Reboot, Inc. Service Catalog
Reboot, Inc. offers several services and subscription categorized as Unlimited or Limited. Each includes features defined below based on Client’s selected subscription as indicated on the SOW. Reference the SOW to ensure that you have purchased the correct service tier that includes the features required for your company’s needs.
Reboot Unlimited Managed
Reactive Support Desk: Reboot Support Desk – Support from your dedicated team, available via phone, live chat, or email. Our Service Desk offers unlimited remote help, live phone support, and on-site assistance, with a ticketing system ensuring swift resolution. Our certified engineers provide expert service, and all requests are documented in our Customer Portal for transparency and efficient tracking.
Technology Alignment: Reboot Technical Alignment – Ensures your technology aligns with industry standards and Reboot Inc. best practices, reducing downtime and preventing outages. Our team conducts proactive reviews, benchmarks infrastructure, and identifies risks associated with outdated or misconfigured systems. They also manage technical documentation and SOPs, providing ongoing knowledge support. This alignment improves system performance, security, and enhances your network’s efficiency, helping to drive down issues and optimize resolution times.
Backup Administration: Reboot Backup Administration – Daily backups (with intervals as frequent as every 15 minutes), daily verification, encrypted and password-protected backups, and offsite storage in our Secure Data Center, with a 12-month retention period with emphasize on quick and efficient recovery to minimize downtime.
Proactive Technology Management: Reboot Proactive Technology Management – Ensures the optimal performance, security, and reliability of your infrastructure utilizing advanced tools to monitor and maintain your systems, including servers, desktops, and network devices. We conduct routine maintenance, vendor management, and system patching to keep your environment secure. This proactive approach minimizes support tickets, enhancing system performance and reliability for your business.
vCIO: Reboot vCIO – Provided by a dedicated Virtual Chief Information Officer (vCIO) to align your technology with business goals. The vCIO will review a comprehensive Technology Summary Report, assess key performance indicators, and deliver strategic consultation on IT risks, costs, infrastructure, and future planning. Services include IT budget planning, system design, project oversight, technology recommendations, and more to ensure your business stays ahead with tailored IT solutions.
Microsoft 365 Management: Reboot Microsoft 365 Management – Comprehensive management of Microsoft 365 environment, including account provisioning, license management, software updates, and ongoing user support. Ensures optimal performance, compliance, and security for your Microsoft 365 ecosystem.
Microsoft Security Management: Reboot Microsoft Security Management – Solution for managing Microsoft 365 security. It includes monitoring and enhancing security posture, such as Multi-Factor Authentication (MFA), Anti-Phishing policies, Data Loss Prevention (DLP), and improving Microsoft Secure Scores. This ensures proactive and scalable security management for your organization.
Email Filtering: Reboot Email Filtering – Comprehensive email security solution for incoming, outgoing, and internal communication. Includes advanced AI-based anti-phishing, anti-spam filtering, known malware prevention, zero-day malware defense (sandboxing), file sanitization (CDR), and malicious URL protection. Features data loss prevention (DLP), encryption, account takeover prevention, detection of unauthorized applications (Shadow IT), and URL click-time protection.
Vendor Management: Reboot Vendor Management – Comprehensive coordination and oversight of third-party vendors, ensuring seamless integration and support for your IT operations. This service includes vendor contract reviews, issue resolution, performance monitoring, and acting as your single point of contact for vendor-related communications.
User Account Management: Reboot User Account Management – Includes creating and managing user accounts, assigning licenses, configuring access and permissions, and supporting onboarding/offboarding processes within Microsoft Active Directory. Services cover new account provisioning, initial logon assistance, printer and Office365 configuration, and MFA enrollment, assuming pre-configured hardware and operating systems are in place.
Application Control Management: Reboot Application Control Management – Ensures only approved applications are permitted to run, reducing vulnerabilities and enhancing security by preventing unauthorized software execution. It includes configuration, monitoring, and ongoing management to maintain a secure, efficient, and compliant system tailored to your business needs.
Reboot Limited Managed:
Patch Management: Reboot Patch Management – Application of Windows feature and quality updates for both server and workstation environments, along with device driver updates delivered via Windows Update. Additionally, we ensure the timely patching of Office and other Microsoft software, as well as over 100 third-party applications such as Java, Reader, Chrome, and more, to maintain system security and performance.
Fractional CIO: Reboot Fractional CIO – Provided by a dedicated Virtual Chief Information Officer (vCIO) to align your technology with business goals. The vCIO will review a comprehensive Technology Summary Report, assess key performance indicators, and deliver strategic consultation on IT risks, costs, infrastructure, and future planning. Services include IT budget planning, system design, project oversight, technology recommendations, and more to ensure your business stays ahead with tailored IT solutions.
