SECURITY ONLY
ESSENTIALS
PRICING
A plan for every business.
Protozoon is the fixed-price subscription service offering four levels of packages to suit your needs.
Our all-inclusive package includes fully managed IT and Cybersecurity, combining helpdesk, infrastructure, cloud, procurement & hardware setup, onsite, managed security, 24/7 SOC and compliance alignment.
Our IT & Cybersecurity Essentials package excludes hardware and networks setup for teams that do not require device lifecycle management, however ad-hoc installations can be offered separately.
Our Managed Cybersecurity Complete package
Best-of-breed EDR and ITDR
24/7 expert-led SOC
Managed detection & response
SECURITY ONLY
COMPLETE
COMPLETE
All Essentials features, plus:
Advanced email & cloud security
Phishing simulation
Security training for staff
Cloud and device posture management
IT & SECURITY
ESSENTIALS
ESSENTIALS
All Cyber Complete features, plus:
Unlimited helpdesk support and phone helpdesk. Onsite support when required
Office365/ Google Suite
User onboarding/ offboarding, access and identity management
Mobile device management (MDM) setup & support
Peripheral devices support
Cloud & licencing management
Backups and recovery
IT & SECURITY
COMPLETE
COMPLETE
All IT & Security Essentials features, plus:
Network and WiFi management & support.
Procurement management (hardware, software & apps)
IT policy enforcement, compliance alignment
Second copy of immutable & offline backup
Cloud telephony support
MANAGED CYBERSECURITY
ESSENTIALS
ESSENTIALS
Best-of-breed EDR and ITDR
24/7 expert-led SOC
Managed detection & response
MANAGED CYBERSECURITY
COMPLETE
COMPLETE
Everything in Cybersecurity Essentials, plus:
Advanced email & cloud security
Phishing simulation
Security training for staff
Cloud and device posture management
Vulnerability management
IT & CYBERSECURITY
ESSENTIALS
ESSENTIALS
Everything in Cybersecurity Complete, plus:
Unlimited helpdesk support, including phone helpdesk and onsite support when required
Office365/ Google Suite
User onboarding/offboarding, access and identity management
Mobile device management (MDM) setup & support
Network and WiFi management & support. Peripheral devices support
Cloud,licencing & procurement management (hardware, software & apps)
IT policy enforcement, compliance alignement
Backups and disaster recovery
Second copy of immutable & offline backup
MANAGED CYBERSECURITY
ESSENTIALS
ESSENTIALS
Best-of-breed EDR and ITDR
24/7 expert-led SOC
Managed detection & response
MANAGED CYBERSECURITY
COMPLETE
COMPLETE
Everything in Cybersecurity Essentials, plus:
Advanced email & cloud security
Phishing simulation
Security training for staff
Cloud and device posture management
Vulnerability management
IT & CYBERSECURITY
ESSENTIALS
ESSENTIALS
Everything in Cybersecurity Complete, plus:
Unlimited helpdesk support, including phone helpdesk and onsite support when required
Office365/ Google Suite
User onboarding/offboarding, access and identity management
Mobile device management (MDM) setup & support
Network and WiFi management & support. Peripheral devices support
Cloud,licencing & procurement management (hardware, software & apps)
IT policy enforcement, compliance alignement
Backups and disaster recovery
Second copy of immutable & offline backup
MANAGED CYBERSECURITY
ESSENTIALS
ESSENTIALS
Best-of-breed EDR and ITDR
24/7 expert-led SOC
Managed detection & response
MANAGED CYBERSECURITY
COMPLETE
COMPLETE
Everything in Cybersecurity Essentials, plus:
Advanced email & cloud security
Phishing simulation
Security training for staff
Cloud and device posture management
Vulnerability management
IT & CYBERSECURITY
ESSENTIALS
ESSENTIALS
Everything in Cybersecurity Complete, plus:
Unlimited helpdesk support, including phone helpdesk and onsite support when required
Office365/ Google Suite
User onboarding/offboarding, access and identity management
Mobile device management (MDM) setup & support
Network and WiFi management & support. Peripheral devices support
Cloud,licencing & procurement management (hardware, software & apps)
IT policy enforcement, compliance alignement
Backups and disaster recovery
Second copy of immutable & offline backup
Ready to begin your safe digital journey?
Book a 30-minute call with our CTO. No sales pitch, just an honest conversation about your business and how we can help.