Tursa Group's IT Support and Service Tech Stack
What is an MSP stack?
The MSP stack, short for Managed Service Provider stack, is a multifaceted approach to IT management that combines a range of technology solutions and services into a cohesive framework. This integrated stack is designed to address various aspects of IT management ,support and cyber security, creating a comprehensive ecosystem that enables MSPs to meet the unique needs of their clients.
Datto Remote Monitoring and Management (RMM) is a fully-featured, secure, cloud-based platform which enables MSPs to remotely monitor, manage, and support endpoints, reducing costs and increasing service delivery efficiency.
Data Gathered
-
Bad Sectors Hard Drives
-
Antivirus/Patch status
-
Data from Routers/Switches
-
BSOD info
-
Software/Hardware Audits
-
RAID/Temp/Power monitoring on servers
Value
-
Reduce Employee Downtime
-
Reduce Network Downtime
-
Mitigate security risks
Datto’s Autotask Professional Services Automation (PSA) is a powerful and intuitive cloud-based PSA platform providing a singular view of the entire business - enabling MSPs to centralize business operations and make data-driven decisions to improve service, productivity and profitability.
Data Gathered
-
User Support Requests
-
Automated ticketing from RMM monitoring
-
Automated ticketing from 3rd party portals via email
Value
-
Identify staff that need training to increase their productivity
-
Is there a pattern of Support requests around certain software or remote access that need looking into
-
Identify trends around types of Support requests
Blackpoint Cyber is a cyber security company delivering Next Generation Hunt and Response Software while reducing the security stack and spend.
Data Gathered
Incident response platform excels at monitoring and catching modern hacking tradecraft, delivering
real-time alerts, and allowing for immediate threat response.
Value
-
Detection and Response
(MDR) service provides 24/7/365 -
Human intervention within 15 minutes to start remediation
Phishing simulations
to “test” staff’s ability to detect phishing attempts. This will help with the education of staff, on how not to be fooled by phishing attempts that try to gain corporate information.
Security Awareness Training with videos and questions.
Data Gathered
Test Users ability to differentiate between legitimate and fraudulent emails.
Educational videos sent out twice per month to test Users knowledge of Cyber Security.
Value
-
Prevent Users passwords from being compromised through Phishing and social engineering.
-
Minimize ability for Ransomware, Data Theft and Fraudulent Financial Transactions.
Dashboards, KPIs and Custom Reporting
Data Gathered
Data from any software applications to give insights to Management to enable better decision making
Value
Data driven decision making to increase profitability.
Combine data from different sources to give a holistic view of data and patterns.
Quarantine the infected device to prevent the spread of ransomware. Once ransomware is detected, Datto RMM can automatically isolate the impacted device from the rest of the network.
Data Gathered
Computer Process activity and computer behaviour
Value
-
Immediate notification when ransomware is detected.
-
Quarantine the infected device to prevent the spread of ransomware.
-
Recover quickly. Devices automatically isolated from the network
Dark Web Monitoring
We utilize a 3rd party service that monitors email addresses and passwords for sale on the Dark Web. If one of your company's emails is for sale, we will contact you immediately and advise you to change your password.
Data Gathered
Compromised email addresses and passwords in 3rd party websites.
Value
-
Passwords can be changed BEFORE malicious entities try to obtain access to Users Accounts such as Office 365/Gsuite or Network Accounts.
Minimize ability for Ransomware, Data Theft and Fraudulent Financial Transactions.
Find, track and know everything with our award-winning, SOC 2-compliant documentation management platform features, specifically for IT documentation.
Data Gathered
-
Passwords, workflows, internal documentation.
Value
-
Secure place to store sensitive information.
Documentation is saved in a structured way and shared with appropriate staff in a secure manner.
Keeper is the top-rated personal and business password manager for protection from password-related data breaches and cyberthreats.
Data Gathered
-
None
Value
-
Enforces strong passwords and Multi Factor Authentication which minimizes ability for Ransomware, Data Theft and Fraudulent Financial Transactions.
Employees do not have to remember complex passwords
Establishing a robust security awareness training program is a necessity in today's cybercrime-prone environment. Security threats and compliance mandates require ongoing security awareness training for most organizations.
Data Gathered
-
None
Value
-
Suite of software tools, an organization can establish a sound employee security awareness program individuals and teams
When all your software and hardware asset data is aggregated in one central place, it’s even easier to make smart decisions. Drive consistency by viewing software and hardware data side-by-side: by organization, hardware type or on device level view.
Data Gathered
-
Hardware Specifications of all Computers/Servers.
Software Specifications on all Computers/Servers.
Value
-
3-4 Year Budgeting of Hardware replacement
Easier tracking of software licensing
End-to-end automation solution helps reduce your risk of data loss with clear notifications of backup statuses, failures, and gaps
Data Gathered
-
Hardware Specifications of all Computers/Servers.
Software Specifications on all Computers/Servers.
Value
-
3-4 Year Budgeting of Hardware replacement
Easier tracking of software licensing
A robust cybersecurity ecosystem focused on effective threat detection and active response
Data Gathered
-
Combining network visualization, tradecraft detection, and endpoint security, we detect and neutralize cyberthreats in their preliminary stages to provide true, 24/7 defense.
Value
Splashtop
Remotely access your Windows PCs and Macs from your smartphone, tablet, or another computer – Just like you’re sitting in front of the computer.
Data Gathered
-
None
Value
-
Fast, simple, secure remote computer access for individuals and teams
-
Additional layer of security over a VPN when working remotely
Secure your DNS connection against cyberattacks, get total visibility into web usage, and enforce acceptable web usage policies to reduce security risk. The Web Protection feature is customizable to each computer in your organization. We can set the rules for what your employees are able to access from a central location. We can also adjust the protection for your specific needs so that each user has customized access on the internet or set it so all users are protected in the same way. Protect Users from known malicious websites
Data Gathered
-
Who is being steered to known malicious sites.
Value
-
Training of Staff on identifying malicious sites to prevent data loss or Identity loss.
-
Prevent staff from unwittingly going to known malicious websites and infecting their computer
Optional - Antivirus and Anti Malware software (Or use your own Corporate Anti Virus and Anti Malware)
Data Gathered
-
Virus and malware quarantined or that require additional removal techniques.
Value
-
Decrease chance of ransomware, viruses and other malicious tools of infiltrating network.
Increase uptime for Users.
Increase uptime of Network.
EasyDMARC allows us to level up your domain reputation, minimize cyberattack risks, and solve email deliverability issues in a single platform in the shortest time.
Data Gathered
-
Value
-
Increase email deliverability, remain cybersecure against cyber criminals, and increase your domain reputation.
Experience Effortless IT Management
Empower your business with the MSP stack and IT solutions that enhance efficiency, security, and productivity. At Tursa Group, we're committed to delivering the IT support that drives your success. Contact us today to discuss your IT needs and discover how we can partner with you to achieve your business goals.