Price

All your business on one platform.
Simple, efficient, yet affordable!

Our Pricing

Reasonable Price Plan

Services
Applies
Standard
Premium
Enterprise
🖥️ Server Management and MonitoringPer server month$61,00$75,00Contact us
🔌 Asset Management and Monitoring Switches, Routers, and Wi-Fi, Uninterruptible Power Supplies, Cameras, Industrial Equipment, Cooling Systems)
Per Asset month$30,00$38,00$50,00
☁️ Database Management and MonitoringPer Asset month$30,00$38,00Contact us
📊 Database Management and Monitoring FullPer Server month$300,00$350,00Contact us
🌐 Link Management and MonitoringPer Link month$23,00$25,00Contact us
🧑‍💻 User Support and Help Desk – Desktop|NotebookPer Asset month$20,00$25,00Contact us
🔥 Outview Endpoint Security Management with Firewall SAS

Per Asset + Server month$9,00$12,00$15,00
🦠Outview Endpoint Security Management with Antivirus SAS
Per Asset + Server + Mobile month$5,00$7,00$8,00
🔒Endpoint Security Management with Antivirus and Firewall – No SAS – Service OnlyPer Asset + Server month$2,00$4,00$5,00
🛡️
Cybersecurity – SOC minimum of 10 servers
$310,00$350,00Contact us

Beginner

Basic Service Protection
$ 99 Monthly
  • 7 Days Product Testing
  • Upgrade Anytime Protection
  • Unlimited Malware Removal
  • 24/7 Live Assistance
  • Backup Data Monthly
  • Configure Software

Pro

Pro Service Protection
$ 499 Monthly
  • 14 Days Product Testing
  • Upgrade Anytime Protection
  • Unlimited Malware Removal
  • 24/7 Live Assistance
  • Backup Data Weekly
  • Configure Software
Popular

Advance

Ultimate Protection
$ 799 Monthly
  • 30 Days Product Testing
  • Full Anytime Protection
  • Unlimited Malware Removal
  • 24/7 Live Assistance
  • Backup Data Daily
  • Configure Software

IT Services Comparison Spreadsheet

Serviço e Descrição
Standard
Premium
Enterprise

🖥️

Server Management and Monitoring 

24/7 Monitoring: Continuous monitoring to detect issues.
– Performance metrics (CPU, memory, disk usage)
– Alerts and notificationsBásicoAvançadoAvançado
Servers Management: Management of files, emails, etc.
– File server configuration
– Email server management
– Directory services management
– Backup server management
Permissions Administration: Access configuration and management.
– User role management
– Access control lists
Applying Patches and Updates: Regular updates for security.
– Automated patch management
– Manual patch deploymentBásicoAvançadoAvançado
Maintenance and Operation: Efficient OS management.
– OS updates and upgrades
– System performance tuningBásicoAvançadoAvançado
Routine Configuration and Administration: Automatic routines.
– Scheduled task automation
– Configuration standardization
Creating New Virtual Machines: Configuration as needed.
– VM provisioning
– VM scaling and managementBásicoAvançadoAvançado
Documentation Update: Maintenance of detailed records.
– Configuration documentation
– Operational logsBásicoAvançadoAvançado
Creating User Accounts: Setup and management of user accounts.
– User account creation and deletion
– Profile management
Creating and Managing Microsoft Policies: Policy development.
– Group policy configuration
– Policy enforcement

🔌

Asset Management and Monitoring

24/7 Monitoring: Continuous monitoring of assets.
– Device health checks
– Performance metrics tracking
Up/Down and Use of Interfaces: Monitoring network interfaces.
– Interface status checks
– Utilization analysis
VLAN Configuration: Virtual network segmentation.
– VLAN setup and management
– VLAN performance monitoringAvançadoAvançado
Wi-Fi Network Configuration: Management of Wi-Fi networks.
– Wi-Fi setup and optimization
– Coverage analysisBásicoAvançadoAvançado
UPS Monitoring: Monitoring backup power systems.
– Battery health checks
– Power event monitoring
Monitoring of Hospital Assets: Supervision of critical devices.
– Asset status checks
– Failure alertsBásicoAvançadoAvançado
Physical Location Management and Inventory: Asset tracking.
– Inventory tracking and updates
– Asset location mappingAvançadoAvançado

☁️

Backup Monitoring Management

Management

Backup Automation: Automated backup routines.
– Scheduled backups
– Backup verificationBásicoAvançadoAvançado
Periodic Backup Reports: Reports on backup status.
– Daily/weekly status reports
– Failure alertsBásicoAvançadoAvançado
Configuring Retention Policies: Rules for backup retention.
– Policy setup and management
– Storage optimizationBásicoAvançadoAvançado
Cloud Backup: Integration with cloud solutions.
– Cloud storage setup
– Cloud backup verificationBásicoAvançadoAvançado
Backup Encryption: Encryption for backup security.
– Data encryption
– Encryption key managementBásicoAvançadoAvançado
Offsite Backup Management: Coordination of off-site backups.
– Offsite backup scheduling
– Disaster recovery planningAvançadoAvançado
– Sample restore test

