Maverick GardnerMaverick Gardner

Services

Welcome to Maverick Gardner! Our team is dedicated to delivering the most effective and efficient IT services to our clients. While our core services are comprehensive, they are by no means exhaustive. Each member of our team brings their own unique skill set, allowing us to customize premium and specialized services tailored to your specific business needs. Trust us as your trusted IT service provider.

2024 MSP Packages

To stay up to date in the cyber world we put together packages to keep your business’ data and security current.  We constructed packages starting with our Safegard Basic which includes robust security with consumption based IT service.  To add value we created Safegard Advance to accomedate businesses with more cycber activity.  Our Safegard Premier provides the best value with all you need without having to hire IT staff.

Basic

Company Size: Basic is ideal for small to medium-sized businesses (SMBs) that are starting their journey in cybersecurity

Highlights:

  • Basic Services
  • Consumption Based Help Desk
  • A la Cart Add-Ons

Price Per End Point: *$75/month

Basic

Who is this product for?

This plan is perfect for companies needing essential protection and monitoring without requiring advanced features or complex setups.

What is it going to do for them?
Basic offers fundamental security measures, including 24x7 monitoring, automated maintenance with operating system updates and third-party patch management, and essential threat detection and response. It provides real-time alerts and performance optimization through resource utilization tracking and system health checks. This package ensures that your business is continuously monitored and protected from common cyber threats, allowing you to focus on your core operations with confidence.

Premier

Company Size: Premier is designed for large enterprises or businesses in high-risk industries where maximum security and comprehensive IT management are critical.

Highlights:

  • Multifactor Authenication
  • Security Awareness Training
  • Credential Management
  • Backup & Disaster Recovery
  • Business Continuity Planning
  • Cloud Security, Compliance & Data Governance
  • 24x7 Help Desk

Price per end Point: *$243/month

+

Premier

Who is this product for?

It’s perfect for organizations that require top-tier protection and extensive support.

What is it going to do for them?
Premier offers the most comprehensive cybersecurity and IT management solution, including everything from the Advanced package plus additional features like endpoint backup, business continuity planning, and 24x7 helpdesk services. This package also includes cloud services management, advanced threat detection, and proactive risk mitigation through dark web monitoring. Security awareness training, such as phishing simulations and interactive learning modules, is also included. Safegard: Premier ensures your business is protected at all levels, from cloud compliance and data governance to advanced email security, making it the ultimate solution for those who prioritize security and operational resilience.

Advanced

Company Size: Advanced is designed for businesses that require more robust cybersecurity measures and are ready to step up their security game.

Highlights:

  • Multifactor Authentication
  • Security Awareness Training
  • 8x5 Help Desk

Price per end Point: *$167/month

+

Advanced

Who is this product for?

It’s suited for companies handling sensitive data or those needing to comply with industry regulations.

What is it going to do for them?
Advanced builds on the Basic package by adding enhanced features like multifactor authentication, credential management as an add-on, and more comprehensive helpdesk services available 5x8. Additionally, this package includes advanced email security, automated scripting, and the option for 24x7 helpdesk support as an add-on. This plan ensures stronger protection against sophisticated threats, optimized performance, and better management of your IT assets, all while helping you stay compliant with industry standards.

All MSP Packages Include:

Comprehensive Cyber Security

Proactive Threat Hunting

Incident Response

Advanced Threat Detection

Security Operations Centre

SIEM

Privileged Access Management

Remote Monitoring & Management

Proactive 24×7 Monitoring

Real-Time Intelligent Alerts

Automated Operating System Updates

3rd Party Patch Management

Automated Scripting

Performance Optimization

System Health Checks

Inventory Tracks

Lifecycle Management

Advanced Email Security

Anti-Phising

Malware & Ransomware Protection

Spam Filtering

Data Loss Prevention

Advanced Threat Protection

Impersonation Protection

* Prices are based on average reoccuring monthly prices per user end point.  Prices listed are only for approximate budget decision making.  Depending on business variables the end cost may fluxuate.  Pricing varies depending on organization size, IT complexity, and program design. Programs are custom built to suit your organizational needs.  Errors and Ommissions Excepted.

We help procure hardware....

 

Take the guess work out of which tech works best for your needs.  We find the best hardware solutions for your business, as our client we provide complimentary set-up when purchased through us.

Custom Solutions

Looking for something above and beyond what a regular MSP can offer?  We have a team with a diverse set of skills from unique solutions to project management.



RMM

Proactive and intelligent remote monitoring and management.

