ArcLight Security Suite is ideally suited for

Co-managed IT services represent a collaborative partnership model where a Managed Service Provider (MSP) works alongside an organization’s internal IT team to enhance capabilities and operational effectiveness. Through this approach, MSPs provide specialized security expertise to strengthen cybersecurity postures, offering services like 24/7 threat monitoring, vulnerability assessments, incident response, and compliance management that complement the internal team’s existing security measures. The MSP also delivers engineering services such as network design, cloud architecture planning, system optimization, and infrastructure modernization projects that may require specialized skills or additional bandwidth beyond what the internal team can provide. This co-managed model allows internal IT staff to focus on strategic initiatives and business-critical projects while the MSP handles routine monitoring, maintenance, and specialized technical tasks. The result is improved system reliability, enhanced security coverage, faster issue resolution, and access to enterprise-level expertise without the need to hire additional full-time staff, ultimately creating a more robust and scalable IT environment that supports business growth and digital transformation objectives.

Running a small business or starting your entrepreneurial journey? Security is crucial, but traditional tech support companies often overlook businesses like yours. Many impose high minimum costs—often $1,500/month—or simply refuse to work with businesses they deem “too small.” ArcLight was created to fill this gap. After working with countless solopreneurs and small businesses over the past 17 years, we recognized the need for a tailored solution. ArcLight offers flexible, affordable options without long-term contracts or high minimum commitments. With pay-by-the-minute support and month-to-month agreements, you get professional-grade security at a price you control—because your business deserves protection, no matter its size.

Executives, business owners, board members, and other high-value targets for hackers and scammers often benefit from robust corporate security measures. However, when it comes to personal devices—used at home by you or your family—security can be nonexistent. Accessing sensitive information such as bank accounts, investments, personal emails, cloud storage, or even corporate resources via VPN from an unprotected device puts both you and your organization at risk. While using a corporate computer for personal tasks may seem like an option, it’s often unwise to mix professional and personal activities. That’s where ArcLight steps in. We protect your personal devices and email accounts—ensuring a clear separation between corporate and personal use—while maintaining the same (or even higher) level of security available to your corporate systems. Perhaps you are not ready to fully lock down your personal computer? Consider using two separate devices: one fully secured for financial or personal tasks and another for entertainment or gaming. ArcLight can customize protection levels for each, so you can enjoy flexibility while staying safe where it matters most.

 
 

ArcLight Security Suite Gives You the
Peace of Mind You Deserve

What is included ✅ and what is not ❌

 

Think of MXDR as the bouncer at the exclusive club that is your computer system. It detects threats, kicks them out, and makes sure they don’t come back. If anything shady happens, MXDR isolates the problem faster than you can say “malware” and alerts the SOC to step in.

ArcLight’s Endpoint Detection & Response (EDR) delivers advanced threat hunting, Deep Visibility, and real-time forensics, ensuring prevention, detection, and rapid automated response to threats across all major vectors. It enables threat hunting, incident investigation, file integrity monitoring, and uncovering hidden risks, while its Attack Storyline visually maps execution flows to streamline impact analysis. With Deep Visibility, ArcLight provides comprehensive insight into agent events, access to historical data, and visibility into encrypted network traffic without requiring additional certificates or costly appliances.

Your IT team deserves a break, but your security doesn’t. That’s why we’ve got you covered 24/7. Our custom-built technology hunts threats while you sleep (or binge-watch your favorite series). Backed by an elite team of threat hunters, we’re always on—so you don’t have to be.

Ransomware canaries are like digital tripwires. These files sit quietly in your system, waiting for bad guys to make a move. If ransomware tries to encrypt your data, the canaries alert MXDR and the SOC, which then spring into action to shut down the attack and block it from spreading across your network.

Your systems deserve better than sneaky malware playing hide-and-seek. With our Process Insights service, we constantly monitor every process on your system—yes, even the ones pretending to behave. Our Managed Service Platform and SOC team dig deep to detect suspicious behaviors, like privilege escalation attempts or rogue processes trying to flex where they shouldn’t. Think of us as the Sherlock Holmes of your IT stack—always on the hunt, so you can focus on the good stuff. Stop threats in their tracks with us.

Hackers love low-hanging fruit—don’t let your open ports be their all-you-can-eat buffet.

