Cost Calculators

Our calculators can help you understand the costs, assist with budgeting for outsourcing your IT Support and show you how much you might save in comparison to hiring a team of internal resources.

Once complete, make a note of the projected costs or send us your email address and we will send across a breakdown as well as some free IT resources.

Choose the service you require

IT Support &
Management

Managed
Security

Projects &
Professional Services

Pricing Factors

Two Distinct Types of MSP

There are two distinct types of IT Partner (or MSP):

  • Ones that do it properly with a fully trained, resourced and happy team or…
  • Ones who cut corners with a stressed, dysfunctional and over-stretched team.

This obviously has a massive impact on the service you receive. We are very much in the former camp. 

Cutting Corners (Not!)

Another factor that seriously affects pricing is how organised and mature the company is as well as how much it invests in people, systems, processes and security. The MSP must have strong cyber security, be operationally mature, and demonstrate business resilience.

Hidden Costs

Be very wary of a company that comes to you with any pricing below roughly £40 per person PCM for remote support. Quite simply, they will not be able to do it long-term, or will come in cheap, and hammer you on hidden extras

There are no hidden costs in the below. However, this does not include things such as:

  • Cyber security products and services (see second tab above for our offering).
  • Microsoft 365 or other cloud service offerings.
  • Online backup for servers and workstations (MS 365 and Google Workspace backups are included in our Managed Security).
  • Third party software licensing e.g. Adobe, Autodesk etc.
  • Internet.
  • Website hosting, domain name renewal.
  • Telecoms.

How Do We Compare?

We are not the cheapest out there, but we are far from the most expensive.

We are 100% capable of giving your company the kind of service it deserves, and will come to enjoy and rely on.

Two Comprehensive IT Support & Management Plans for Your Peace of Mind

  1. Unlimited Remote Support is more than adequate for most companies.
  2. Full Service gives extra peace of mind with broader fixed costs.

Everything you could possibly need in a technology partner.

Details and Pricing…

Unlimited Remote Support

Includes…

1. Unlimited Remote Support

Instant unlimited remote support from our super-caring team of highly capable techies. No bamboozling jargon, just friendly on-point help when you need it most.

NOT logging a ticket, waiting for an automated response hours or days later.

All your requests dealt with as fast as possible.

2. Proactive Support

Spotting patterns in repeating issues or behaviour and dealing with the cause rather than the symptoms.

Behind-the-scenes scripting and automated remediation.

3. Portal, Support Tool, Self-help & More

Access to our portal to create or view existing support tickets and change statuses or priority.

Plus software that runs on workstations and mobiles giving more sophisticated ticket logging, self-help, form filling.

Anything that can speed up our service to help you better.

4. Regular Business & IT Reviews

What are your business goals and challenges? What are your IT goals?

We get under the hood of your business and help you achieve your goals and overcome your challenges.

Invaluable quarterly reviews on your terms.

5. Strategy, Planning & Road-Mapping

What is your business strategy? What are you planning for the year coming and for 3-5 years’ time? How about longer term? How can we help you with this?

Regular meetings to discuss this and more. Reviews, strategy, planning, recommendations, budgets, deliverables and progress reports, with a clear road map for the next three years or more.

6. Service Level Agreement/Objective (SLA/SLO)

Commitment to our standard SLA and our objective to do even better.

Our SLO is double our SLA – a moot point really, as most of what we do for you is immediate anyway.

7. Remote Monitoring & Management

Tools that allow us to gain insights into your equipment and allow us to remote control machines for fast fixes to problems.

8. Monitoring and Alerting (24/7/365)

Monitoring PCs, Macs, Linux machines and servers and network activity around the clock.

9. Automated Maintenance Scripting

Numerous scripts that deploy automatically or can be created to carry out maintenance tasks. These run in the background with no impact.

10. Documentation

The core of our service to you. No two clients or systems are the same. Really thorough documented information, SOPs, procedures and more.

11. A Long Checklist…

…of things needed to keep your business running in top shape. Things like backups, alerts, performance, licensing, processes, procedures documentation, compliance etc.

Full Service

Everything in Unlimited Remote Support plus…

12. Unlimited Onsite Support

Most things can be done remotely with our sophisticated toolset but some companies still like an on-site presence now and then.

Visits can be a useful way sweeping up multiple issues and tackling things in bulk.

They can also help company moral and make your staff feel more valued in the workplace.

Onsite support visits are included in Plan 2.