~

Cybersecurity

Managed Detection & Response, 24×7 Security Operation Centre



Backup & Disaster Recovery

Your business’ critical data is safe with us



Project Management

We have the team to make ideas come true



Compliance-as-a-Service

We can help nagatigate compliance, generating policies and agreements, procure thrid party services and software.

w

Consultation

We’re here to guide you with ever facet of your business’ IT.



Web Hosting

Business website hosting in Canada.

î„„

Software-as-a-Service

Industry leading software like Microsoft 365, Adobe Creative Cloud, and more…



Procurement

Hassle-free procurement of business hardware, software, and licenses. 

Frequently Asked Questions

What is the onboarding process?

 

Onboarding can vary from one organization to another, but typically this is the process once an agreement has been established.

  1. Establish Timeline: review the requirements of the organization and align deliverables based on their impact on the end users.
  2. Hardware Audit: deploy network scanning tools to collect all desktops, laptops, network devices, printers, A/V devices, etc. If the organization has a work-from-home, or hybrid workforce, collect information about those end-users/devices.
  3. Software Audit: identify any specific software, services, solutions that are used by the organization. This can include Cloud Services like Microsoft 365 or Google Workspace, Accounting software like QuickBooks Online/Desktop, Engineering software like AutoCAD or SolidWorks, Design/Creative software like Adobe Creative Cloud, etc.
  4. Deploy:
  • Remote Machine Management (RMM) agent on all Windows, MacOS, and Linux devices.
  • Network devices will be configured using Simple Network Management Protocol (SMNP).
  • Deploy Managed Detection and Response (MDR) agent, Privilege Access Management (PAM), and MSP toolset.
  • Connect

5. Enforce Update and Patching policies

Help Desk Availability and Service Level Agreement (SLAs)

 

  • Our helpdesk is available 8×5 and 24×7 depending on the service agreement.
  • Issues can be escalated to our helpdesk by telephone, email, and mobile app.
  • Tickets and issues are assigned priority based on the impact, severity, and scope of the issue.
What is your pricing structure?

 

  • Our pricing for Managed Services is per user/endpoint, connected network and infrastructure hardware, and cloud services. The helpdesk is charged per-incident or all-inclusive based on the needs of the customer.
  • Our pricing for Co-Managed Services is based on per-hour requirement, project scope, and technical requirements/proficiencies.
What Services do you offer?

 

We have many offerings, including;

  • Managed Services for SMBs
  • Proactive Remote Machine Monitoring
  • Automatic Patching, Updates, and 3rd Party Software Management
  • Managed Detection & Response
  • Cloud Management
  • Backup & Restoration
  • Business Continuity & Disaster Recovery
  • 24×7 Helpdesk
  • Value Added Resale (VARs)
  • 24×7 Security Operation Centre (SOC) and System Information Event Monitoring (SIEM)
  • Advanced Email Security, Managed DNS
  • SaaS Licensing
  • Co-Managed Services for Large-Enterprise Customers
  • Staff Augmentation
  • Project Management
  • Consultation
  • Security Audits & Compliance
  • Policies & Procedures
  • Compliance Frameworks
  • Audit Preparedness
How do you ensure the security of our data?

 

  • Comprehensive security Policies, Procedures, and Compliance frameworks built around industry-standard regulations.
  • Access controls and mandatory Multi-Factor Authentication (MFA)
  • Advanced Encryption for data at rest and in transit
  • Intrusion Detection and Prevention Systems (IDPS)
  • Business Continuity, Data Backup, and Disaster Recovery
  • Advanced Email Security (Spam Filtering, Anti-Phishing, Data Encryption, Sandboxing, Secure Email Gateway (SEG), Email Data Protection (EDP), and Integrated Cloud Email Security (ICES), and Business Email Compromise (BEC) protection)
  • Zero-Trust Frameworks
  • 24×7 Security Operations Centre (SOC) and System Information Event Monitoring (SIEM) monitors all activity across endpoints, network devices, and cloud services.
  • Incident Response Policies
How do you handle data backup and disaster recovery?

 

– We recommend at the very least each customer has a daily backup of business-critical data. By leveraging a 3-2-1 backup rule, each customer should have 3 separate copies of their data, 2 of which are local/onsite in different mediums (e.g. hard drive(s), separate external drive or network attached storage, or flash media), and 1 offsite copy in the cloud or external facility.

– Each backup is monitored to ensure all data is captured effectively.

– Frequency, retention, and testing are tailored to meet the requirements of our customers.

– Backups can be done by per-endpoint, per-storage device, and per-cloud service.