With open port detection, you can uncover potential exposures lurking in remote desktop services, shadow IT, and more. Think of it as your tactical radar for spotting vulnerabilities before attackers do. Strengthen your external security posture and stay one step ahead of the game.

Hackers Think They’re Sneaky. We Know Better.

Today’s cybercriminals are playing hide-and-seek—using legitimate apps and processes to slip in unnoticed, like uninvited guests sneaking in through the back door. Once inside, they quietly plot their next move: deploying malware, locking up your data with ransomware, or just hanging around to wreak havoc later.

That’s where we come in. Our SOC team of AI and human-powered threat hunters sniffs out those lingering threats, identifies their persistence mechanisms, and eliminates them before they can execute their evil plans.

Because while hackers may be clever, you’ve got us on your side.

When Automation Sleeps, Threat Hunters Leap.

Sure, your automation is smart. But modern cyber threats? Smarter. Today’s attackers don’t take coffee breaks—they’re constantly exploiting blind spots and slipping past your IT security tools. That’s where **threat hunters** come in.

With a trained eye for tactics, techniques, and procedures (TTPs), threat hunters don’t just find what’s known—they uncover the *unknown*. They’re the frontline detectives sniffing out suspicious activity, making your software smarter, and stopping breaches before they happen.

Proactive, precise, and human. That’s the magic of threat hunting.

Because IT Heroes Deserve Backup

Our security software blocks, identifies, and remediates threats like a pro. But for those rare, persistent threats? Our SOC team steps in, alerts you, and even works with you to manually squash the issue—labor costs covered by your down payment.

Most threats won’t get this far, but when they do, we’ve got your back.

Windows patching might sound like a “set it and forget it” fantasy—like a toaster that magically knows your perfect toast level. But let’s face it: it often turns into a game of hide and seek with software vulnerabilities! Instead of playing detective with patch failures, why not let ArcLight handle the heavy lifting? We’ll monitor those patches, deploy like pros, and tackle any hiccups along the way. That way, you can kick back and enjoy a little peace of mind while staying current with security updates!

We provide comprehensive support for your desktop and laptop needs; however, support is not included in your subscription services. This is a strategic decision to keep your costs down, as bundling support would significantly increase prices.

Instead, we offer support through our Support, Engineering, and Emergency Retainer—an affordable, pay-as-you-go, per-minute billing approach that ensures help is there when you need it, without unnecessary costs.

SUPPORT

Support is not included with any ArcLight Security Subscription. This means assistance with your computer, ArcLight products, or other tech issues are not covered. Instead, we offer support through our Support, Engineering, and Emergency Retainer—an affordable, pay-as-you-go option that ensures help is there when you need it, without unnecessary costs.

We believe trust isn’t just earned—it’s maintained. That’s why we’re all about transparency. The Q&A below is your cheat sheet to understand exactly what’s you’re getting with your Support, Engineering, and Emergency Retainer. Think of it as your ultimate guide to getting the most from Team ArcLight. Once service begins you may have additional questions. No worries! Drop us a letter at the email address provided in your welcome message, and we’ll swoop in to sort it out ASAP.

Desktop Support Labor
$2 per minute

Support is provided through email submissions only. Support requests are worked in order received without priortization.

Engineering & Project Labor
$3.25 per minute

Engineering and project labor is for work that requires higher skilled expertise beyond help desk support. Email requests and an engineering consultation scheduling link will be provided.

Emergency support
$4 per minute

ArcLight will provide an emergency support phone number.  All emergency support calls are top priority.
IMPORTANT: All calls to the emergency support number for any reason will be billed at the emergency rate. Non emergency support must be submitted to support email provided.

One hour minimum per incident
$4 per minute after first hour

Questions & Answers about ArcLight Security Suite

We keep costs low to make enterprise security accessible to everyone. Bundling unlimited support would increase prices. Instead, the support, Engineering, and Emergency Retainer lets you pay only for the support you use, making it flexible and affordable.

