Bedrock.
Security Guaranteed.
We feel the best way to demonstrate our commitment to your security is to share the risk, and have some "skin in the game".
​
That's why we created the
"Not on my watch"
Guarantee.
Here's how it works.
If you get hacked once we've set you up
we'll return any money you paid us
from the time your coverage started
for up to 12 months*.
"How do we get started?"
​
We work together to check and evaluate your current M365 environment.
This includes things like:
- number of users
- the type of data you have
- your current security posture
​
From this, we go away and construct a plan that is specific to your individual needs.
​
Once agreed, we kick off your
12-month engagement with us.
- In the first 2 months, we get you secure
- We deploy, configure and setup everything necessary for you to be "Not on my watch" Guarantee ready.
​
When your 2-month initial configuration is complete
Coverage kicks in.
​
Your safety posture is amongst the best in the land for M365.
​
Monthly, we check in again on your environment. Any tweaks or changes we've heard about, seen, or learned from other sites, we can apply back into yours.
​
We have a shared interest
in keeping you safe.
​
SAFETY IS JUST AROUNG THE CORNER
(You don't have to wear the helmet)
Where we start
Getting started is easy.
What we need from you is:
​
- Signing up to the monthly debit arrangement
- Agreement to our Terms and Conditions
- A minimum of 20 users (and licenses)
- Payment of your calculated initial deposit (to lock in your start date, and allow us to allocate resources)
​
With these things in place, we book you in and get you started
​
QUICKLY.
​
Protection.
FAST.
What you get
The approach is all based around the guidance released by the Australian Cyber Security Centre called the "Essential Eight"
​
These eight factors are considered to represent the minimum security requirements that all organisations should meet.
​
Because of the way M365 works, some of these aspects are already in place, or are outside of the bounds of what M365 provides.
​
Figuring out which of the eight aspects applies, and how, is one of the activities we undertake for you, so you don't have to make sense of all of the documentation available, nor do you need to try to figure out which M365 features and functions are related to it.
​
We've done the hard work for you.
​
1. Application Control
2. Patch Applications
3. Configure MS Office Macros
4. User Application Hardening
5. Restrict Admin Privileges
6. Patch OS Systems
7. Multi-Factor Authentication
8. Daily Backups
​
From these eight factors, we review your M365 tenant to determine which areas need to be hardened and bolstered, and to what degree.
​
ALSO
​
Sign up for our 12 Month "Bedrock" Plan and you also get
discounted Project Work (25% off)
Unbeatable Value
What's next?
Once we have the starting point, we get down to business.
​
Do you need
SUPPORT?
This depends on the number of people you have,
how they use M365,
their level of expertise and a host of other factors.
We can even talk about Cyber awareness training.
​
Do you need
BACKUP?
We include the consideration of a backup
(which as we know, is not a "conventional" backup,
since Ransomware hackers will
encrypt or delete your backups
if they can reach them). Are you covered?
​
Do you have
MONITORING?
Without Monitoring, it's almost
impossible to know you've even
been hacked
much less how, or where.
How can you resolve a problem
if you don't know about it?
​
Do you have
PATCHING?
When Microsoft 365 Apps are updated,
do you have a process and schedule
for downloading updates, rolling it out?
​
Do you need
MACRO SECURITY
reviewed for Office?
Malicious code embedded within macros have
been a threat for a long time.
This threat continues today,
even across M365.
​
Do you need
MULTI-FACTOR
Authentication?
Arguably the best "bang for your buck" protection
you can have. An absolute MUST for all organisations,
as well as the establishment of BreakGlass accounts
and other considerations.
​
Do you need
PRIVILEGED IDENTITY MANAGEMENT?
Risk mitigation and minimisation,
as well as Zero Trust concepts
are configurable via PIM.
​
Do you need
APPLICATION CONTROL?
Have you configured application control rules
to ensure only approved applications execute?
(e.g. executables, software libraries, scripts,
installers, compiled HTML, HTML applications,
control panel applets and drivers)
​
​
This gives us a scope,
and the complete "ingredients list" of what you will get you
to a point where you are within the safety of the
"Not on my watch" Guarantee.
​
​
Simple
Per User
Per Month
payment
Cash flow is king in almost every business
​
and we're aiming to build long term relationships with our customers.
​
(That's why we have the "Not on my watch" guarantee - so that we're in this together, and we have a shared interest in making it work).
​
So with simplicity and Cash Flow in mind,
our calculation is simple:
​
​
BODY OF WORK
REQUIRED
INCLUDING SUPPORT,
BACKUP etc AS NECESSARY
(less 10% as a starting deposit)
​
​
(divided by)
​
​
NUMBER OF SEATS
IN M365
​
​
(divided by)
​
​
12 MONTHS IN A YEAR
​
​
​
EXAMPLE
​
[12 USERS]
​
[WORK, including Support and Backup]
$12,240 (less $1,224 deposit) = $11,016
​
/
​
[NUMBER OF SEATS: 30]
= $11,016/30
= $367.20
​
/
​
[12 MONTHS IN A YEAR]
= 367.20/12
= $30.60 / User / Month