IT Security Pricing

Build the right IT security solution for you.

Choosing an IT security solution can be difficult. Choose from the options below to build your multi-layer threat protection security model. Our open pricing model allows you to balance the layers of protection you need with the budget you have.

  • Hybrid working - Work securely, in the office and from home.
  • Flexible - Build a flexible multi-layer security solution that fits your business.
  • Clarity - Reduce your confusion around IT security.
  • Risk management - Create policies and procedures that help keep your business safe.
  • Protection - Protect your business, your team, your data and your clients from security threats.
SCHEDULE A CALL

Choose the plan that’s right for you

IT Security Baseline

Entry level security solution for low risk environments.

from £9.00

System / Month CALL NOW
Security help and support for your team
Security Support
Endpoint antivirus and antimalware software is designed to prevent, search for, detect, and remove software viruses, and other malicious software like worms, trojans, adware, and more.
Antivirus Software
All systems need regular patching and updates to keep them secure.
Patch Management
Keep a record of the current patch status on your business assets.
Patch Management Reporting
Keep a record of the current backup state of your company data.
Backup Monitoring and Reporting
The Network Operations Centre, or NOC, provides out of hours patching and monitoring of systems.
Network Operations Centre (NOC)
Provides secure remote access to your work systems while working from home.
Remote Access and Control
Solution designed for Mac's and Windows based systems.
Mac and Windows Agents
Best in class threat detection and remediation software with advanced infection isolation, rollback capabilities, and an industry leading guarantee.
Sentinel One
Archive messages, calendars, tasks, contacts and public folders, unlimited storage. Apply legal holds
Phoenix Cloud Email Archiving:
Prevent Spear phishing attacks using AI. Stop account takeover and Prevent BEC and CEO fraud. Provides Real-Time remediation and DMARC reporting and visualization.
Phoenix Adanced AI based Email Protection
Industry-leading spam filtering with Advanced Threat Protection, Sandboxing, Data Leak Protection, Encryption, Anti-phishing protection, and Outbound filtering to prevent the spread of malware and viruses.
Phoenix Email Filtering
Our fully staffed SOC keeps a watchful eye on your Microsoft environment to detect unusual user activity, correlate events, and alert you of real threats.
Security Operations Centre (SOC)
Reduce risk by finding out the information on applications, user accounts and passwords that are being sold on the dark web.
Dark Web Scans
Video based security training for your team
Security Training
Easily send encrypted email messages and get notification when the email has been opened.
Phoenix Email Encryption
Back up your Microsoft 365 Outlook, SharePoint, OneDrive, and Teams data. Includes unlimited storage and retention. Find and recover files, folders, and mailboxes and restore to the same account/location or to a different account/location. Granular restore for Email, SharePoint, and OneDrive. Protects against accidental data deletion or overwrite . Gives you the ability to restore after corruption, malware, or ransomware attack.
Phoenix Cloud-to-Cloud Backup:

Special Offer!

Our Phishing Simulation uses real-world testing and creates mock-phishing campaigns that teach your team to recognize threats. The interactive campaigns use a mix of links, smart attachments, videos, graphics, and training materials to create effective training.
Phishing Simulation
Securing traffic to and from the web is critical. Web Content Shield provides web content filtering and can work with cloud-connected services and hybrid team members.
Web Content Shield
Essential for regulated businesses, Phoenix network SIEM is a flexible, scalable solution that helps you meet requirement. Collect and analyse information from network devices, manage endpoint logs, create alerts, and security log retention.
Phoenix Network (SIEM): Add-on
Mobile device management (MDM) software allows you to secure and control smartphones, tablets and enforce security policies and protect company data.
Mobile Device Management (MDM): Add-on
IT Security Enhanced

Multi-layer security with active monitoring and remediation.

