Co-Pilot Managed Services

What is Co-Pilot Managed Services?

We live in a fast-paced world, so managing your business is critical to your organization’s success. Let us partner with your organization so you can focus less on the technology and more on your business’s mission. A Managed Services solution gives your organization the benefit of having an IT team at a price point appropriate for small businesses. Our team can help with Windows, Mac, and Linux-based workstations and servers. In addition, we are able to manage cloud solutions, active directory, LDAP, networking, anti-virus, data backup, patching, and more. Lastly, we are your home for cloud based products. In short, our managed services solution empowers your organization by taking the burden of IT off your plate. If you would like more information, call us at (405) 237-1267 or “Contact Us” today!

Co-Pilot Airfield

Young person using a wireless keyboard to work on a document in Microsoft Word on a large desktop monitor

Airfield Plans are designed for home-based or small offices with one to ten users. The plans are affordable and provide productivity and security.

Co-Pilot World Airport

Our World Airport Plans are designed for organizations that have more then ten users. These plans integrate advanced cloud services, security, and workstation management to get help you get things done.

Co-Pilot infrastructure and Cloud

Our infrastructure plans allow us to manage the network and cloud services that power your business. This can be paired with I.T. team.

Co-Pilot Airfield

Co-pilot airfield plans are designed for small organizations with fewer than ten users. These plans are designed to be affordable and empower your organization’s technology. Our first plan known as “ultralight,” focuses solely on the devices and ensuring they are secure and reliable. Our second plan known as “business jet,” offers essential cloud services in addition to the device management provided in the first. Both plans have a block of helpdesk hours that can be used 24/7/365 (366 on leap years). As with all our managed services packages, our response time is backed by our service level agreement (SLA) meaning that we will always respond promptly. In addition, both plans include two technology business reviews per year. Our plan ultralight plan price starts at only $65.00 a month per device and Business Jet is $98.00 a month per user (this includes two devices per user).

Ultralight

person wearing long-sleeve top working on laptop
  • SentinelOne Next Generation Anti-Virus
  • Huntress
  • Operating System Patching
  • Software Patching
  • Remote Support
  • Basic System Reports & Monitoring
  • Software Automation

Business Jet

Free Stylish workspace with computer and simple furniture Stock Photo
  • SentinelOne Next Generation Anti-Virus
  • Operating System Patching
  • Huntress
  • Software Patching
  • Remote Support
  • Basic System Reports & Monitoring

Plus

  •  Microsoft 365 Standard

Airfield Add-on Packages

Pair our Business Continuity and Disaster Recovery (BCDR) services with your managed services plan to provide protection when it is needed most. To learn more about our BCDR Solution.

Cloud Only

With our cloud only plan, your data is securely uploaded and  to our cloud storage. When disaster strikes, you will be able to restore your some or all of your files from the online location.

Cloud and On Premise

Cloud and On Premise solution allows for you to quickly restore when things go wrong by pulling from a local appliance. You benefit from being able to restore your system independent of having an internet connection. When the connection is working, the appliance uploads a copy of the backups to the cloud in case of a physical disaster.

Cloud Services Backup

While cloud providers are typically very reliable, there has been times that data is lost and not able to be recovered. Our cloud services backup takes the files that you have stored and creates a backup that is hosted on an independent cloud. In addition, you are also able to customize the retention policy providing you with a longer recovery window form what typically comes form Microsoft365 or Google Workspace.

Cloud Service Archive

We know that some of our customers are required to keep an archive of information to be compliment with certain laws and/or regulations. Our cloud services archive solution keeps an archive in a separate and independent cloud location. This separation allows you changed cloud services providers and still be compliant.

Having the right tools in your business helps drive productivity. While our base services offer enough to help you get started, having the right cloud services can take your business to the next level. Pairing our cloud services with managed services means that we take a more hands-on approach to ensuring the management of the platform. As such, some of our favorites cloud services to manage include but are not limited to:

  • Ring Central (Cloud VOIP Services)
  • QuickBooks (Business and Accounting Suite)
  • Resi (Streaming Platform)
  • Yodeck (Digital Signage Management)
  • Zoom (Video Conferencing)
  • Exclaime (E-Mail Signature Standardization)
  • Enlift Team Plan (Sales and Marketing Platform)
  • AirSlate (Document Signing Platform)
  • Wasabi Cloud Storage (Cloud Storage Platform)

Our cyber-security services paired with our managed services package give you both peace of mind and expanded productivity. While we have included a great foundation for security in all our base packages, some organizations require more. As such, we have created add-on services to enhance our security offerings.

