Home Essential Services

As a Technology Service Provider, we are committed to help you strengthen your home technology systems with essential best practice technology services.

Our Home Essential package is designed to establish a baseline for technology services, drawing from global best practices including CIS, New Zealand NCSC, Essential 8, and the UK’s Cyber Essentials controls.

Our package listed below includes a variety of services to ensure a secure, reliable, fully managed, and cost-effective solution. All services are continuously monitored and managed to ensure optimal performance.

Internet Access Services

Stay connected with our internet access solutions, utilizing our nationwide network of Ultra-Fast Fibre Broadband services.

Keep your internet secure with our managed router service. We ensure your device is always up to date with the latest manufacturer-recommended software updates, thoroughly reviewing and quality-checking each update to maintain your device’s security and operational efficiency.

Zero-Trust Secure Web Browsing

Convert a traditional web browser into a zero-trust secure browser, with our managed solution. Zero-trust threat prevention technology protects you from advanced cybersecurity attacks by isolating threats from reaching your devices, such as desktops, laptops, smartphones, and tablets.

Key Features:

  • Secure Web Browser - Elevate browsers like Chrome and Edge to enterprise-tier security standards and improve the resilience of your clients.

  • Secure DNS Filtering - Safeguard your DNS layer to shield against malicious domain requests and control applications.

Cyber Security Services

Managed Security Service

Our essential cybersecurity solutions offer multiple layers of protection for your devices. This approach minimizes the attack surface and effectively blocks potential threats.

Key Features:

  • Technology Review - Regular review of your technology services to assess their performance, security and cost-effectiveness.

  • Password Manager - Protect, discover, share and rotate passwords, passkeys and confidential data in a zero-knowledge vault with secure access control. Simplify and strengthen password management with dark web monitoring for your exposed or stolen email and passwords.

  • Endpoint Security - Managed endpoint protection for computers, including a software firewall, website link (URL) protection, DNS website content filtering, file scanning, data storage encryption, malicious software and unknown threat protection.

  • Endpoint Posture Management - Managed Vulnerability Management provides automated vulnerability detection, prioritization and patching of the vulnerability. This reduces the risk of a data breach or other security incident and protect your organization’s digital assets.

  • Mobile Security - Managed mobile protection for mobile phones and tablets, including website link (URL) protection, DNS website content filtering, phishing protection, file download scanning, malicious software and unknown threat protection.

Backup and Disaster Recovery

Simplified Personal Backup

Enjoy peace of mind with our intuitive and powerful managed cloud backup solution for computers. Perfect for protecting all your personal files, photos, and data on a single device. Easy, secure, and dependable backup.

Key Features:

  • Smarter technology - Smarter cloud data backup from a single app, and lightning-quick recovery of any files on demand.

  • Malware Detection - Malware Detection uses machine learning to protect customer’s data from files containing malware, quarantining files believed to be malicious and allowing you to either mark them as safe or remove the files and revert to a previous, safe version.

  • Strong security - Bank-grade encryption is used to ensure the safety of all data protected, along with two-factor authentication (2FA) on the app. You create and manage their encryption keys, meaning that only you have access to recover your data.

Network Management

A robust network infrastructure is crucial for secure and reliable internet and network access. To maintain security and optimal performance, ongoing management and maintenance are essential.

Our network infrastructure management service takes a proactive approach.

Key Features:

  • Management of updates for network switches and wireless access points on the network.

  • Manage and backup configurations of network switches and wireless access points on the network.

  • Management of updates for IoT devices on the network.

Technology Training

Cybersecurity

Cybersecurity awareness training equips you with the knowledge to recognize and respond to potential threats, such as phishing attacks, malware, and social engineering tactics. These threats are designed to collect and steal your data, passwords and banking details. Reduce the risk of your data and passwords being stolen, by knowing what to look for.

Our Partners