Skip to searchSkip to main content
Pricing
  • NerdSquad Pricing

    A Complex Process Made Frictionless

    Our service plans are customized according to your needs
    Request A No-Pressure Quote
    Explore services based on the following
    Per User
    Per Device
    Per Organization
Our Services picture

Proposal Process

  • We'll get to know your business and its needs in detail first
  • Criteria such as number of devices and users, complexity and industry specific requirements will be evaluated
  • We offer co-managed services where we work in conjunction with your on-site technical team
  • Our services are guaranteed to add value to your business model - If we can't, we'll tell you so
  • Below is some basic pricing but a no-pressure introductory call is strongly recommended as we customize our service plans to meet your needs and budget

​Per Device Services

Endpoint Starter
Endpoint Pro
Endpoint 360
Endpoint Starter
  • Priority Helpdesk Support
  • Workstation & Server Monitoring & Management
  • Device Health Alert & Remediation
  • Patch Management
  • Microsoft 365 Management including employee onboarding and offboarding
  • Endpoint Detection & Response ("EDR" - includes Antivirus & Malware Protection for physical devices)
  • Works great in hybrid work environments (on and off-site) as well as employees that use their own devices (BYOD)
  • Fast Easy Onboarding
  • Quarterly Business Reviews
  • Same-Day Critical Response Service Level Agreement (9am-5pm, M-F, Excl. Holidays)
  • On-Site server backup available

Great Starter Value

$50 Per Month Per Endpoint or less

(Based on volume and payment frequency)


Start A Conversation
Endpoint Pro
  • Priority Helpdesk Support
  • Workstation & Server Monitoring & Management
  • Device Health Alert & Remediation
  • Patch Management
  • Microsoft 365 Management including employee onboarding and offboarding
  • Endpoint Detection & Response ("EDR" - includes Antivirus & Malware Protection for physical devices)
  • Daily Workstation Backup and Easy Restore
  • Works great in hybrid work environments (on and off-site) as well as employees that use their own devices (BYOD)
  • Fast Easy Onboarding
  • Quarterly Business Reviews
  • 5 Hour Critical Response Service Level Agreement (9am - 8pm, Mon-Sun, Excl. Holidays)
  • On-site server backup available

Best Overall Value

$75 Per Month Per Endpoint or less

(Based on volume and payment frequency)


Get A No Pressure Quote
Endpoint 360
  • Helpdesk Support
  • Remote Monitoring & Management
  • Device Health Alert & Remediation
  • Patch Management
  • Microsoft 365 Management including onboarding and offboarding of employees
  • Endpoint Detection & Response ("EDR" - includes Antivirus & Malware Protection for physical devices)
  • Security Operations Center As A Service (SOCaaS), also known as Managed Detection and Response (MDR):
    • Always on threat hunting
    • Backed by 5 global locations manned 24/7/365
    • Enhanced EDR supported by professional security team
    • Ingestion and analysis of data from all sources including mobile devices, network appliances and cloud services
    • Automatic remediation of most threats
    • Security event management & reporting
    • The ultimate in making your business cyber-resilient
  • Daily Workstation Backup & Easy Restore
  • Works great in hybrid work environments (on and off-site) as well as employees that use their own devices (BYOD)
  • Fast Easy Onboarding
  • Quarterly Business Reviews
  • 2 Hour Critical Response Service Level Agreement (24/7)
  • On-site server backup available

Comprehensive Solution for Physical Device Protection

$100 Per Month Per Endpoint or less

(Based on volume and payment frequency)


Get A No Pressure Quote

​Per User Services

Email Security (ES)

  • Multi-layered protection to defend against ransomware, malware, phishing & spam
  • Impersonation Protection
  • Link Protection (with Time-of-Click Analysis)
  • Geo-Fencing Capabilities
  • Automated Traffic Analysis
  • Machine Learning and Threat Analysis
  • Flexible filtering controls & allow / block lists
  • Quarantine management

Cloud Backup

  • Protect your business-critical data in SaaS applications, including Microsoft Cloud, Google Workspace, Salesforce, Dropbox and Box
  • Did you know cloud services do not guarantee your data is protected and oblige the user to take steps to do so?
  • Protect against ransomware, malware, data loss and data breaches
  • Flexibly search and recover items, mailboxes, or sites at any granular level
  • Easily recover data with point-in-time recovery

Advanced Email Security (AES)

  • Includes everything in ES, plus:
  • Attachment Assurance (Content Disarming and Sandboxing)
  • Message Retraction for Exchange Online environments (Office 365)

Phishing & Security Awareness Training

  • Periodic attempts to trick your team into opening fake malicious emails
  • Regular training to educate your team on best cybersecurity practices
  • Updated content based on latest security threats as well as ability to create your own courses
  • Required in many high compliance environments