Enhanced E-Mail Spam, Virus, and Phishing Protection

Powered by ProofPoint, e-mail will be scanned and analyzed to ensure that it safe for your users to open. This provides best in class e-mail protection and ensures that your users are safe from malicious threat actors. (Per User)

Dark Web Monitoring, Phishing Simulations, and Micro Training

Data breaches happen more often than they should and are on the rise, while most people just deal with the announcement of having more spam, two other risks exist with your information being on the dark web. First, it is often the case that in addition to your e-mail address being leaked, so is your password. While it is a best practice that you use a separate password for each website, many users simply don’t adhere to this practice and if adversaries have that user’s password, then they oftentimes can access other sites and impersonate that user. Second, adversaries are now able to better phish that user to get more access to an organization. We can protect against this by providing users training and monitoring and alerting them when credentials have been taken on the dark web. (Per User)

Device Vulnerability Scanning

This service complements our patching strategy by also scanning and alerting on known vulnerabilities and having us address them. One thing that sets this apart from what our competitors do is that instead of scanning yearly or quarterly, we scan multiple times a day. If a new vulnerability is a foundation, we can respond to mitigate the problem quickly. This significantly reduces the amount of time that it has to be exploited.

Risk Assessments and Policy Reviews

Having the right policies in place can help you prevent problems in the longer term. They provide a framework as to how your organization not only prevents a data breach from happening but also how they are responded to. In this assessment, we look at vulnerabilities found in your environment, the policies you have in place, and how well the organization is following the policies.

Password Management with LastPass

LastPass has been referred to as the gold standard when it comes password management. With our offering, your teams store passwords securely in best in class password vaults. Passwords can be shared when needed securely. In addition, users are notified when a password has been reused or is weak. Lastpass also will generate strong passwords so that users don’t have to come up and remember complex passwords. This provides you with peace of mind that your passwords are complient and secure.

Content Filtering

Our content filtering solutions helps employees stay productive and secure. We prevent employees from accessing sites that have malicious content. We can prevent employees from accessing pornography, social media, and other sites that take away from productivity. Our filtering platform works in office, but outside of the office meaning that you are keeping your company asset safe no-matter where it is.

ENGAGEMENT

According to Gartner, 50% of employees will continue to work remotely, even after COVID-19 ends. Traditional security platforms like corporate firewalls and VPNs don’t take into consideration new work trends, like hybrid work from home. Our engagement solution can ensure that your employees are being productive no matter where they are. (Requires Content Filtering Add-On).

 

  • Unlimited Helpdesk Hours (Per user)
  • Onsite (Workbench) Hour Block (3,6, or 12) (per device)

Ready to Learn More?

If you would like to learn more or are ready to schedule your  Preflight Check (see more in FAQ section), call us today at 405-237-1267 or click here.

World Airport Plans

For our customers who have ten or more ten users, we have our World Airport plans. These plans provide you with technical resources to keep your team working hard and not having to deal with technology. All our world airport plans include 4 technical business reviews per year to ensure your technical goals are being met. In addition, all plans include Sentinel One, Huntress, and our dark web scanning to keep your business safe and secure. Your team gets help when it’s needed most with our 24/7/365 (366 on leap years) helpdesk. Our base plans are broken into four categories. Our “Economy Class,” monitor and secures workstations and are priced by the device. Our Business and First-Class offerings include cloud services and is  priced per user (covers up to 3 devices per user).  Need help deciding what plan is right for you? We would be honored to help, please reach out to us at 405 -237-1267 or via the “Contact Us” page.

