top of page
Business Meeting throught the Window

Tursa Group's IT Support and Service Tech Stack

What is an MSP stack?

The MSP stack, short for Managed Service Provider stack, is a multifaceted approach to IT management that combines a range of technology solutions and services into a cohesive framework. This integrated stack is designed to address various aspects of IT management ,support and cyber security, creating a comprehensive ecosystem that enables MSPs to meet the unique needs of their clients.

Autotask RMM

Autotask RMM

Datto Remote Monitoring and Management (RMM) is a fully-featured, secure, cloud-based platform which enables MSPs to remotely monitor, manage, and support endpoints, reducing costs and increasing service delivery efficiency.

Data Gathered

  • Bad Sectors Hard Drives

  • Antivirus/Patch status

  • Data from Routers/Switches

  • BSOD info

  • Software/Hardware Audits

  • RAID/Temp/Power monitoring on servers

Value

  • Reduce Employee Downtime

  • Reduce Network Downtime

  • Mitigate security risks

Autotask PSA

Autotask PSA

Datto’s Autotask Professional Services Automation (PSA) is a powerful and intuitive cloud-based PSA platform providing a singular view of the entire business - enabling MSPs to centralize business operations and make data-driven decisions to improve service, productivity and profitability.

Data Gathered

  • User Support Requests

  • Automated ticketing from RMM monitoring

  • Automated ticketing from 3rd party portals via email

Value

  • Identify staff that need training to increase their productivity

  • Is there a pattern of Support requests around certain software or remote access that need looking into

  • Identify trends around types of Support requests 

Backup Reporting

Backup Reporting

Reporting into RMM for Reporting

Data Gathered

Failures and successes

Value

  • Ensure data is backed up

  • Reporting is “pushed” and tracked by IT

  • Backup reports pulled from multiple platforms for one pane of glass

Blackpoint Managed Detection and Response

Blackpoint.png

Blackpoint Cyber is a cyber security company delivering Next Generation Hunt and Response Software while reducing the security stack and spend. 

Data Gathered

Incident response platform excels at monitoring and catching modern hacking tradecraft, delivering
real-time alerts, and allowing for immediate threat response.

Value

  • Detection and Response
    (MDR) service provides 24/7/365

  • Human intervention within 15 minutes to start remediation

Bullphish

Bullphish

Phishing simulations

to “test” staff’s ability to detect phishing attempts. This will help with the education of staff, on how not to be fooled by phishing attempts that try to gain corporate information.

Security Awareness Training with videos and questions.

Data Gathered

Test Users ability to differentiate between legitimate and fraudulent emails.

Educational videos sent out twice per month to test Users knowledge of Cyber Security.

Value

  • Prevent Users passwords from being compromised through Phishing and social engineering. 

  • Minimize ability for Ransomware, Data Theft and Fraudulent Financial Transactions.

BrightgaugE
Reporting

Brightgaug Reporting

Dashboards, KPIs and Custom Reporting

Data Gathered

Data from any software applications to give insights to Management to enable better decision making

Value

Data driven decision making to increase profitability. 

Combine data from different sources to give a holistic view of data and patterns.

Datto RMM
Ransomware Detection

11RMM_Patch-Mgmt_Whitepaper_NL_web_assets_webassets_1600x400.jpg

Quarantine the infected device to prevent the spread of ransomware. Once ransomware is detected, Datto RMM can automatically isolate the impacted device from the rest of the network.

Data Gathered

Computer Process activity and computer behaviour

Value

  • Immediate notification when ransomware is detected.

  • Quarantine the infected device to prevent the spread of ransomware.

  • Recover quickly. Devices automatically isolated from the network

Dark Web ID

Dark Web ID

Dark Web Monitoring

We utilize a 3rd party service that monitors email addresses and passwords for sale on the Dark Web. If one of your company's emails is for sale, we will contact you immediately and advise you to change your password.

Data Gathered

Compromised email addresses and passwords in 3rd party websites.

Value

  • Passwords can be changed BEFORE malicious entities try to obtain access to Users Accounts such as Office 365/Gsuite or Network Accounts.
    Minimize ability for Ransomware, Data Theft and Fraudulent Financial Transactions.