Chances are that you will need support at some point. ArcLight’s security features are designed to work behind the scenes. Some add-on security agents such as our Privileged Access Management (PAM) and Web Content Filtering may block applications and websites that require our team to review and authorize. When these types of add-on solutions are utilized additional support will be required, but don’t worry! When onboarding your device you will be asked to provide us a list of all mission critical applications and websites that must be accessible and we ensure they are whitelisted.  There will still be the occasional website that will be blocked or application that will need to be authorized for installation, but better to have a second set of eyes on them than to simply approve everything as needed. Remember that a user with local admin rights to their computer also grants local admin rights to any malicious actor that gains access through a compromised website or application. Better not to be a local admin than to run the risk of compromise!

Think of ArcLight Support Down Payment as a type of retainer. Just like paying a retainer for professional legal services, the Support, Engineering, and Emergency Retainer ensures that our technicians are ready and able to assist you should the need arise. Support is not limited to just the products and services ArcLight provides. ArcLight technicians can assist with just about any desktop, laptop, server, or cloud computing issue. Whether your laptop is acting sluggish, or your desktop needs a little TLC, our technicians are ready to tackle just about any computer issue.

Below is a short list of items our team can assist with:

  • Whitelisting sites
  • Allowing app installations
  • Unblocking files
  • Virus clean-up (rare, but possible)
  • General tech fixes (like speeding up a sluggish PC)
  • Software installation and configuration
  • Basic network and USB printer issues
  • Help determining a good computer or printer to purchase that meets your needs

Standard email support is billed by the minute—no minimums. A 3-minute call? You’re billed for 3 minutes.

At ArcLight, we’re here to handle your tech needs without breaking the bank.

We’re all about fair pricing. We charge by the minute for support and engineering, with no minimums. All support and engineering is billed in per-minute increments which comes out to $2 per minute for support and $3.25 per minute for engineering and project labor. Got a quick 3-minute question? You’re only billed for those 3 minutes—nothing more! Lastly, we do offer emergency support which shouldn’t be needed very often.  If you do your part and maintain modern hardware and software emergency support should not be necessary, however we understand that emergencies do still occasionally happen.  For this reason, we offer expedited phone support for $4 per minute with a minimum one hour per incident. To prevent the need for continually adding to your retainer we advise that all companies purchase $250 worth of retainer for each computer under the ALSS Core subscription. This will prevent delays in support should an emergency arise and reduce the frequency of adding additional retainer to your agreement.

Software installation is easy, that is why we provide you with the self-installation file for ALSS Core. There is one small fee for each subscription that covers the backend setup in our systems and push deployment to your computer for the included security agents. This setup fee covers the labor to setup your subscription in our management system.

Not comfortable installing our software?  No problem!  Just purchase the appropriate subscriptions and retainer and send an email to cit@algsys.com requesting ALSS Installation help. One of our skilled technicians will schedule a time to assist you with installation. Reminder that all support including installation help is deducted from your pre-paid retainer.

Upon subscribing to ALSS Core and purchasing a retainer you receive(d) an automated email that included support contact information. The default method for submitting support is through cit@algsys.com however an emergency support phone number as well as a scheduled support meeting link was provided in your receipt/welcome aboard email.

Once you have submitted a support request, our team will assign it to a technician. Technicians work all non-emergency support requests in the order they are received. The technician will then initiate a remote session into your computer and start a chat conversation. If your computer is inaccessible to our technician, they will call your number on file within our system to assist as needed.

**In order to receive support, you must have funds in your down payment balance.

Need support? We’ve got you covered—fast! While our goal is to respond within an hour during normal working hours, we often beat that benchmark. Of course, response times might vary if we’re tackling multiple challenges at once, but rest assured, our team is always on it to get you the help you need—quicker than your coffee cools!

No worries! Our technicians keep a close eye on your retainer balance. If they notice your down payment is running low, they’ll notify you via email. If your retainer balance falls below $60 you run the risk of having a support request resolution plan paused until retainer is sufficient to complete related support tasks. We strongly advise that established ALSS Core customers maintain at least $500 or more in retainer so that interruptions in support are less likely.

If your down payment runs low, we’ll email you an invoice to top up your retainer to ensure access to skilled ArcLight technicians. The email will include a link to our eStore, so you can top up your account online in just a few clicks. Keep in mind that no work will commence until payment has fully processed.  This means that it might be a day or two before work will be performed. Keep your retainer topped up so you never get stuck waiting!

We like to keep things straightforward—no surprises, no unexpected bills!

