Award Winning
IT & Comms
Since 2005
Global Reach, Local Support
Empowering SMBs and SMEs through IT & Comms Solutions Excellence…
Our ‘Enterprise’ and ‘Pro’ Managed IT Solutions ensure that users are provided with a guaranteed level of support, as well as providing 24/7 Monitoring and protection for your systems and data, including a range of features, ensuring the right fit for your business.
But for a comprehensive Cyber Security solution, adding our Cyber+ Suite to your Managed IT service provides you with the confidence that your business, your data and your users are in safe hands…
Our Cyber+ Suite, as an add-on to our Managed IT services, includes the following protection features…
24/7 SOC
Our Security Operations Centre (SOC) operates 24/7, monitoring and analysing your network to identify potential security incidents in real-time. This constant vigilance provides peace of mind, as expert analysts are on hand to investigate, respond, and mitigate threats, ensuring continuous protection for your network and minimising the risk of a security breach.
Managed Detect & Response
Managed Detect & Response (MDR) combines proactive threat detection with expert response. Through continuous monitoring, analysis, and rapid reaction to threats, MDR stops attacks before they can disrupt your business. Our team provides insight and support to address incidents effectively, making sure threats are neutralised quickly and efficiently.
PCI DSS, NIST, & HIPAA Compliance
We simplify compliance with standards like PCI DSS, NIST, and HIPAA, helping you protect sensitive information and meet regulatory requirements. By implementing best practices and regular audits, our service mitigates risks associated with data handling, reduces the likelihood of fines, and strengthens trust with clients by demonstrating strong security protocols.
Endpoint Protection
Our Endpoint Protection solution safeguards all devices within your network, from desktops to mobile devices, blocking malware, ransomware, and unauthorised access. By monitoring and managing each endpoint, we stop cyber threats at the source, ensuring comprehensive security across your IT infrastructure and maintaining seamless protection for all users.
Network Protection
With robust network protection, we secure your entire network, preventing unauthorised access and monitoring traffic for suspicious behaviour. This includes advanced intrusion detection and automated threat response, creating a secure foundation that prevents breaches, protects data, and allows you to operate confidently across all connected systems and locations.
Traffic Perimeter
Our Traffic Perimeter service inspects all data flowing into and out of your network, identifying and blocking potential threats. By managing data flow and securing your network’s boundaries, this layer of security ensures that harmful traffic is filtered out, significantly reducing the risk of cyber threats breaching your network defences.
Malware / IoCs
We actively scan for Indicators of Compromise (IoCs) linked to malware, identifying malicious activity before it impacts your business. By focusing on these early warning signs, we provide targeted countermeasures to prevent malware from spreading, minimising its impact and protecting your organisation from widespread damage.
Fileless Attacks
Fileless attacks bypass traditional antivirus measures by operating directly in memory, making them challenging to detect. Our defence system is equipped to identify these advanced threats by monitoring behavioural patterns and memory activity, ensuring comprehensive protection against attacks that could otherwise evade conventional security solutions.
Behavioural Anomalies
Using behavioural analytics, we detect unusual activities and deviations from typical patterns across users and devices, which may signal potential cyber threats. This early-warning approach identifies threats before they escalate, allowing rapid response to compromised accounts or devices and maintaining security for your organisation.
Machine Learning
Our Machine Learning-driven defences analyse patterns and learn from new data, evolving with the cyber threat landscape. This self-improving model enhances the detection of emerging threats, adapting its defences to prevent novel attacks, and ensuring ongoing protection as cyber threats continue to grow in sophistication.
Endpoint Isolation
In the event of a breach, Endpoint Isolation swiftly quarantines affected devices, cutting off network access to prevent malware from spreading. This capability minimises potential damage and disruption, allowing other devices and users to continue operating while the isolated endpoint is cleaned and restored to security compliance.
Endpoint Blocking
Proactively blocking suspicious endpoints is a vital layer of protection, preventing potentially compromised devices from accessing your network. By intercepting malicious endpoints early, we reduce the risk of data breaches, limit unauthorised access, and help ensure a secure environment for all connected users and devices.
Traffic Blocking
Traffic Blocking instantly stops any suspicious data transfers within your network. This layer of defence prevents unauthorised data access and exfiltration, ensuring that your sensitive information remains secure, while also alerting your IT team to any unusual data flows for further investigation.
Dark Web Monitoring
Our Dark Web Monitoring service scans the dark web for compromised credentials, data, and other sensitive information linked to your organisation. By identifying these threats early, we can alert you to potential risks, enabling swift action to secure your accounts and prevent cybercriminals from exploiting compromised data.
Threat Intelligence Feed
Our Threat Intelligence Feed provides real-time updates on the latest threats, sourced from a global network of cybersecurity experts. This intelligence keeps our defence strategies ahead of attackers, allowing us to update your protections based on the latest threat trends, from ransomware to phishing tactics.
Managed Deception Technology
Managed Deception Technology deploys decoys and traps throughout your network, confusing attackers and drawing them away from sensitive data. By providing false targets, we detect potential intrusions early, stopping attacks before they reach critical systems and gathering intelligence to improve your network’s resilience.
Customer MDR Portal
The Customer MDR Portal offers direct access to real-time threat insights and security updates, providing a transparent view of ongoing protections and responses. With a user-friendly dashboard, you can track the status of security incidents, monitor threat intelligence, and stay informed about your network’s security posture.
