Protection & service plans
Granite Quartz Diamond
Cyber protection
Malware protection

Effective anti-malware software kept up to date

We start by ensuring that you have effective protection across your devices and keep this up to date. When our software quarantines malware our technicians initiate further deep scans to ensure that everything is clean.

Web protection

Preventing your team from accessing ‘bad’ websites

To further enhance your security, our protection software prevents your team from accessing websites that are known to harbour malware.

Patch management

Security and critical updates on your devices

All devices included in the plan are checked to make sure that updates are being applied. If they fail, we reapply them from our central management system; and if they continue to fail a technician will remotely access the machine and fix it.

Proactive maintenance*

Checking and fixing your tech before it affects you

Granite Quartz Bespoke

To keep everything in good shape we carry out a whole host of essential maintenance behind the scenes. See the section below for what is included in each plan.

Firewall management

Keeping your Draytek firewall secure

Granite Quartz Bespoke

Your firewall is one of the most important parts of your cyber protection. We make sure that it is patched and up to date.

Microsoft 365 security baseline**

Configure and maintain security of your MS 365 tenant

Granite Quartz Bespoke

There is a lot of configuration required to ensure that your MS 365 tenant is securely configured. See the section below for what is included in each plan.

Device MDR

24/7 cyber threat detection for managed devices

Optional

Managed detection and response (MDR) is the industry jargon for a system that takes over in the worst case scenario that a hacker gets past all the cyber protection we have in place. Device MDR works 24/7 and detects malware-like activity. When it is detected the machine is isolated to prevent it spreading and our team is alerted.

Cloud MDR

24/7 cyber threat detection for MS 365 and Google

Optional Optional

Much like Device MDR, this service runs 24/7, monitoring for nefarious activity. It will respond by locking an account in the event that it detects hacker-like behaviour. We can provide coverage for both Microsoft 365 and Google Workspace accounts.

Phishing protection and simulation

Advanced email protection and scheduled user tests

Optional Optional

While Microsoft 365 comes with good phishing protection sometimes you need something more specialist. We offer an advanced solution that further reduces phishing risk and allows you to schedule simulations to keep your people on their toes.

Secure network management

Bespoke management of firewalls, switches and Wi-Fi

Optional Optional Optional

This is the secure configuration and management of your network. It is a solution tailored to your needs that can include the provision of equipment, to ensure that your cabled and W-Fi network is secure, is set up correctly and stays that way.

Security awareness training

Ensure that your team understand cyber risks

Optional Optional Optional

Your people need to know how to recognise and respond to cyber threats. We offer a range of automated and bespoke training to help educate them.

Technology support
Service desk

Mon-Fri, 8am-6pm, fix all your tech problems

We provide unlimited remote support between the hours of 8am and 6pm, Monday to Friday. This provides access to our accredited technicians who can resolve your problem over the phone or can connect remotely to you wherever you are.

User management

User account set up, management and decommission

We make sure that user accounts are set up and managed correctly. It gets people working quickly and ensures that their permissions are right. Importantly, when they leave we make sure that their accounts are shut down properly.

Microsoft 365 management

Configure and maintain your MS 365 tenant

Keeping your M365 tenant tidy and organised is a never-ending job. We keep on top of it to make sure that everything is in good order.

Cloud backup facility

Unlimited 3rd party backup of your cloud data

Being able to recover your data is an essential pillar of efficiency and cyber security. We backup of everything in Microsoft 365 or Google Workspace, 3 times a day.

Backup management

Checking and fixing your backups every day

We check your backups every morning and fix any problems with them. To ensure that we are backing up everything correctly we sit down with you every 6 months and re-confirm all the details of your backup jobs.

Information security policy

Describe how your people should use tech

Its really important that your team know what is expected of them when they are using technology. We provide all our customers with a template Information Security Policy for them to implement.

Backup test restore

We test that your backups can be recovered

To ensure that your data can be restored effectively we run scheduled tests to check.

Email reputation management

We configure your email to make sure it gets delivered

Well configured email systems will only accept email from reputable sources. To ensure that your email gets through we setup and maintain DMARC.

