Simply Transparent.

Why do companies hide their prices?
First, so they can hound you. Second, they can charge everyone different amounts. Third, to charge you what they think you'll pay.

That's not what Internetek stands for. We clearly display our support prices so you can see what you're getting and for how much.

Prevention I II III
The only good cybersecurity event is the one that never happens. Even if the attacker doesn't manage to do any damage, you'll still spend countless hours checking and rechecking every system for any left over compromises or you'll never feel safe. They didn't even do anything and you're still losing money! We prevent the attacker from reaching your systems through our layered security. We actively monitor these systems so we can quickly respond to anything that looks suspicious before an attacker can get a foothold.
Remote Monitoring: We proactively monitor your desktops, laptops, and servers to prevent costly downtime. We handle the alerts before they grow up into full issues.
Managed Antivirus: Incorrectly configured and outdated antivirus exposes you to ransomware when you think you’re protected. We have experience configuring and monitoring your antivirus to keep you safe.
Domain Filtering: The Internet can be a dangerous place. Our domain and website filtering keeps you safe by blocking fake, scam, ransom, and other threats while browsing the web. On the road or in the office, we've got you covered.
Password Vault: We partner with top-rated security vendors to provide secure and encrypted password storage that's easy to use. Create complex passwords and keep them safe.
Dark Web Monitoring: Are your credentials being sold to the highest bidder? Our dark web monitoring service checks if your credentials are compromised and notifies us to take action.
Application Whitelisting: Attackers want you to run malware on your computer so they can ransom everything you can access. Our learning application whitelisting prevents their malware from running even if anti-virus hasn't seen it before.
Mail Filtering: Spam is frustrating and the most common way of getting scammed. We work with high quality mail filters to prevent spam and scams from reaching your staff. No gift cards being bought for some fake boss.
Mail Virus Filtering: Viruses in e-mail are uncommon now, but devastating. Our service scans for viruses and scam sites and blocks them.
Phishing Simulation: Scam emails are one the leading ways that businesses lose money and ransomware gets on your computers. Our email scam simulations help your employees identify scams and get training when they get tricked.
External Network Scan: Misconfigured firewalls are backdoors into your network for attackers to bypass all your carefully configured security. We scan your network for vulnerabilities so you know before the bad guys do.
Vulnerability Management: Our vulnerability scanner periodically checks your network for the latest exploits so we can correct them before the bad guys take advantage.
Detection I II III
Your data is important so we don't rely only on prevention. We deploy multiple methods to detect an attacker or faulty systems so we can take measures before productivity is lost.
Ransomware Canaries: Ransomware is always evolving to get through antivirus and security measures. Our service includes digital tripwires to detect activity so we can quickly quarantine systems and prevent further spread.
Security Operations Center: We provide 24/7/365 security monitoring for your network, firewalls, Office 365, and servers. Something shouldn't be on your network? We already know about it and are handling it.
Network Mapping and Monitoring: We map your entire network to find misconfigurations, alerts, and security issues. We monitor your infrastructure for potential failures so you have minutes of downtime instead of days of no production.
Honeypot: The bad guys shouldn't get into your network, but if they do they'll trip the honeypot and we'll know they're up to no good. We'll respond and lock them out before they're able to do damage.
Recovery I II III
Internet out? Mail server down? Lost the laptop full of critical data? We've got you covered. We'll keep your business operational while we work to bring your services back online.
Cloud-Based Backups: Ransomware, accidentally deleted files, and malicious employees can ruin your business. Our monitored cloud backups protect you from these bad days. We'll have your files back in no time.
Incident Response: When everything goes wrong, we're here for you. Our expert team and our trusted partners will work to asses the damage, mitigate it, and make everything good again so you can go back to work.
Mail Spooling and Continuity: How bad does it look when a customer emails you and they get a bounce message because your mail server or ISP is down? Our service holds the emails until you're back online.
Management I II III
Let us handle the technology so you can focus on your business. We manage as much or as little as you need.
Patch Management: Researching updates so they don’t break software is time consuming and you have work to do. We research and verify all updates in our lab before they're approved for your computers.
Server Management: AD, DHCP, DNS, Mail, Files, ACL, backups, and others. So many services and so little time to read the manual. We have extensive experience with server systems and operating them for you.
Network Management: Threats, licenses, and configurations are hard when you’re busy running your business. We work with you to keep your network running smoothly while adapting to the needs of your growing business.
Procurement Management: There are so many technology vendors selling what you need. We work with them all to negotiate the best discounts. All you need to do is contact us and we handle the rest.
Productivity I II III
We want your employees to use the best technology and for it to make sense. We provide learning resources so they can be up-to-speed quickly.
eLearning System: For all software we support, we provide training through scheduled classes, webinars, and recorded training available in our Learning Management System (LMS). You can also create your own courses!
Customizable Knowledgebase: We learn your environment and add it to the knowledgebase so we can resolve issues faster next time. You can access the same knowledgebase and add articles for your own employees as well!
Microsoft 365 Suite: Microsoft 365 (formerly Office 365) supplies the full Office suite and the cloud Exchange mail server. A modern business runs on e-mail. Through Microsoft 365 we provide you'll always get them.
Support I II III
Boutique Support Portal: One size does not fit all. Our support portal is tailored to your needs.
Need help?: You can reach us by E-mail, Phone, Website, and Support portal.
8x5 Support: Support covers standard production hours of Monday through Friday from 8AM to 5PM.
24x7 Support: Support covers extended hours. All days and times except holidays.    
On-Site Support: If we have to come to your office, this is how much we charge for the trip. $30 $15 $0
Not Covered Services (hourly): For things not on our inclusion list or outside your support hours. $100 $100 $100
Price Per Unit Covered I II III
Desktop/Laptop (each) $75 $125 $200
Server (each) $125 $200 $300
What about up-front costs?

Don't worry, there are no surprises. We do have to charge more on your first bill, but it's quite simple and covers the initial overhead of getting you set up.

What about the small print?

Not much there either. You can't mix plans, and all covered hardware goes to the highest plan selected. If you call us after hours, we have a two hour minimum. In addition, any items not covered under the Master Service Agreement (MSA) we just bill at our hourly support rate. Other than that, we request a term of at least one year.

 

Get in Touch

Need more information? We'd love to hear from you!

Our Office

12711 Townepark Way
Louisville, KY 40243

Contact Us

(888) 526-1631
[email protected]

Contact Us

First name
Last name
Email address
Phone
Your message