Name
We don’t sell or abuse your email address. We will communicate via email if no phone number is provided.
We don’t sell or abuse your email address. We will communicate via email and/or phone whichever is provided.
If you have physical and virtual servers then combine the total number into one number. If you are unsure enter your best guess.
Computers running the Windows operating system. Do not include thin clients, Linux devices, Apple devices, Chromebooks, or Android based devices.
Total of all office locations where computers and/or servers reside and support will be required.
Do not include tablets or mobile phones.
Example: Huntress MDR, SentinelOne EDR, Intune, ThreatLocker, Viper Anti-Virus, CrowdStrike, AutoElevate, Zero Trust
Check all that are true
This list is comprised of various types of questions with many related to the most common reasons an organization is seeking out an MSP. There is no obligation to answer these questions to request an estimate.
Check all cyber security regulations and controls that apply
This list covers the most common regulations impacting our clients. Each of these regulations impacts the overall security requirements of an organization therefore knowing which regulations impact your organization helps us build an accurate estimate that meet regulatory requirements. There is no obligation to answer these questions to request an estimate.
Multiple Choice
These questions are not required, but help us understand the communication cadence and urgency so we don’t bug you to much or move to slow.