from £21.00

System / Month CALL NOW
Security help and support for your team
Security Support
Solution designed for Mac's and Windows based systems.
Mac and Windows Agents
Endpoint antivirus and antimalware software is designed to prevent, search for, detect, and remove software viruses, and other malicious software like worms, trojans, adware, and more.
Antivirus Software
All systems need regular patching and updates to keep them secure.
Patch Management
Keep a record of the current patch status on your business assets.
Patch Management Reporting
Keep a record of the current backup state of your company data.
Backup Monitoring and Reporting
The Network Operations Centre, or NOC, provides out of hours patching and monitoring of systems.
Network Operations Centre (NOC)
Provides secure remote access to your work systems while working from home.
Remote Access and Control
Industry-leading spam filtering with Advanced Threat Protection, Sandboxing, Data Leak Protection, Encryption, Anti-phishing protection, and Outbound filtering to prevent the spread of malware and viruses.
Phoenix Email Filtering
Easily send encrypted email messages and get notification when the email has been opened.
Phoenix Email Encryption

Special Offer!

Video based security training for your team
Security Training
Reduce risk by finding out the information on applications, user accounts and passwords that are being sold on the dark web.
Dark Web Scans
Our fully staffed SOC keeps a watchful eye on your Microsoft environment to detect unusual user activity, correlate events, and alert you of real threats.
Security Operations Centre (SOC)
Best in class threat detection and remediation software with advanced infection isolation, rollback capabilities, and an industry leading guarantee.
Sentinel One
Prevent Spear phishing attacks using AI. Stop account takeover and Prevent BEC and CEO fraud. Provides Real-Time remediation and DMARC reporting and visualization.
Phoenix Adanced AI based Email Protection: Add-on
Our Phishing Simulation uses real-world testing and creates mock-phishing campaigns that teach your team to recognize threats. The interactive campaigns use a mix of links, smart attachments, videos, graphics, and training materials to create effective training.
Phishing Simulation: Add-on
Securing traffic to and from the web is critical. Web Content Shield provides web content filtering and can work with cloud-connected services and hybrid team members.
Web Content Shield: Add-on
Archive messages, calendars, tasks, contacts and public folders, unlimited storage. Apply legal holds
Phoenix Cloud Email Archiving: Add-on
Back up your Microsoft 365 Outlook, SharePoint, OneDrive, and Teams data. Includes unlimited storage and retention. Find and recover files, folders, and mailboxes and restore to the same account/location or to a different account/location. Granular restore for Email, SharePoint, and OneDrive. Protects against accidental data deletion or overwrite . Gives you the ability to restore after corruption, malware, or ransomware attack.
Phoenix Cloud-to-Cloud Backup: Add-on
Essential for regulated businesses, Phoenix network SIEM is a flexible, scalable solution that helps you meet requirement. Collect and analyse information from network devices, manage endpoint logs, create alerts, and security log retention.
Phoenix Network (SIEM): Add-on
Mobile device management (MDM) software allows you to secure and control smartphones, tablets and enforce security policies and protect company data.
Mobile Device Management (MDM): Add-on
IT Security Advanced

Multi-layer security with active monitoring and remediation.

