| Identity & Email Protection |
| Microsoft 365 multi-factor authentication management | ✓ | ✓ | ✓ | ✓ |
| Phishing-resistant email filtering | ✓ | ✓ | ✓ | ✓ |
| Dark web breach monitoring | ✓ | ✓ | ✓ | ✓ |
| Email impersonation protection | ✓ | ✓ | ✓ | ✓ |
| Microsoft 365 backup (multiple snapshots per day) | ✓ | ✓ | ✓ | ✓ |
| Endpoint & Device Security |
| Endpoint detection and response (EDR) | ✓ | ✓ | ✓ | ✓ |
| Device monitoring and alerting | ✓ | ✓ | ✓ | ✓ |
| Patch management for operating systems | ✓ | ✓ | ✓ | ✓ |
| Patch management for third-party applications | ✓ | ✓ | ✓ | ✓ |
| Encrypted disk enforcement | ✓ | ✓ | ✓ | ✓ |
| Human Risk Management |
| Cyber security awareness training | ✓ | ✓ | ✓ | ✓ |
| Simulated phishing campaigns | ✓ | ✓ | ✓ | ✓ |
| Per-user risk reporting | | ✓ | ✓ | ✓ |
| Advanced Threat Defence |
| 24x7 managed detection and response (SOC) | | ✓ | ✓ | ✓ |
| Automated ransomware response | | ✓ | ✓ | ✓ |
| Advanced breach detection across cloud services | | ✓ | ✓ | ✓ |
| Forensic investigation when an incident occurs | | ✓ | ✓ | ✓ |
| Zero-Trust & Compliance |
| Threatlocker zero-trust application allowlisting | | | ✓ | ✓ |
| Ringfencing of business-critical applications | | | ✓ | ✓ |
| Privileged access management | | | ✓ | ✓ |
| Vulnerability detection and prioritisation | | | ✓ | ✓ |
| Compliance reporting (SMB1001, Essential 8, Cyber Essentials) | | | ✓ | ✓ |
| Bundled Human IT Support |
| Business hours remote support included | | | | ✓ |
| On-site support included | | | | ✓ |
| After-hours updates and maintenance | | | | ✓ |
| Quarterly business reviews | | | | ✓ |
| Annual strategic IT and budget review | | | | ✓ |
| Firewall management | | | | ✓ |
| Vulnerability remediation | | | | ✓ |
| Discounts on system changes, projects, and out-of-plan support | | | | ✓ |