Choose the perfect plan

Select a plan based on your organization’s IT service needs and we will help you customize it to make it the perfect plan for you!

SERVICES

IT SUPPORT

INFRASTRUCTURE MANAGEMENT

CYBERSECURITY

Standard
  • 24/7 Help Desk
  • On-site Support
  • Employee Onboarding & Offboarding
  • Network Monitoring & Maintenance
  • OS & 3rd Party Patching
  • Backup & Disaster Recovery
  • Endpoint Security Protection
  • Security Awareness Training
Professional
  • 24/7 Help Desk
  • On-site Support
  • Employee Onboarding & Offboarding
  • Everything in STANDARD

  • Zero Touch Deployment
  • Mobile Device Management
  • Everything in STANDARD

  • Phishing Campaign
  • Targeted Threat Protection
Advanced
  • 24/7 Help Desk
  • On-site Support
  • Employee Onboarding & Offboarding
  • Everything in PROFESSIONAL

  • Technology Infrastructure Assessment
  • Everything in PROFESSIONAL

  • Security Assessment
  • Single Sign-On

What Our Clients Say

All Services

IT Support Services

On-Demand – Responsive – Supportive

ECHO provides a full IT Service Desk to ensure you have access to a technical team when most needed.  The service desk team is ready to address your needs and committed to resolving your issues in the most expeditious way possible. 

STANDARD
PROFESSIONAL
ADVANCED

24/7 IT Help Desk

24/7 IT Help Desk

24/7 IT Help Desk

24/7 IT Help Desk

On-Site IT Support

On-Site IT Support

On-Site IT Support

On-Site IT Support

Employee Onboarding & Offboarding

Employee Onboarding & Offboarding

Employee Onboarding & Offboarding

Employee Onboarding & Offboarding

Desktop & Laptop Support (Mac & Windows)

Desktop & Laptop Support (Mac & Windows)

Desktop & Laptop Support (Mac & Windows)

Desktop & Laptop Support (Mac & Windows)

O365 & G-Suite Support

O365 & G-Suite Support

O365 & G-Suite Support

O365 & G-Suite Support

Application Support & Administration

Application Support & Administration

Application Support & Administration

Application Support & Administration

Procurement Services

Procurement Services

Procurement Services

Procurement Services

STANDARD
PROFESSIONAL
ADVANCED

Network Operation Center (NOC)

Network Operation Center (NOC)

Network Operation Center (NOC)

Network Operation Center (NOC)

Network Monitoring & Maintenance Services

Network Monitoring & Maintenance Services

Network Monitoring & Maintenance Services

Network Monitoring & Maintenance Services

Server, Directory & VM Monitoring and Maintenance Services

Server, Directory & VM Monitoring and Maintenance Services

Server, Directory & VM Monitoring and Maintenance Services

Server, Directory & VM Monitoring and Maintenance Services

Remote Monitoring & Patching

Remote Monitoring & Patching

Remote Monitoring & Patching

Remote Monitoring & Patching

Workstation OS & 3rd Party Patching

Workstation OS & 3rd Party Patching

Workstation OS & 3rd Party Patching

Workstation OS & 3rd Party Patching

Backup & Disaster Recovery

Backup & Disaster Recovery

Backup & Disaster Recovery

Backup & Disaster Recovery

Zero Touch Workstation Management

Zero Touch Workstation Management

Zero Touch Workstation Management

Zero Touch Workstation Management

Asset & Mobile Device Management

Asset & Mobile Device Management

Asset & Mobile Device Management

Asset & Mobile Device Management

Annual Technology Infrastructure Assessments

Annual Technology Infrastructure Assessments

Annual Technology Infrastructure Assessments

Annual Technology Infrastructure Assessments

Infrastructure Management

Proactive – Preventaive – Managed

The Network Operation Center (NOC) is dedicated to keeping your infrastructure healthy and safe.  The NOC are skilled engineers working to keep your infrastructure reliable, optimized and patched to ensure you can work worry free of cybersecurity threats and unnecessary downtime.

Cybersecurity

Secured – Protected – Aware​

Cybersecurity is on the rise and without the proper safeguards, data, assets and corporate reputations are at risk. Taking preventative measures are critical. In order to ensure the proper security systems are in place, ECHO provides a suite of solutions.

STANDARD
PROFESSIONAL
ADVANCED

Webroot Endpoint Security Protection

Webroot Endpoint Security Protection

Webroot Endpoint Security Protection

Webroot Endpoint Security Protection

Security Vulnerability Scans

Security Vulnerability Scans

Security Vulnerability Scans

Security Vulnerability Scans

Webroot DNS Protection

Webroot DNS Protection

Webroot DNS Protection

Webroot DNS Protection

Identity Management

Identity Management

Identity Management

Identity Management

Mimecast S1 Target Threat Protection (Secured Email Service)

Mimecast S1 Target Threat Protection (Secured Email Service)

Mimecast S1 Target Threat Protection (Secured Email Service)

Mimecast S1 Target Threat Protection (Secured Email Service)

Security Awareness Training

Security Awareness Training

Security Awareness Training

Security Awareness Training

Incident Response Management

Incident Response Management

Incident Response Management

Incident Response Management

Multi-Factor Authentication

Multi-Factor Authentication

Multi-Factor Authentication

Multi-Factor Authentication

Phishing Campaigns

Phishing Campaigns

Phishing Campaigns

Phishing Campaigns

Okta Single Sign-On

Okta Single Sign-On

Okta Single Sign-On

Okta Single Sign-On

Security Audits and Compliance

Security Audits and Compliance

Security Audits and Compliance

Security Audits and Compliance

Security Assessment

Security Assessment

Security Assessment

Security Assessment

Add-On Services

Looking to add a few custom services without upgrading to a higher plan? 

ECHO offers the following add-on services that can be added to any of the above plans for an additional fee. 

  • Cloud Platform Hosting (AWS, Azure, Google)
  • WordPress Managed Services
  • File Migration
  • Email Migration
  • Cloud Migration
  • Server Migration

Managed Cloud Services

Shareable – Scalable – Virtual​

ECHO provides the expertise you strive for to ensure your services in the cloud are running smoothly, accessible and protected from cybersecurity attacks.

Business Continuity

Recoverable – Fault Tolerant – Complaint

Being prepared for the unexpected is critical to keep your company running smoothly. Having the right solution implemented will ensure your company is protected from these unforeseen events.  This can best be addressed with a well thought out business continuity plan that is integrated into your technology Infrastructure and practice.

  • Backup & Restore Services
  • Internet Continuity Services
  • Hardware Redundancy
  • Virtual Server Recovery
  • Technology Infrastructure Assessments*
  • Disaster Recovery Planning
  • Security Audits & Compliance*
  • Security Assessment*
  • Server Consolidation Planning
  • Cloud Migration Planning

* Included in the Advanced Plan but available as

   an add-on for other plans.

TECHNOLOGY PLANNING​

Agile – Prepared – Competitive​

Technology Planning ensures a sound technology foundation and aligns you in the right direction to help them future proof your environment to best serve your business.