fi / VLAN governance
- Performance + security tuning
- Infrastructure upgrade roadmap
Workplace Management
Microsoft 365 • Google Workspace • Zoho
- User provisioning / deprovisioning
- Licensing & group/role management
- Exchange/Gmail security hardening
- SharePoint/Drive/WorkDrive governance
- Retention, legal hold, policy enforcement
- Teams/Meet/Zoom governance
UCaaS: Voice & Meetings
Cloud calling, meetings, and SMS — fully managed
- Number procurement/porting, E911, CNAM
- Auto attendants, IVR, queues, hunt groups, schedule-based routing
- Platform mapping & policies (call flows, retention, recording)
- Handset/app provisioning standards; QoS recommendations
- SASE alignment for voice quality
- Quarterly usage/quality report
Backup & Disaster Recovery
Enterprise-grade backup with rapid recovery
- Automated daily backups for all systems
- Cloud & local backup retention
- Instant VM recovery & file-level restore
- Quarterly disaster recovery testing
- Documented recovery procedures
- Ransomware recovery capabilities
- Monthly backup verification reports
Compliance & Governance
Framework alignment & audit readiness
- HIPAA, GDPR, FTC Safeguards, SOC 2 alignment
- Policy & procedure documentation
- Risk assessment & management
- Vendor risk assessments
- Annual penetration testing
- Audit preparation & support
- Quarterly compliance reviews
Co-Managed Managed Suites (Scope • Deliverables • Exclusions)
Microsoft 365 Managed Suite
Scope
- Tenant hygiene & security baselines (MFA, conditional access, DLP/retention)
- Mail hygiene (SPF/DKIM/DMARC), transport rules, anti-phish tuning
- Identity sync with JumpCloud (if present) or Entra basics
- SharePoint/OneDrive governance, Teams lifecycle & guest controls
- License automation; group/role management; JML workflows
Deliverables
- Quarterly security score review with actions
- Quarterly mailbox/Teams/SharePoint hygiene report
- JML SLA: business hours, priority windows
Google Workspace Managed Suite
Scope
- Org units, groups, 2SV/MFA, context-aware access baselines
- Gmail anti-phish/anti-spam posture, DKIM/DMARC enforcement
- Drive/Shared Drives governance & external sharing controls
- Calendar/resources, rooms, booking policies
- License automation & JML workflows
Deliverables
- Quarterly admin posture report & remediations
- Sharing exposure review (risky external links)
- Priority-based JML response
Zoho Workplace Managed Suite
Scope
- Zoho Mail/WorkDrive/Docs security configuration & lifecycle
- Groups, shared spaces, retention/policy setup
- Identity mapping with JumpCloud (if present)
- License & group automation; JML workflows
Deliverables
- Quarterly security & exposure review
- Policy drift checks & remediation guidance
UCaaS Managed Voice & Meetings
Scope
- Number procurement/porting, E911, CNAM
- Auto attendants, IVR, queues, hunt groups, schedule-based routing
- Platform mapping & governance policies (call flows, retention, recording)
- Handset/app provisioning standards; QoS recommendations
- SASE alignment for voice quality
Deliverables
- Call-flow diagram + change log
- Quarterly usage/quality report
Ready to Build Your ProActive Ecosystem?
Whether you want fully managed IT or to strengthen the IT you already have, we'll build the stack that fits your risk profile, budget, and growth plans.
Schedule a Consultation