Compliance Insights
Our Compliance Insights service provides ongoing evaluations of your compliance status across relevant standards, ensuring that your organisation remains audit-ready. By regularly tracking adherence to key frameworks, we reduce compliance risks, simplify audits, and help you demonstrate a strong commitment to data protection.
Cyber Essentials (Optional)
Achieving Cyber Essentials certification demonstrates a commitment to cybersecurity, protecting against the most common cyber threats. Our optional support helps you meet the Cyber Essentials requirements, strengthening your overall security posture and enhancing client confidence in your data handling practices.
Our ‘Enterprise’ Managed IT Solution ensures that Users are provided with a guaranteed level of support, as well as providing 24/7 Monitoring and protection for your systems and data, with our Pro, Essentials and Lite solutions also offering a range of features, ensuring the right fit for your business – and depending on your requirements, you can complement your Managed IT service with our Add-Ons.
Enterprise – Managed IT
Pro – Managed IT
Essentials – Managed IT
There is no such thing as too much support, but if you would prefer an un-managed solution that still enjoys Award Winning IT Support and a 24/7 Service Desk, we also offer a ‘Lite‘ support option – for more details take a look at our Lite option & Managed IT Add-Ons below
Lite – Unlimited Support
Cloud Suite ’24 (add-on)
Cloud+ Suite ’24 (add-on)
Cyber+ Suite ’24 (add-on)
Which bundle/Microsoft Plan is the best fit for your organisation? It really depends on your specific needs and priorities, but here are some factors to consider when making your decision:
Company size: If your organisation has between 10 and 300 users and requires a comprehensive productivity suite with built-in security and device management features, Business Premium (included as part of our Cloud+ Suite) is likely the better option. However, if you have more than 300 users or anticipate rapid growth, M365 E3 / E5 may be a better fit (as an upgrade to our Cloud+ Suite).
If you have less than 10 users and are not overly concerned about management features, our Cloud Suite (including Microsoft 365 Standard) should be adequate – and you always have the option of upgrading to our Cloud+ Suite if your requirements change…
Security and compliance needs: If your organisation has strict compliance requirements or needs advanced security features, Business Premium has a strong set of tools included, but E3 provides a more viable upgrade path to E5 security and compliance.
Budget: Business Premium is generally more affordable than E3, making it an attractive choice for cost-conscious SMBs. However, its worth checking the benefits of M365 E3’s advanced features against the additional cost to determine the best value for your organisation.
All Managed IT and Support plans are “per user” but include support for one registered device (workstation/laptop); additional devices can be added (e.g. a users laptop as well as primary workstation) for a supplement charge. Hot Desks would be treated as a single device per registered user – no discounts would apply for users sharing a workstation. Clients can add our Cloud Suite add-on to our Essentials, Pro and Enterprise Managed IT services, but our Cloud+ Suite and our Cyber+ Suite are only able to be added on to our Pro and Enterprise Managed IT Services. Companies using 365 Business solutions (including Office, Exchange, SharePoint, OneDrive, and Entra) will incur a supplementary ‘365 Management’ fee of £6 per registered user. However, this fee is waived if ‘Managed’ 365 licenses are purchased through ITCS Global, either as single licenses or part of our Cloud suites. All ‘unlimited support’ features within our Managed IT and Support contracts are based on a ‘fair usage’ policy with a ‘Custom Solution Surcharge’ applicable in the event a client has a particularly complex infrastructure, requires above average support for their users or subject to continued security-based issues due to a poor ‘Risk Mitigation Score’ (by not implementing recommended security solutions), which is reviewed quarterly – please note, 95% of our customers are NOT currently subject to a Custom Solution Surcharge as their support requirements fall within a generous ‘fair usage’ policy. *Plans that benefit from ‘Onsite Support Included’ are limited to 1 incident per week, per 10 users. Additional Onsite Support (and ‘Discounted Onsite Support’) is billed at 50% standard rates. For any ‘Onsite Support Included’ incidents in Central London, a supplement charge of £20/hour is applicable. Workstation Installations (e.g. upgrades and new users) are considered “projects” and (discounted) rates apply, unless carried out as part of available Service Days. Service Days (included in our Enterprise plan) are accrued at 0.5 days per 10 users, per month, up to a maximum of 1 day per week, and do not carry over each month. All onsite SLA response and resolution times are based on standard business hours/days. Standard Business Hours are Monday to Friday, 9am to 5pm. Extended Business Hours are: Pro Service – Monday to Friday 8am to 6pm; Enterprise Service: Monday to Saturday 8am to 8pm. Advertised Phone Response SLA times and Ticket Resolution SLA times are estimated, and based on service measurements taken between January 2024 and October 2024, and are not guaranteed. Customers signed up to either our Cloud, Cloud+ or Cyber+ suites will automatically be moved over to the next Suite on its annual deployment (e.g. automatically moved from our “Cloud+ Suite ’24” to our “Cloud+ Suite ’25”), which may fall within an existing contract period and additional charges may apply. All Managed IT and Support Plans are based on a minimum 12-month contract, automatically renewing on its anniversary for a minimum rolling 3-month period. Any add-ons that included licenses subject to annual commitments (e.g. Microsoft 365) will remain in contract until the respective annual-commitment licenses expire, and in the event a Support plan is terminated, the respective license(s) will be billed at our standard standalone license rates. Managed IT and Support Plans are subject to a standardised annual price increase of (no more than) 15%, not in line with a contracts anniversary but with our cross-organisation annual pricing review (typically applied between January and March each year); new Managed IT or Support contracts are exempt from this annual price rise for the first 12 months of their contract. Please contact us if you have any questions regarding the above.