MANAGED IT SERVICES

Let Omni handle your technology with a simple per user agreement that makes us responsible for maintaining your technology, supporting your staff, and keeping your organization safe.

More Uptime. Better Security. Happy Employees. Less Stress.

Omni’s Managed IT services offer one simple agreement that makes us responsible for maintaining your technology and supporting your people.

We offer two types of agreements: Complete and Limited. Both include our full suite of tools, the time required to manage those tools, as well as advisory services.

With Complete, there is no additional billing for any help desk or support services. Some like to call it the "all you can eat" model.

With Limited, any help desk or support services performed are billable (10% discount on standard hourly rates). This agreement comes with a lower monthly cost and is a preferred approach for organizations with some type of in-house information technology personnel that can handle the daily support needs.

Omni will work with you to understand your business, number of employees, and challenges faced. Based on that, a proposal will be generated for additional discussions.

Remote Monitoring | OS Patch Management | IT Automation

Device Encryption Management

Anti-Phishing Email Security

Privileged Access Management

Server/Endpoint Protection with EDR & MDR

Microsoft 365 Cloud-to-Cloud Backup

Security Awareness Training

Third-Party Assessments / Pen Tests

Multi-Factor Authentication (MFA) for Microsoft 365

Details on tools included in both Complete and Limited packages:

  • Remote Monitoring | OS Patch Management | IT Automation - The core of Omni's offering is our remote monitoring and management agent. This allows us to gather detailed information on servers/endpoints, remote control access for prompt help desk support, behind the scenes configuration updates to fix issues, patching server and workstation operating systems and drivers, service monitoring, and scripting functions to automate tasks such as disk cleanup.
  • Device Encryption Management - Increased remote working makes it more important than ever to secure computers and the data on them. With the huge number of laptops lost, stolen, or misplaced every day, a crucial first line of defense against the loss or theft of devices is full disk encryption. Omni's encryption management tool enables and enforces the use of Windows Bitlocker and/or macOS FileVault to secure devices and data. The recovery key (per device) is securely stored in multiple locations in the event it is needed.
  • Anti-Phishing Email Security - Cloud-native, API-based email security platform that is continuously learning, detecting, and remediating advanced threats at the mailbox level, before and after email delivery. The solution is powered by AI, the community, and end users. By taking a comprehensive, all-in-one approach, the platform puts you in the best position to fight a variety of known and unknown attacks, including: Malware, Ransomware, Credential theft, Business email compromise (BEC), Account Takeovers (ATO), Polymorphic and zero-day attacks, and Time-Delayed attacks. A “Report phishing” button integrates to Outlook for end users to report an email they are unsure of.
  • Privileged Access Management - Principal of Least Privilege: The idea that any user, program, or process should only have the privileges necessary to perform its function. In an IT environment, adhering to the principle of least privilege reduces the risk of attackers gaining access to critical systems or sensitive data by compromising a low-level user account, device, or application. Omni's tool will remove local administrator rights and quickly move to a more secure least privilege model that delivers a seamless end user experience. Auto admin privilege elevations based on rules for automation. Pre-approved application installers/updaters do not require IT intervention to install with admin credentials. Any “out of the norm” elevation requests submit a ticket into our system for review and approval or denial. 94% of Windows critical vulnerabilities are resolved by removing admin rights.
  • Server/Endpoint Protection with EDR & MDR - Automated malware removal, Cryptoguard ransomware file protection, Real-time antivirus, anti-malware protection, Web control and URL blocking, Deep-learning malware detection, Exploit prevention, Active adversary detection and prevention, Endpoint detection and response, Deep-learning malware analysis, Live Discover SQL queries. 24/7 proactive threat-hunting team that finds, contains, and neutralizes the most sophisticated attacks on your behalf. Instant Security Operations Center (SOC), 24/7 Threat Detection and Response, Expert-Led Threat Hunting, Full-Scale Incident Response Capabilities
  • Microsoft 365 Cloud-to-Cloud Backup - Microsoft does provide basic backup. The company backs up your Office 365 data every 12 hours and keeps it for 14 days. In the event of a ransomware attack, for instance, you can reach out to Microsoft, and they can restore your data. However, this will be a full restore, so everything else will be overwritten. This form of basic backup will not help you if you need to restore a single file or folder. It is also never easy trying to get quick support from a large enterprise like Microsoft. Omni's Microsoft 365 cloud-to-cloud backup solution runs as follows: Exchange email backup runs every 4 hours and retains data for up to 7 years. OneDrive, SharePoint, and Teams backups run every 6 hours and retains data for up to 7 years. Omni can easily restore one or many files or folders. Backup data center certifications in USA: HIPAA, ISO27001, NIST 800-53, PCI DSS, SOC 1 Type II, SOC 2 Type II.
  • Security Awareness Training - End users are the largest, most vulnerable target in most organizations. In real-world attacks, end users are relentlessly bombarded with spear-phishing and socially engineered schemes. We simulate hundreds of realistic and challenging phishing attacks. Over 500 email threat templates and 60 engaging training modules. If user falls for a phishing simulation, they are automatically enrolled into a short training via email notification. All data is recorded and reportable.
  • Third-Party Assessments / Pen Tests - We have partnered with a third-party company that allows us to simulate what would happen if a user opened and ran an executable on their PC. Learn if your team is using stale, repeated, or crackable passwords for accounts on your network. Security best practices for handling passwords and credentials are employed, such as the usage of multi-factor authentication for remote access, critical accounts and administrative accounts, enforcement of a strong password policy, absence of default and/or shared accounts, etc. Evaluate User Cyber Hygiene - When it comes to security, users are often your worst enemy. Cyber security hygiene is a critical part of defense. The third-party will crack passwords, review cookies, and even analyze tokens on their devices to measure the users' cyber hygiene. They will determine where sensitive data is stored on your devices and make sure it’s being guarded. Hackers commonly exploit both your network and data assets when attacking your network. They will also fully analyze Microsoft 365 security settings for best practices and security misconfigurations.
  • Multi-Factor Authentication for Microsoft 365 - By providing an extra barrier and layer of security that makes it incredibly difficult for attackers to get past, MFA can block over 99.9 percent of account compromise attacks. People are phished daily and give out multiple iterations of their passwords. With MFA, knowing or cracking the password won’t be enough to gain access.