Standard Backup and Disaster Recovery: Reboot Standard Backup and Disaster Recovery – Cloud backup and disaster recovery solution providing secure, automated data protection and rapid restoration services to ensure business continuity. This service includes daily backups, encrypted data storage, and customized recovery plans tailored to your organization’s needs.
Data-Guard365 Service Catalog
DataGuard offers several services and subscription categorized as Unlimited or Limited. Each includes features defined below based on Client’s selected subscription as indicated on the SOW. Reference the SOW to ensure that you have purchased the correct service tier that includes the features required for your company’s needs.
DataGuard Unlimited Managed
Guardian Absolute: Comprehensive cybersecurity package offering Endpoint Detection & Response (EDR), Managed Detection & Response (MDR), 24/7 Security Operations Center (SOC), Security Information & Event Management (SIEM), and incident response. Includes email protection, CISO advisory services, $1,000 per device coverage, dark web monitoring, and security awareness training for holistic protection.
Guardian Ranger: Proactive network visibility and endpoint security provides real-time device discovery, automatic risk assessment, and advanced threat detection to secure your network and endpoints. Includes continuous monitoring and reporting for enhanced cybersecurity.
Guardian SIEM: Security Information and Event Management (SIEM) services. Our team ensures continuous optimization of your SIEM platform for enhanced security and compliance.
DataGuard Managed Cybersecurity: Includes advanced Endpoint Detection and Response (EDR), Managed Detection and Response (MDR), 24/7 Security Operations Center (SOC) monitoring, Security Information and Event Management (SIEM), incident response, email protection, executive-level CISO guidance, $1,000 per device breach coverage, and continuous dark web monitoring. Designed to provide comprehensive protection and peace of mind for your organization.
DataGuard Managed Security Awareness Program (SAP): Ongoing security awareness training program to educate employees on cybersecurity best practices. Includes regular phishing simulations, compliance tracking, and detailed reporting to enhance organizational security posture.
Managed HIPPA Administrative Safeguards: HIPPA Administrative Safeguards: These provisions are defined in the Security Rule as the “administrative actions, policies, and procedures to manage the selection, development, implementation, and maintenance of security measures to protect electronic protected health information and to manage the conduct of the covered entity’s workforce in relation to the protection of that information.” Policies and Procedures include: -Security Management Process -Assigned Security Responsibility -Workforce Security -Information Access Management -Security Awareness and Training -Security Incident Procedure -Contingency Planning -Evaluation -Business Associate Contracts
Managed HIPPA Physical Safeguards: These provisions are defined as the “physical measures, policies, and procedures to protect a covered entity’s electronic information systems and related buildings and equipment, from natural and environmental hazards, and unauthorized intrusion.” Policies and Procedures include: -Facility Access Controls -Workstation Use -Workstation Security -Device and Media Control
Managed FTC Safeguards Compliance: Compliance management for FTC Safeguards Rule requirements, including risk assessments, policy creation, employee training, vendor management, and ongoing monitoring. Ensures your organization maintains compliance with data security regulations, reducing risk and enhancing customer trust.
DataGuard Limited Managed
Vulnerability and Penetration Test: DataGuard will perform security testing against the Customer’s public IP addresses to identify any systems with security issues. These security issues can stem from configuration, authentication, and patching vulnerabilities. Activities include the following: • User Profiling and Reputational Threats • Informational Gathering • Vulnerability Discovery and Validation Internal Asset Testing – DataGuard will perform security testing against the Customer’s internal IP addresses to identify any systems with security issues. These security issues can stem from configuration, authentication, and patching vulnerabilities. Activities include the following: • Information Gathering • Vulnerability Discovery and Validation • Controlled Penetration Testing.
Incident Response Retainer – Bronze: Cyber Health Check Digital Forensics and Incident Response (DFIR) Incident Preparedness and Response Plan Cyber Incident Analysis and Reporting 1 hour Incident Response
Incident Response Retainer – Silver: Cyber Health Check Digital Forensics and Incident Response (DFIR) Incident Preparedness and Response Plan Cyber Incident Analysis and Reporting Continuous Vulnerability Scanning 5 hours Incident Response
Incident Response Retainer – Gold: Cyber Health Check Digital Forensics and Incident Response (DFIR) Incident Preparedness and Response Plan Cyber Incident Analysis and Reporting Continuous Vulnerability Scanning Unlimited Incident Response Roll-Over Credits for Incident-Free Environments