13. Installs, Moves, Changes

Support usually covers things that already in place. It can be frustrating to receive extra charges for small installations or changes. This covers you for any non-project work needed.

14. Out of Hours Endpoint Maintenance and Fixes

To avoid disrupting your working day, we can schedule maintenance work and fixes to be carried out after your business hours.

15. Out of Hours Service Desk Support​

For any support needs outside of our standard working hours (09:30 – 17:30, Monday – Friday), we can provide 24x7x365 support to all of your users.

This is especially suitable for organisations open slightly longer hours, are open 24/7 or who have members working abroad.

IT Support & Management Pricing

Section

Section

Services

Section

Please let us know if you would like:

  • Unlimited remote support.
  • A fully inclusive service, complete with visits and out of hours support.

Section

Section

Data

Section

Please let us know:

  • Where your corporate data resides (all your files and folders – not mailboxes).

Section

Section

Section

The total number of people we will be looking after.

The number of servers you have either on-premises or in the cloud.

Section

Section

£

£

£
£

Section

Price is per PCM

Section

Receive a breakdown of your quote

Schedule a consultation call

Two Managed Security Offerings – Essentials and Advanced

  1. The Essentials plan is extremely comprehensive.
  2. The Advanced plan takes things a step further.

If you go with the Essentials plan you are already well above the security standards of ~95% of businesses out there.

Relentlessly ‘On It’

We have been an industry leader in our multi-layered security offerings for years now, constantly tweaking and improving how we cover this aspect of modern technology.

You will be hard-pressed find a more thorough offering than this elsewhere.

Pricing Considerations

  1. You will almost certainly make savings on any security products you have in place.
  2. You will benefit from the HUGE bundled discount due to our buying power.
  3. The products behind the services listed here are enterprise-grade.
  4. We are able to create bespoke variants of the Advanced plan.

Details and pricing…

Essentials Plan

Includes…

1. Automated OS Patching

Operating system patching/updating.

2. Automated Patching – 3rd Party Software

Patching/updating of other  manufacturer software.

3. Endpoint Protection (Antivirus/malware etc.)

This brings together antivirus, antimalware, and other system protection methods such as in-browser protection, identity theft protection, local firewalling, intrusion prevention and more.

4. Web Content Filtering & Security

Protects all outbound requests. Drive-by downloads, links in e-mails, and other scams usually trick you into connecting to external sources of damaging malware, and inadvertently bringing it in to the network.

5. Security Awareness Training

The biggest Achilles Heel is people. We are easy targets and the trickery is increasingly crafty and ever changing. End user training and light-hearted videos teaching people how to avoid falling for the vast array of scams we are exposed to every single day.

6. Phishing Simulations & Testing/Training

Test emails are sent in to help teach you what to avoid and educate you if caught. Very effective in addition to the above.

7. Password Policies – User

Complex passwords on local as well as cloud systems with minimum length and account lock-out are another really important part of data and systems security.

8. Account and Password Policies – Admin

Cannot overstate the importance of this – the removal of static Admin rights and credentials.

Temporary and unique just-in-time privileged accounts for cloud or local domain admin and/or automated password rotation for other accounts that must maintain standing privilege.

9. Remote Access Security Standards

VPN or other forms of restricted or more secure remote access to physical or virtual networks and resources.

10. Basic Multi-factor Authentication

MS 365 only. MFA is where a person is granted access to a website or application only after successfully presenting two or more pieces of evidence (or factors) to an authentication mechanism; knowledge (something only the user knows), possession (something only the user has), and inherence (something only the user is).

11. Email Security with Advanced Threat Protection

All inbound and outbound email is routed through virus, malware and spam filtering systems. In addition we deploy Advanced Threat Protection (ATP) which detects some of the more nefarious threats.

12. Microsoft 365 Security Audits

Regular audits on the MS 365 back-end. Watching out for old passwords, blocked sign-ins, forwarding and other rules up to no good and more.

13. Microsoft 365 & Google Data Backup

All mailboxes and other Microsoft 365 or G-Suite data is backed up to an independent third party to protect against data loss or ransomware encryption. N.B. Neither company protects against this!

14. Firmware Updates

Firmware is a mini operating system for hardware that is often overlooked has the same need to be kept up to date to avoid security weaknesses.

15. Wifi Security Standards

Securing Wifi networks. Separating corporate from guest devices, strong encryption, restricted access etc.

16. Other Security Standards

An ever growing list of things such as no local administrator privileges, non-standard admin credentials and following other Cyber Essentials standards, etc.