We recommend starting with at least $250 * Total Computers in your account at all times. EXAMPLE: 5 Computers * $250 = $1,250 in retainer. This ensures uninterrupted access to our expert support team whenever you need us. Think of it as your fast pass to quick and reliable solutions!

Let’s be real—no one likes interruptions. Occasionally, you might bump into a blocked website or app. It’s like having a really cautious friend who won’t let you eat questionable sushi. Sure, it’s inconvenient in the moment, but hey, it beats food poisoning—or in this case, a nasty malware infection.

Three words: **peace of mind**. ArcLight dramatically reduces the threats to your devices, keeping you and your data safe from cyber villains. Think of it as your digital bodyguard—always watching your back, even if it means sometimes saying, “Let’s rethink that click.”

That’s cool (but we’ll miss you). There are no long-term commitments required! If you decide to part ways, just email us at cit@algsys.com, and we’ll take care of the rest. No hard feelings, no awkward breakups—just a friendly reminder that the internet can be wild, and we’ll always be here if you need us again.

**We do not offer refunds for any remaining deposit

Let’s be honest. You are here because you like to control your expenses, however controlling expenses comes at some time & labor cost to you or others in your organization to prevent unnecessary support requests. Here are some ways to keep your ArcLight support costs down and your internal labor costs down.

  • Monitor your support demand. Every ArcLight invoice includes an itemized worklog. Review it regularly to see if your team is submitting unnecessary support requests or if there is a pattern you can solve such as “my eight year old computer is slow again”
  • Replace obsolete computers regularly.
    • Laptop Computers: Typically we like to see heavily used laptops (those that leave the office daily) replaced every three years. If a laptop is functioning, has a supported operating system, and the end user is not submitting support requests feel free to go as long as you want without replacing.
    • Desktop Computers: Typically we like to see desktop computers replaced every five years, however just like laptops you do not have to replace them unless they are obsolete (no longer supported by Microsoft) or causing support demand that is eating into your pocket book.
    • Networking Equipment is one area where replacement can be tricky as there is no real standard and obsolescence is determined by the manufacturer which may give little warning and likely not something you are watching for anyway.  Below is our recommendations.
      • Network Firewall: Keep until obsolete.  Utilize a firewall such as Cisco Meraki that utilizes a subscription model for licensing.  This means that Cisco Meraki will manage updates and patches at no additional cost to you.  Also, Cisco Meraki will notify you at subscription renewal if the hardware is going to be EOL soon. Most firewall manufacturers support their firewall hardware for 8 to 10 years before EOL.
      • Network Switches: Network switches are a commodity item. In general we like to have twice the switching fabric than is required for SMBs.  This means that an organization with 18 networked devices might have two 24 port switches with those 18 devices spread across both. This gives the organization room to expand but also creates redundancy should one switch die the remaining devices could e moved to the active switch while awaiting a replacement. 
      • Wireless Access Points (WAP): Wireless technology and security is changing rapidly.  For this reason we recommend reviewing current wireless devices and configurations at least once after five years of use and then set a new date to review based on the planned obsolescence of the production devices.
      • Printers & Copiers: Lease printers from ArcLight or another reputable source. Your organization should not own or maintain printers or copiers. It is a horrible waste of time and money trying to manage printing devices. If you choose to own your printers and copiers and manage yourself be sure you buy only laser printers and copiers. Inkjets are a money pit as the ink dries out when not in use. Consider using dedicated workgroup printing devices rather than individualized devices. That short walk to a workgroup printer will save your organization big $$$$
  • Emergency Support: This is HUGE! Since ALSS bills much higher for emergency support you must limit who has access to the emergency support phone number. ArcLight does not filter out non-emergency calls to the emergency support number as doing so would dramatically increase cost to our customers for all support types.
  • Be Vigilant: Watch your bill, monitor your team, provide training to your that reduces support demand, hold your team accountable. Your IT team both in-house and outsourced is often treated as the “do all” people.  Need desks moved? Call IT! Forgot how to create a horizontal lookup in Excel? Call IT! Forgot your password for the umpteenth time? Call IT! If you have the fortitude to hold your team accountable your IT bill will be manageable. If you want IT to do it all then ALSS is not the right solution for you, however we do have a solution custom made for high demand organizations that want an internal hands-off approach. Email info@algsys.com for more information about our IT-Shield Complete Plus agreement.