Economy Class

Man using windows 10 laptop
  • SentinelOne Next Generation Anti-Virus
  • Huntress
  • Operating System Patching
  • Software Patching
  • Remote Support
  • Basic System Reports & Monitoring
  • Software Automation

Business Class

  • SentinelOne Next Generation Anti-Virus
  • Huntress
  • Operating System Patching
  • Software Patching
  • Remote Support
  • Basic System Reports & Monitoring
  • Software Automation

Plus

  • Office 365
  • ProofPoint Essentials
  • Dark Web monitoring
  • Micro Security Training
  • Phishing Simulations

First Class

  • SentinelOne Next Generation Anti-Virus
  • Huntress
  • Operating System Patching
  • Software Patching
  • Remote Support
  • Basic System Reports & Monitoring
  • Software Automation
  • Office 365
  • ProofPoint Essentials
  • Dark Web monitoring
  • Micro Security Training
  • Phishing Simulations

Plus

  • Microsoft Endpoint Manager
  • Microsoft Azure Active Directory

Why is it called "Co-Pilot?"

The term “managed services” may make since to most people who are making the decision who to partner with, but to most end-users, the term may be confusing. It may seam fitting to have them call us “the I.T. department,” but our co-managed customers want us to be more distinguished. When thinking our core mission is with our managed services offerings, we decided that a unique name that fits what we do is “co-pilot.” The name means that we help ensure that the experience for your users is smooth and that we willing to help hen needed.

Jet plan flying

World Airport Add-ons

Pair our Business Continuity and Disaster Recovery (BCDR) services with your managed services plan to provide protection when it is needed most. To learn more about our BCDR Solution.

Cloud Only

With our cloud only plan, your data is securely uploaded and  to our cloud storage. When disaster strikes, you will be able to restore your some or all of your files from the online location.

Cloud and On Premise

Cloud and On Premise solution allows for you to quickly restore when things go wrong by pulling from a local appliance. You benefit from being able to restore your system independent of having an internet connection. When the connection is working, the appliance uploads a copy of the backups to the cloud in case of a physical disaster.

Cloud Services Backup

While cloud providers are typically very reliable, there has been times that data is lost and not able to be recovered. Our cloud services backup takes the files that you have stored and creates a backup that is hosted on an independent cloud. In addition, you are also able to customize the retention policy providing you with a longer recovery window form what typically comes form Microsoft365 or Google Workspace.

Cloud Service Archive

We know that some of our customers are required to keep an archive of information to be compliment with certain laws and/or regulations. Our cloud services archive solution keeps an archive in a separate and independent cloud location. This separation allows you changed cloud services providers and still be compliant.

Having the right tools in your business helps drive productivity. While our base services offer enough to help you get started, having the right cloud services can take your business to the next level. Pairing our cloud services with managed services means that we take a more hands-on approach to ensuring the management of the platform. As such, some of our favorites cloud services to manage include but are not limited to:

  • Ring Central (Cloud VOIP Services)
  • QuickBooks (Business and Accounting Suite)
  • Resi (Streaming Platform)
  • Yodeck (Digital Signage Management)
  • Zoom (Video Conferencing)
  • Exclaime (E-Mail Signature Standardization)
  • Enlift Team Plan (Sales and Marketing Platform)
  • AirSlate (Document Signing Platform)
  • Wasabi Cloud Storage (Cloud Storage Platform)

Our cyber-security services paired with our managed services package give you both peace of mind and expanded productivity. While we have included a great foundation for security in all our base packages, some organizations require more. As such, we have created add-on services to enhance our security offerings.

Enhanced E-Mail Spam, Virus, and Phishing Protection

Powered by ProofPoint, e-mail will be scanned and analyzed to ensure that it safe for your users to open. This provides best in class e-mail protection and ensures that your users are safe from malicious threat actors. (Per User)

Dark Web Monitoring, Phishing Simulations, and Micro Training

Data breaches happen more often than they should and are on the rise, while most people just deal with the announcement of having more spam, two other risks exist with your information being on the dark web. First, it is often the case that in addition to your e-mail address being leaked, so is your password. While it is a best practice that you use a separate password for each website, many users simply don’t adhere to this practice and if adversaries have that user’s password, then they oftentimes can access other sites and impersonate that user. Second, adversaries are now able to better phish that user to get more access to an organization. We can protect against this by providing users training and monitoring and alerting them when credentials have been taken on the dark web. (Per User)

Device Vulnerability Scanning

This service complements our patching strategy by also scanning and alerting on known vulnerabilities and having us address them. One thing that sets this apart from what our competitors do is that instead of scanning yearly or quarterly, we scan multiple times a day. If a new vulnerability is a foundation, we can respond to mitigate the problem quickly. This significantly reduces the amount of time that it has to be exploited.