17. Privileged Elevation and Delegation Management

Provides complete control over user privileges, minimising security risks while ensuring productivity. Supporting a zero-trust model, it allows users to request temporary admin access for specific tasks without granting permanent rights, reducing exposure to high-level privileges.

18. Managed Extended Endpoint Threat Detect and Response With SOC (MXDR)

Far more than Endpoint Protection, EDR solutions must provide the following four primary capabilities: detect security incidents, contain the incident at the endpoint, Investigate security incidents and provide remediation guidance. MXDR is a far superior product that takes it one step further with AI driven detection + a Security Operations Centre (SOC) of technicians actively monitoring, responding and remediating endpoints 24/7/365.

19. Ransomware Encryption Protection

Signature-free ransomware detection and remediation that works alongside antivirus.

20. Threat-hunting and Action Centre

A powerful, intuitive platform to simplify threat detection and response.

21. Zero Trust Application Control

Oversees which processes are permitted or restricted on a device. Quick explanation but arguably the most belt-and-braces approach to workstation security.

22. Dark Web Scanning

Continuous scanning for breaches, stolen credentials, passwords and PII on the dark web.

Advanced Plan

Everything in the Essentials Plan plus…

23. Full Multi-factor Authentication

See Basic Multi-Factor Authentication heading. This is a superior product that can give you MFA on workstations and a long list of third party products and services.

24. Credentials/Password Management System

Managing endless passwords is really tricky especially when they all need to be long as well as complex. A central password management system is the answer.

25. Device Encryption

Tracking where all your devices are and remotely wiping them if lost or you suspect they have fallen into the wrong hands

26. VPN Service

This is a product that ring-fences all your activity on a machine no matter where that machine is, and securely routes all outbound traffic across the Internet to a trusted point of exit. It protects against traffic interception and other nefarious behaviour on third-party WiFi / networks.

27. Managed Security Information and Event Management With SOC (SIEM)

24/7/365 network monitoring and the behaviour of all devices on it, also with a Security Operations Centre (SOC) of technicians actively monitoring, responding and remediating 24/7/365.

28. Device Tracking and Remote Wipe

Tracking where all your devices are and remotely wiping them if lost or you suspect they have fallen into the wrong hands.

29. Zero Trust Endpoint Security

A complete game-changer in terms of security; nothing can run unless explicitly allowed. Not only that, nothing on the machine can make a call anything else unless allowed. This system means that nothing unknown can run on the machine and cause damage. This is a really powerful default deny system giving the ultimate protection possible.

Managed Security Pricing

Section

Section

Service Required

Section

Essential Managed Security.

Advanced Managed Security.

Section

Section

Section

The total number of people we will be running our security services on.

The total number of workstations (PCs, Macs, Linux) we will be running our security services on.

Section

Section

£

£
£

Section

Price is per PCM

Section

Receive a breakdown of your quote

Schedule a consultation call

Occasionally you will require additional services for any project work needed. This could be things such as an office move, a network infrastructure overhaul, migration to the cloud, telecoms and/or mobile devices etc. Pretty much anything technology related. We have a friendly, highly capable and competent team at your disposal.

Here is a summary of our charges for anything not considered to be ongoing maintenance and support of existing systems.

Projects
Unit
Rate
Onsite/Remote Project Work
Per Day
£975
Onsite/Remote Project Work
Per Hour (2h min for onsite)
£130
PC Builds – Offsite Flat Rate
Unit
Rate
PC Build – Standard (i)
Per PC (scaling discounts for >1 PCs)
£290
PC Build – Complex (ii)
Per PC (scaling discounts for >1 PCs)
£390

(i) Includes removal of bloatware, installation of MS Office, Adobe Acrobat reader, patching and updating, current Security Stack, end user configuration including printers, shipped to site ready to be plugged in. 4h time-bound. Reductions and/or per-day rate for over 3 machines.

(ii) As in 1 but also installation and configuration of additional company software e.g. BIM/CAD/CRM etc. or any other time-consuming (1.5h+) configuration items needed. Reductions and/or per-day rate for over 2 machines.

Have a project in mind?

If you would like to discuss it with us, send your email or book an appointment.

OUR GUARANTEE

If you and your team are not happy with your move to Ingenious at any time during the first 60 days,
simply let us know, and we will refund your ENTIRE initial support investment immediately.
PLUS we’ll pay you an additional £500 to say “Sorry for wasting your time”.

NO FINE-PRINT, NO QUIBBLES, NO STRINGS.

Speak to us to see how we can look after all your business and IT needs

Services Form