The answer to that question is somewhat subjective. The purpose of ALSS Core when combined with a retainer is to do the following two things well.

  1. Protect endpoints (Windows computers) from cyber threats
  2. Provide pay-by-the-minute support on an as needed basis

So what else could I possibly need? Cyber security is a layered approach with each layer adding additional security. Eventually you can suffocate under cyber security layers that prevents your organization from being able to function. After all, the most secure computer in the world is one that is never turned on! Knowing this I’m going to answer the question you should be asking which is “What are some other recommended cyber security services that I should employ to reduce my cyber risk? Great question and glad you asked! When it comes to endpoint security we advise the addition of Privileged Access Management (PAM) which is an agent based software that blocks installation without approval. This software alone prevents shadow attacks where a malicious actor attempts to install backdoor access or other items into your systems without your knowledge. With PAM enabled no end user is a local admin.  This means that all installation requests must be approved. Typically one or more members of an organization are tasked with monitoring the alerts from a mobile app on their tablet or cell phone.  They then review all installation requests and choose to approve or decline.

The next very important area to protect is your Microsoft 365 environment which includes your email, Microsoft Teams, and more. We bundled protections into our Microsoft 365 Security subscription.

Lastly we strongly advise that you put your employees through annual cyber security training as well as monitor their adherence to training through simulated phishing emails.

If you would like to add these or one of our many other additional security reach out to us at info@algsys.com and we can explain the full features of each solution.

Great question! ArcLight Security Suite is all about keeping costs down for our clients and reducing financial risk for us as the provider. These two things go hand in hand. For this reason all purchases must first clear payment processing before security agents or support is available. Depending on payment method card processing can take anywhere from one to five days, but most transactions will clear withing one to two days. Our agents are purchased from the top names in cyber security and are billed to ArcLight immediately after installed.  For this reason we cannot install the agents until payment has processed to ensure we don’t have unnecessary expense should the payment fail or be postponed. We also don’t want you to go to the trouble of installing all of our agents only to have us remove them again should payment processing fail.

Not to worry, however.  Once you have paid you will be given access to the agent installer.  The agent installer can be installed immediately and once payment clears the additional security agents will be pushed onto your computer the next time it is turned on.  Our team will monitor to ensure the agents are properly installed and configured. Some add-on agents, services, etc. may require intervention for installation.  If you purchased an add-on product that requires tech intervention we will reach out to you via the email provided at subscription time to get the work done ASAP.

It is highly unlikely that the enterprise grade software we provide and you install on your systems will cause serious damage. There is always a chance that the software might have a bug or glitch of some kind that requires remediation. In these cases just like all other cases support is not included. This means that support even for issues with the software we deploy is not covered or included in your agreement. Again, the ALSS service is all about providing excellent security, backed by skilled engineers, and at the lowest price point possible. We can only accomplish this goal when all support is billable.

There is zero support included in the subscription. Even if an application fails or has errors that is part of your subscription. Example: If you buy a consumer grade off the shelf anti-virus software from Walmart. Yes, you can likely call and receive some level of support from an offshore call center. The quality and level of the support will be very poor and often dangerous to your system. This is because the margins on software are so small that software vendors are unable to provide high level engineering support on-demand. Rather than have free and incredibly low quality/skilled support we provide US based, local, pay-by-the-minute support from highly skilled engineers who can actually help you solve complex problems and answer real world questions that are valuable and understandable!

This is often true for clients who “think” they want to save money by managing many aspects of their support such as limiting support requests to an owner or manager, not installing some security agents, rationing emergency support, and more.  These are all things that most small businesses are willing to do to save on cost. If this type of service sounds painful to you we completely understand, and you are in luck! We have an all inclusive support agreement called IT-Shield Complete Plus that is exactly what you are looking for! Yes, it will be more expense due to its all inclusive nature, but it gives you and your entire team untethered support for normal issues and emergencies during normal working hours as well as onsite support for clients living within Tulsa County and surrounding communities. Reach out to us at your earliest convenience to learn more!

Ready to Choose Your Solution?

Have questions? No problem! Give us a call at (918) 270-6600
or schedule a meeting with our Account Manager by clicking here.