Risk Assessments and Policy Reviews

Having the right policies in place can help you prevent problems in the longer term. They provide a framework as to how your organization not only prevents a data breach from happening but also how they are responded to. In this assessment, we look at vulnerabilities found in your environment, the policies you have in place, and how well the organization is following the policies.

Password Management with LastPass

LastPass has been referred to as the gold standard when it comes password management. With our offering, your teams store passwords securely in best in class password vaults. Passwords can be shared when needed securely. In addition, users are notified when a password has been reused or is weak. Lastpass also will generate strong passwords so that users don’t have to come up and remember complex passwords. This provides you with peace of mind that your passwords are complient and secure.

Content Filtering

Our content filtering solutions helps employees stay productive and secure. We prevent employees from accessing sites that have malicious content. We can prevent employees from accessing pornography, social media, and other sites that take away from productivity. Our filtering platform works in office, but outside of the office meaning that you are keeping your company asset safe no-matter where it is.

ENGAGEMENT

According to Gartner, 50% of employees will continue to work remotely, even after COVID-19 ends. Traditional security platforms like corporate firewalls and VPNs don’t take into consideration new work trends, like hybrid work from home. Our engagement solution can ensure that your employees are being productive no matter where they are. (Requires Content Filtering Add-On).

 

  • Unlimited Helpdesk Hours (Per user)
  • Onsite (Workbench) Hour Block (3,6, or 12) (per device)
  • Kiosk Systems (Per Device)
  • Shared Workstations (Per Device)
  • Additional TBD (Per Meeting)
  •  

 

Infrastructure and Cloud Managment

While we can just manage your endpoints if you would like, we are also able to help manage your network devices, servers, and cloud services.

With our infrastructure management,we manage networking devices such as switches, routers, firewalls, gateways, access points, etc. Networking can get complex, so we found that the fairest way to price these services is by device complexity and starts at $15.00. Our typical plans have us monitor and manage during normal business hours, but we do offer a 24/7/365 (366 on leap years) NOC service.

The cloud can be a complicated subject, but we break it down in two categories: services and infrastructure. For more information about what cloud services we offer, Click Here. In addition to helping you pick and configure the cloud services, we also offer to manage each service for you as well. If you chose to have us manage the service, we ensure that the configuration is kept up to date and make any configuration changes you may need.

Frequently Asked Questions:

Our preflight check report is a comprehensive and actionable report that we create prior to starting managed services with an organization. The report includes but is not limited to: risk assessment, asset assessment, dark-web scan, vulnerability scan, and phishing assessment. As the end of the process, you will receive report as well as actions that may need to be taken to correct any issues. This report would normally be valued 1,200 dollars, but we offer it to prospective customers for $500.00. If you choose to use for managed services after the report. If you choose to go with us, we will discount part or all of the remaining balance.

A managed services option provides a proactive approach to resolving technology needs. Instead of waiting for an issue to arise, a managed services solution works to correct issues before they happen. This approach reduces the amount of time that you may experience an outage.

Absolutely! Our services can help enhance your existing IT team’s ability by alerting them to potential issues beforehand. We can also provide them with remote access tools to help them manage systems remotely.

Yes, see the Airfield section to learn about our packages for small organizations. These packages optimized for small organizations and pricing starts at $65.00 per device per month.

Yes! We love MacOS and all of our packages and most of our add-ons are able to work with MacOS. Because of some advanced security and privacy features in MacOS, you may see an additional fee for MacOS devices to compensate for additional licenses requirements.

Technical business reviews are an opportunity for us to meet with you and ensure that we have aligned our services with your organization correctly. In addition, we will help create a comprehensive road map and budget to help plan for future IT spending. Some offer this as a separate service often called “virtual CIO (vCIO), but we include it with all of our packages because we feel that part of being a co-pilot means ensuring that we have aligned with your business’s need.

From our Blog:

City at Night

24/7/366 Help Desk Now Available

Night owls who are at peak productive at night, those who are working late to make a deadline, and thoughts who sleep when the baby sleeps and works when the baby is awake (this has

Read More »