from £30.00

System / Month CALL NOW
Security help and support for your team
Security Support
Easily send encrypted email messages and get notification when the email has been opened.
Phoenix Email Encryption
Our Phishing Simulation uses real-world testing and creates mock-phishing campaigns that teach your team to recognize threats. The interactive campaigns use a mix of links, smart attachments, videos, graphics, and training materials to create effective training.
Phishing Simulation
Prevent Spear phishing attacks using AI. Stop account takeover and Prevent BEC and CEO fraud. Provides Real-Time remediation and DMARC reporting and visualization.
Phoenix Adanced AI based Email Protection
Best in class threat detection and remediation software with advanced infection isolation, rollback capabilities, and an industry leading guarantee.
Sentinel One
Our fully staffed SOC keeps a watchful eye on your Microsoft environment to detect unusual user activity, correlate events, and alert you of real threats.
Security Operations Centre (SOC)
Reduce risk by finding out the information on applications, user accounts and passwords that are being sold on the dark web.
Dark Web Scans
Video based security training for your team
Security Training
Industry-leading spam filtering with Advanced Threat Protection, Sandboxing, Data Leak Protection, Encryption, Anti-phishing protection, and Outbound filtering to prevent the spread of malware and viruses.
Phoenix Email Filtering
Solution designed for Mac's and Windows based systems.
Mac and Windows Agents
Provides secure remote access to your work systems while working from home.
Remote Access and Control
The Network Operations Centre, or NOC, provides out of hours patching and monitoring of systems.
Network Operations Centre (NOC)
Keep a record of the current backup state of your company data.
Backup Monitoring and Reporting
Keep a record of the current patch status on your business assets.
Patch Management Reporting
All systems need regular patching and updates to keep them secure.
Patch Management
Endpoint antivirus and antimalware software is designed to prevent, search for, detect, and remove software viruses, and other malicious software like worms, trojans, adware, and more.
Antivirus Software
Securing traffic to and from the web is critical. Web Content Shield provides web content filtering and can work with cloud-connected services and hybrid team members.
Web Content Shield

Special Offer!

Archive messages, calendars, tasks, contacts and public folders, unlimited storage. Apply legal holds
Phoenix Cloud Email Archiving: Add-on
Back up your Microsoft 365 Outlook, SharePoint, OneDrive, and Teams data. Includes unlimited storage and retention. Find and recover files, folders, and mailboxes and restore to the same account/location or to a different account/location. Granular restore for Email, SharePoint, and OneDrive. Protects against accidental data deletion or overwrite . Gives you the ability to restore after corruption, malware, or ransomware attack.
Phoenix Cloud-to-Cloud Backup: Add-on
Essential for regulated businesses, Phoenix network SIEM is a flexible, scalable solution that helps you meet requirement. Collect and analyse information from network devices, manage endpoint logs, create alerts, and security log retention.
Phoenix Network (SIEM): Add-on
Mobile device management (MDM) software allows you to secure and control smartphones, tablets and enforce security policies and protect company data.
Mobile Device Management (MDM): Add-on

FAQ

Which security package is best for me?

Each organisation and security solution is different, so our team takes great pride in helping you select the best option for your specific business. Contact our security team to learn more about the differences and which offering may be best for you.

How much does IT security cost?

We’d love to give you an exact figure, but it very much depends on the level of support required. An off-the-shelf solution may give you a fixed price, but it might also mean you end up paying for things you don’t need. What we can say is that we are committed to providing our services to customers at a price that is affordable for SMEs. We will work with you to find the right package to suit your business and your budget.

How are the IT security prices calculated?

Pricing is calculated based on the number of assets that need to be protected in your business.

Can I upgrade my IT security package when I want?

If you need a higher level of security, we’re here to help. It’s easy and convenient for us to work together.

When someone needs more protection than the standard services to provide it can be very frustrating because that person will feel like they are not getting their money’s worth out of your business or product. So if there is any possible way at all for our service team members can increase security levels during times when extra layers might come in handy, then I think people would appreciate knowing about this option ahead of time so as not to make them wait around while something bad could potentially happen instead (due diligence).

What is involved in the IT security set-up process?

Our business is one of the best in our industry. We’re known for offering excellent customer service to help businesses grow and thrive, so let us take care of your IT needs – you focus on what really matters.

We have all been stressed when setting up a bit of complicated new tech but don’t stress because our professional team will take care of everything with a great understanding process that makes sure clients are comfortable using tools they need at their jobs! Our business is top-notch which makes it easy not to worry about anything related since we are known as being able to provide exceptional support services especially helping companies achieve success through technology solutions

Are there any hidden costs?

You can rely on us to deliver what we promise, and that means no hidden costs. Our IT security pricing is straightforward because we value transparency and security with our clients.

Are you ready to use IT to solve your business problems?