IT Glue

IT Glue

Find, track and know everything with our award-winning, SOC 2-compliant documentation management platform features, specifically for IT documentation.

Data Gathered

  • Passwords, workflows, internal documentation.

Value

  • Secure place to store sensitive information.
    Documentation is saved in a structured way and shared with appropriate staff in a secure manner.

Keeper is the top-rated personal and business password manager for protection from password-related data breaches and cyberthreats.

Data Gathered

  • None

Value

  • Enforces strong passwords and Multi Factor Authentication which minimizes ability for Ransomware, Data Theft and Fraudulent Financial Transactions.
    Employees do not have to remember complex passwords

MSP360 is a best-in-class IT management platform developed to protect your data and your endpoints from the most advanced ransomware threats.

Data Gathered

  • None

Value

  • Simple and Profitable

  • SaaS-Based Management

phishing box

phishingbox.jfif

Establishing a robust security awareness training program is a necessity in today's cybercrime-prone environment. Security threats and compliance mandates require ongoing security awareness training for most organizations.

Data Gathered

  • None

Value

  • Suite of software tools, an organization can establish a sound employee security awareness program individuals and teams

Scalepad

Scalepad

When all your software and hardware asset data is aggregated in one central place, it’s even easier to make smart decisions. Drive consistency by viewing software and hardware data side-by-side: by organization, hardware type or on device level view.

Data Gathered

  • Hardware Specifications of all Computers/Servers.
    Software Specifications on all Computers/Servers.

Value

  • 3-4 Year Budgeting of Hardware replacement
    Easier tracking of software licensing

 backup Radar

Scalepad backup Radar.jfif

End-to-end automation solution helps reduce your risk of data loss with clear notifications of backup statuses, failures, and gaps

Data Gathered

  • Hardware Specifications of all Computers/Servers.
    Software Specifications on all Computers/Servers.

Value

  • 3-4 Year Budgeting of Hardware replacement
    Easier tracking of software licensing

black point snap defense

blackpoint snap.webp

A robust cybersecurity ecosystem focused on effective threat detection and active response

Data Gathered

  • Combining network visualization, tradecraft detection, and endpoint security, we detect and neutralize cyberthreats in their preliminary stages to provide true, 24/7 defense.

Value

Splashtop

dAjSnwUI_400x400.png

Remotely access your Windows PCs and Macs from your smartphone, tablet, or another computer – Just like you’re sitting in front of the computer.

Data Gathered

  • None

Value

  • Fast, simple, secure remote computer access for individuals and teams

  • Additional layer of security over a VPN when working remotely

Webroot DNS Protection
 

Webroot DNS Protection

Secure your DNS connection against cyberattacks, get total visibility into web usage, and enforce acceptable web usage policies to reduce security risk. The Web Protection feature is customizable to each computer in your organization. We can set the rules for what your employees are able to access from a central location. We can also adjust the protection for your specific needs so that each user has customized access on the internet or set it so all users are protected in the same way. Protect Users from known malicious websites

Data Gathered

  • Who is being steered to known malicious sites.

Value

  • Training of Staff on identifying malicious sites to prevent data loss or Identity loss.

  • Prevent staff from unwittingly going to known malicious websites and infecting their computer

Webroot Endpoint Protection

Webroot Endpoint Protection

Optional - Antivirus and Anti Malware software (Or use your own Corporate Anti Virus and Anti Malware)

Data Gathered

  • Virus and malware quarantined or that require additional removal techniques.

Value

  • Decrease chance of ransomware, viruses and other malicious tools of infiltrating network.
    Increase uptime for Users.
    Increase uptime of Network.

Easydmarc

easydmarc.png

EasyDMARC allows us to level up your domain reputation, minimize cyberattack risks, and solve email deliverability issues in a single platform in the shortest time.

Data Gathered

Value

  • Increase email deliverability, remain cybersecure against cyber criminals, and increase your domain reputation.

Experience Effortless IT Management

Empower your business with the MSP stack and IT solutions that enhance efficiency, security, and productivity. At Tursa Group, we're committed to delivering the IT support that drives your success. Contact us today to discuss your IT needs and discover how we can partner with you to achieve your business goals.

bottom of page