Email Encryption

  • Gateway user-initiated encryption with user-initiated
  • Content scanning & filters
  • Policy definitions and data loss prevention at the organizational or user level
  • Automated selection of the best delivery method (BMOD)
  • Transport layer security (TLS) with secure fail-over
  • Advanced message content insight, quarantine and review
  • Custom message header filter and support for integration with third-party data loss prevention (DLP) solutions
  • DKIM signing for sender verification
  • 50MB file size attachments
  • Advanced message control and notification (recall, restrict forwarding, reply freeze and expiration)
  • No license needed for recipients
  • Supports regulatory compliance requirements
  • Works with hosted, on-premise and hybrid email systems

Advanced  Data Archiving

  • Litigation holds & more - Simple data management when meeting regulatory, legal & audit requirements
  • Easy to use, secure unified archive & eDiscovery for over 50 sources of communication like email, social media, Microsoft Teams & more
  • Data retention policies ranging from one month to indefinite 
  • Write once, read many (WORM) storage to achieve the highest level of compliance requirements
  • Extensive search capabilities such as proactive glossary scanning, data classification, attachment OCR scanning and content indexing
  • Easily adapt to changing regulations including HIPPA, FCC, FOIA, SEC, PCI DSS, FINRA, GDPR, GoBD and more
  • Securely share datasets with third parties without external hard drives or SFTP sites
  • SMS Archiving Capabilities

Email Continuity

  • Business depends on email communication 24/7 and any outage can result in loss of productivity, revenue & customers
  • Failsafe protection for your email server at all times
  • Fully functional Outlook Web Access during an outage - read, reply, forward & compose/send until the primary server is back online
  • Access the last 30 days of email during an outage
  • Seamless continuity when primary server comes back online
  • Works with Email Threat Protection to keep your email safe

​Per Organization Services

Vulnerability Assessments and Penetration Testing

  • Many regulatory bodies dictate quarterly vulnerability scans and penetration tests annually or after major changes
  • Receive a prioritized list of all vulnerabilities identified as well as a roadmap for security growth
  • Receive documentation of the path taken to obtain administrative credentials
  • Receive a written report containing a high-level executive summary and results, a detailed analysis of each vulnerability including remediation suggestions, a detailed analysis of the steps taken to compromise your system and more
  • Tests if existing vulnerabilities can be leveraged to gain unauthorized access
  • Monthly and Quarterly testing available to address the constantly evolving vulnerability landscape

Employee Activity Monitoring

  • Insider threat detection & fraud prevention
  • Data loss prevention
  • Productivity Analysis (e.g. Active vs. Idle Time)
  • Screen capture, live view & historical playback
  • Keystroke logging and OCR (to detect users who may have seen sensitive data but did not type it)
  • File Share / Activity Blocking
  • Printed Document Tracking
  • Email Monitoring
  • Advanced user behavior analytics
  • Mitigate insider risks such as disgruntled employees
  • Automated Alerts with granular policies to detect any type of content from resumes, adult content and more
  • Social Media & Application Monitoring

Dark Web Monitoring

  • Real-time detection of personally identifiable information (PII) such as login credentials, Social Security numbers, and credit card numbers
  • Monitor for sensitive information that may have been exploited previously to mitigate threats earlier
  • Gain instant alerts whenever leaked credentials and critical information are found on the deep or dark web
  • Fraud detection and protection - receive alerts on illegal credit card dumps and personal information leaks
  • Faster threat analysis and resolution which enables you to investigate and respond to threats quickly and efficiently
  • Gain visibility into vulnerabilities so you can take action and prevent breaches before attackers can exploit the weakness
  • Most regulatory mandates recommend implementing measures to prevent data breaches - this is one of the best ways you can prevent attacks before they occur

Cybersecurity Insurance

  • Protect from AI driven attacks while providing financial coverage
  • Active risk insights ensure you stay in compliance
  • Protection and payments for ransoms, phishing scams, SMS and gift card scams, business interruption, data recovery services and more
  • Goes far beyond what is typically covered in general liability policies

Email Message Privacy

  • Control the use of sensitive documents so data does not fall into the wrong hands - avoids the need to use unapproved public file sharing apps
  • Send and receive encrypted messages
  • 100GB file size attachments
  • E-signature and QR code verification
  • Advanced message control and notification (recall, restrict forwarding, reply freeze and message expiration)
  • Tracking records when messages and files are sent, read, replied to, forwarded, printed or deleted
  • Full mobile functionality
  • No license needed for recipients
  • Works with Microsoft 365, on-premise Exchange, and G-Suite
  • Helps meet regulatory requirements like HIPAA, FINRA, GLBA, E-Sign and more

​Our Easy Process

We strive to make it simple to work with us. We're sticklers for detail though and will gain a comprehensive understanding of your needs before we make ROI-centric suggestions.  

Step One

Discovery call, information gathering and needs analysis

Step Two

Detailed evaluation of current systems and service recommendations

Step Three

Proposal, Q&A and execution of contracts (no long-term commitments ever)

Step Four

Agent deployment, initial scan & testing and employee training

Get A No Pressure Quote