top of page
Microsoft 365 logo.jpg

Bedrock.
Security Guaranteed
.

We feel the best way to demonstrate our commitment to your security is to share the risk, and have some "skin in the game".

​

That's why we created the

"Not on my watch"

Guarantee.

Here's how it works.

 

If you get hacked once we've set you up

we'll return any money you paid us

from the time your coverage started

for up to 12 months*.

"How do we get started?"

​

We work together to check and evaluate your current M365 environment. 

 

This includes things like:

- number of users

- the type of data you have

- your current security posture

​

From this, we go away and construct a plan that is specific to your individual needs.

​

Once agreed, we kick off your

12-month engagement with us.

- In the first 2 months, we get you secure

- We deploy, configure and setup everything necessary for you to be "Not on my watch" Guarantee ready.

​

When your 2-month initial configuration is complete

Coverage kicks in.

​

Your safety posture is amongst the best in the land for M365.

​

Monthly, we check in again on your environment.  Any tweaks or changes we've heard about, seen, or learned from other sites, we can apply back into yours.

​

We have a shared interest

in keeping you safe.

​

Silver Helmet

SAFETY IS JUST AROUNG THE CORNER

(You don't have to wear the helmet)

Where we start

Getting started is easy

 

What we need from you is:

​

- Signing up to the monthly debit arrangement

- Agreement to our Terms and Conditions

- A minimum of 20 users (and licenses)

- Payment of your calculated initial deposit (to lock in your start date, and allow us to allocate resources)

​

With these things in place, we book you in and get you started

​

QUICKLY.

​

BG_Picture02.jpg

Protection.
FAST.

What you get

The approach is all based around the guidance released by the Australian Cyber Security Centre called the "Essential Eight"

​

These eight factors are considered to represent the minimum security requirements that all organisations should meet.

​

Because of the way M365 works, some of these aspects are already in place, or are outside of the bounds of what M365 provides.

​

Figuring out which of the eight aspects applies, and how, is one of the activities we undertake for you, so you don't have to make sense of all of the documentation available, nor do you need to try to figure out which M365 features and functions are related to it.

​

We've done the hard work for you.

​

1. Application Control

2. Patch Applications

3. Configure MS Office Macros

4. User Application Hardening

5. Restrict Admin Privileges

6. Patch OS Systems

7. Multi-Factor Authentication

8. Daily Backups

​

From these eight factors, we review your M365 tenant to determine which areas need to be hardened and bolstered, and to what degree.

​

ALSO

​

Sign up for our 12 Month "Bedrock" Plan and you also get

discounted Project Work (25% off)

Image by JJ Ying

Unbeatable Value

What's next?

Once we have the starting point, we get down to business.

​

Do you need

SUPPORT? 

This depends on the number of people you have,

how they use M365,

their level of expertise and a host of other factors.

We can even talk about Cyber awareness training.

​

Do you need

BACKUP?

We include the consideration of a backup

(which as we know, is not a "conventional" backup,

since Ransomware hackers will

encrypt or delete your backups

if they can reach them).  Are you covered?

​

Do you have

MONITORING?

Without Monitoring, it's almost

impossible to know you've even

been hacked

much less how, or where.

How can you resolve a problem

if you don't know about it?

​

Do you have

PATCHING?

When Microsoft 365 Apps are updated,

do you have a process and schedule

for downloading updates, rolling it out?

​

Do you need

MACRO SECURITY

reviewed for Office?

Malicious code embedded within macros have

been a threat for a long time.

This threat continues today,

even across M365.

​

Do you need

MULTI-FACTOR

Authentication?

Arguably the best "bang for your buck" protection

you can have.  An absolute MUST for all organisations,

as well as the establishment of BreakGlass accounts

and other considerations.

​

Do you need

PRIVILEGED IDENTITY MANAGEMENT?

Risk mitigation and minimisation,

as well as Zero Trust concepts

are configurable via PIM.

​

Do you need

APPLICATION CONTROL?

Have you configured application control rules

to ensure only approved applications execute?

(e.g. executables, software libraries, scripts,

installers, compiled HTML, HTML applications,

control panel applets and drivers)

​

​

This gives us a scope,

and the complete "ingredients list" of what you will get you

to a point where you are within the safety of the

"Not on my watch" Guarantee.

​

​

Abstract Lines

Simple
Per User
Per Month 
payment

Cash flow is king in almost every business

​

and we're aiming to build long term relationships with our customers.

​

(That's why we have the "Not on my watch" guarantee - so that we're in this together, and we have a shared interest in making it work).

​

So with simplicity and Cash Flow in mind,

our calculation is simple:

​

​

BODY OF WORK

REQUIRED

INCLUDING SUPPORT, 

BACKUP etc AS NECESSARY

(less 10% as a starting deposit)

​

​

(divided by)

​

​

NUMBER OF SEATS

IN M365

​

​

(divided by)

​

​

12 MONTHS IN A YEAR

​

​

​

EXAMPLE

​

[12 USERS]

​

[WORK, including Support and Backup]

$12,240 (less $1,224 deposit) = $11,016

​

/

​

[NUMBER OF SEATS: 30]

= $11,016/30

= $367.20

​

/

​

[12 MONTHS IN A YEAR]

= 367.20/12

$30.60 / User / Month 

Desk
bottom of page