Emergency onsite support

Never far away when you need us most

It doesn’t happen often but in the unlikely event that you need someone to resolve a critical problem in person we will send a technician to your location.

Bespoke device backups

Backups for servers, NAS and individual workstations

Optional Optional Optional

If you need a specific device to be backed up we have an option for that. Whether it’s a server, network attached storage or a workstation we make sure your data is regularly backed up offsite.

Site visits

A technician at your site on a regular basis

Optional Optional Optional

If you prefer your technology help delivered face-to-face we can schedule a technician to visit you.

Email signature management

Bring standardisation to your email signatures

Optional Optional Optional

Ensure that every email sent from your organisation reflects your brand and any messaging you want to emphasise. 

Tech advice
Purchasing expertise
Get the best prices and make the right choices

Our Purchasing Team are on hand to help with all your technology purchasing queries. We’ll liaise with suppliers to make sure you get the right technology at the right price.

License management

Looking after your Microsoft 365 licensing

Making sure that you have the right licenses is an ever changing challenge. Our experts are on top of all the latest developments and make sure you have what you need and no more.

Domain management

Maintaining your web domains

Purchasing, renewing and configuring your web domains is included in all our plans.

Technology roadmap
Helping you budget and plan your technology
Annual Biannual Biannual

Once you’ve been successfully on-boarded to one of our plans we will sit down with you and prepare a Technology Roadmap.

*Proactive Maintenance
Granite Quartz Diamond
Proactive maintenance
Remote monitoring & management

Proactive alerting and remediation of device issues

Backup review

Ensuring nothing is missing from your backups

Inactive users review

Checking that old accounts have been shut down

Disk encryption review

Making sure local hard disks are encrypted

Device reboot review

Prompting people to reboot if they’ve not for a while

Multi-Factor authentication review

Checking that important accounts are doubly secure 

Maintain asset list

Ensuring supported device list is up to date

Privileged access review

Keeping your administrator permissions tidy

Security incident review

Learning from security incidents and near misses

Web and desktop app review

Making sure applications stay under control

Teams owner review

Keeping MS Teams permissions tidy

Web category & site access review

Ensuring web activity is following the rules

Vulnerability scanning

Resolving advanced system vulnerabilities

Microsoft Sentinel alerting

Responding to advanced security alerts

**Microsoft 365 Security Baseline
Granite Quartz Diamond
Microsoft 365 Business Standard
Configure Logging and Alerting

Enable best practises to enhance your tenant security

Configure Access Control

Enable best practises to enhance your tenant security

Configure Security Policies

Enable best practises to enhance your tenant security

Configure Email Security

Enable best practises to enhance your tenant security

Tidy Administrator Permissions

Enable best practises to enhance your tenant security

Microsoft 365 Business Premium
Enhanced Alerting

High severity alerts are sent to the Evolve Service Desk

Enhanced Email and Data Security

Safe attachments, safe links, extends to data locations

Impersonation Protection

Protect your people from impersonation phishing attacks

Application Protection on Mobiles

Encrypt company data and allow remote wipe on any mobile

Data Loss Prevention

Notify on the detection of sensitive data being shared

Prevent Use of Unmanaged Devices

Only allow access to MS 365 data on approved devices

Prevent Use of Vulnerable Devices

Only allow access to MS 365 data on secure devices

Greater Control of Device Security

Enforce security, deploy settings more efficiently

Enterprise
Bespoke Feature Configuration

Tailored configuration of Enterprise Features in MS 365

Our four-stage defence

Each plan is built around the four stages of cyber defence:

  1. Block unauthorised access – keeping intruders out
  2. Strengthen internal defences – limiting damage if they get in
  3. Detect and respond fast – containing threats quickly
  4. Recover with confidence – restoring data and systems without disruption

Why choose Evolve?

With Evolve, you gain relentless protection and responsive support, delivered by a proactive, diligent team that’s always evolving to stay ahead of threats, so you can focus on growing your business with confidence.

Request a call with our team today to find the plan that fits your business best.

Ready to Stay One Step Ahead?

Get in touch and our team will show you how we keep businesses secure, efficient, and evolving.