📊

Database Management and Monitoring

Automation of Repetitive Tasks: Automating common database tasks.
– Backup automation
– Health checksBásicoAvançadoAvançado
Audit and Compliance Reports: Documentation of activities.
– Access and activity logs
– Compliance checksBásicoAvançadoAvançado
Capacity Management: Monitoring and analyzing resources.
– Resource utilization analysis
– Growth projectionsBásicoAvançadoAvançado
Index Creation and Management: Optimizing database structure.
– Index creation and optimization
– Performance tuningBásicoAvançadoAvançado
Analysis and Solution of Complex Problems: Diagnosis and resolution.
– Problem analysis
– Solution implementationBásicoAvançadoAvançado
Database Migration Planning: Safe migration planning.
– Migration strategy and execution
– Downtime minimizationBásicoAvançadoAvançado
Support for High Availability Environments: Maintenance of high availability setups.
– Cluster and replication management
– High availability configurationBásicoAvançadoAvançado

🌐

Link Management and Monitoring

Traffic and Usage Analysis: Assessing network traffic.
– Bandwidth usage analysis
– Bottleneck detectionBásicoAvançadoAvançado
IP and DNS Management: Administration of IP and DNS services.
– IP address management
– DNS configuration and monitoringBásicoAvançadoAvançado
Latency and Jitter Monitoring: Monitoring latency and jitter.
– Latency tracking
– Jitter analysisBásicoAvançadoAvançado
Monthly Performance Reports: Reports on link performance.
– Performance metrics
– Improvement suggestionsBásicoAvançadoAvançado
Implementation of Network Security Measures: Security measures for links.
– Firewall configuration
– Intrusion preventionBásicoAvançadoAvançado

🧑‍💻

<strong

User Support and Help Desk – Desktop|Notebook

Help Desk Management: User support management.
– Ticketing system
– Issue resolution and trackingBásicoAvançadoAvançado
User Onboarding and Training: Training and onboarding of users.
– Training sessions
– Documentation and resourcesBásicoAvançadoAvançado
Account Management: User account administration.
– User account setup and support
– Access and permissions managementBásicoAvançadoAvançado
– Inventory and Software License Management

🔥

Outview Endpoint Security Management with Firewall SAS

Firewall Management: Configuration and monitoring of firewalls.
– Rule setup and management
– Traffic analysis and alertsBásicoAvançadoAvançado
– Intrusion detection and preventionBásicoAvançadoAvançado
– Verification of False Positives
– Version Updates
– Detailed Analyses
– Creation of Exception Rules

🦠

Outview Endpoint Security Management with Antivirus SAS

Antivirus Protection: Comprehensive antivirus management.
– Virus detection and removal
– Real-time scanning and updates
– Scheduled scans and reportingBásicoAvançadoAvançado
– Verification of False Positives
– Version Updates
– Detailed Analyses
– Creation of Exception Rules

🔒

Endpoint Security Management with Antivirus and Firewall – No SAS – Service Only

Antivirus Protection: Comprehensive antivirus management without SAS.
– Virus detection and removal
– Real-time scanning and updates
– Scheduled scans and reportingBásicoAvançadoAvançado
– Verification of False Positives
– Version Updates
– Detailed Analyses
– Creation of Exception Rules
Firewall Management: Configuration and monitoring of firewalls.
– Rule setup and management
– Traffic analysis and alertsBásicoAvançadoAvançado
– Intrusion detection and preventionBásicoAvançadoAvançado
– Verification of False Positives
– Version Updates
– Detailed Analyses
– Creation of Exception Rules

🛡️

Cybersecurity

 

Security Information and Event Management (SIEM)BásicoAvançadoAvançado
– Log collection and analysis
– Incident detection and response
Active Directory (AD) AuditBásicoAvançadoAvançado
– User activity monitoring
– Policy compliance checks
File AuditBásicoAvançadoAvançado
– File access monitoring
– File integrity checks
Web Application Firewall (WAF)BásicoAvançadoAvançado
– Web traffic filtering
– Threat mitigation
Vulnerability ScanBásicoAvançadoAvançado
– System vulnerability assessments
– Remediation recommendations
Brand MonitoringBásicoAvançadoAvançado
– Online reputation management
– Brand mentions and alerts
DarktraceBásicoAvançadoAvançado
– Threat detection and analysis
– Anomaly detection

📈

SLA 

📤 Response Time for Maintenance Activities ⬇️32h24hContate-nos
📤 Response Time for Low Criticality ↘️6h4hContate-nos
📤 Response Time for Medium Criticality ➡️4h2hContate-nos
📤 Response Time for High Criticality ↗️3h1hContate-nos
📤 Response Time for Urgent Criticality ⬆️1h0,5hContate-nos
☑️ Guaranteed Response Times for Maintenance ⬇️264h168hContate-nos
☑️ Guaranteed Response Times for Low Criticality ↘️72h32hContate-nos
☑️ Guaranteed Response Times for Medium Criticality ➡️32h16hContate-nos
☑️ Guaranteed Response Times for High Criticality ↗️16h8hContate-nos
☑️ Guaranteed Response Times for Urgent Criticalities ⬆️8h4hContate-nos
🤝 Service Level Agreement80%90%Contate-nos
⏳ Support Availability8/524/724/7
📞 Contact Plan🖥️ APP
✉️ e-mail
🖥️ APP
✉️ e-mail
💬 Chat
🖥️ APP
✉️ e-mail
💬 Chat
📞 Telphone
    
    
Soluções

Imagine a vast collection of business apps at your disposal.

SGot something to improve? There is an app for that.
No complexity, no cost, just a one-click install.

 

Each app simplifies a process and empowers more people.
Imagine the impact when everyone gets the right tool for the job, with perfect integration.