Templeton strives to provide the best service possible at competitive and affordable rates.
To that extent, we offer two simple pricing options so you can decide how to best plan for your IT needs.
We offer a Pay as you Go option with our Basic Support Plan, or a Flat Rate option with our Complete Support Plan.
BASIC SUPPORT
$65 per computer / month
Remote and Phone Support - $190 per hour
Onsite Support - $190 per hour
Services Included in our Basic Support Plan:
• 24/7 Computer Monitoring
• Virus/Malware/Spyware Protection
• Software Updates and Patches
• Encryption Management
• Security Updates and Monitoring
COMPLETE SUPPORT
$195 per computer / month
Remote and Phone Support - Included
Onsite Support - included
Minimum of 10 Computers
Services Included in our Complete Support Plan:
• 24/7 Computer Monitoring
• Virus/Malware/Spyware Protection
• Software Updates and Patches
• Encryption Management
• Security Updates and Monitoring
PLUS
• Unlimited Remote Support
• Unlimited Phone and Email Support
• Onsite Support as needed
• Unlimited Cloud Backup
• Dark Web Monitoring and Alerting
• iOS Device Management
• Full Cyber Security Assessment
• Phishing Simulations
• Vendor Management
• Unlimited Advisement and Consultation
• Dedicated Slack Support Channel
• User Account and Password Management
* Above rates exclude any project-based work.
Projects are billed at either a set project rate or an hourly rate of $180 per hour.
Our services explained
24/7 Computer Monitoring
Our Mac monitoring software allows us to ensure that your computers are running in optimal condition. The systems monitor hardware health, memory, crashes, security vulnerabilities and over 300+ other factors so if something does go wrong, we will know about it immediately and can begin correcting it. Our monitoring systems DO NOT watch what you do or invade privacy in any way.
Unlimited Secure Cloud Backup
Our cloud backup software allows us to securely and safely backup the data on your computer should you ever need to restore anything. Backups run silently in the background and provide you with the peace of mind that your data is protected and ready to be restored in case of emergency.
Virus Protection
Viruses, Malware and Spyware are an unfortunate reality in today’s business environment. Macs are now vulnerable to these and Mac users need to be aware of the dangers. Our 24/7 Monitoring will notify us immediately if any Virus, Malware or Spyware is detected on your computer and quarantine the threat immediately.
Software Updates and Patches
Software Updates and Patch Management are an important part of any IT strategy. Making sure that your apps are running the appropriate latest version can help confirm they are stable and compatible. Running old systems can leave your computer vulnerable to crashing with mismatched apps.
DARK WEB MONITORING AND ALERTING
The single biggest factor in identity theft is your data being available on the Dark Web for any hacker who wants to take advantage of it. Our monitoring software allows us to track your domain and email addresses in real-time to alert us if there are any instances of your data found on the Dark Web.
ENCRYPTION MANAGEMENT
Data Encryption is becoming more and more important in this era of cloud computing. It is also quickly becoming a requirement for insurance companies. Assuming your organization chooses to encrypt your data, our Monitoring Software will perform regular checks to confirm that encryption is active and properly configured.
UNLIMITED PHONE AND EMAIL SUPPORT
A lot of issues can be resolved with a quick phone call. Our support team is always available to talk you through an issue or exchange emails to help get problems resolved quickly.
UNLIMITED REMOTE SUPPORT
Our Monitoring Software also allows us to remotely access your computer with your permission so we can “see” your machine remotely and help you even quicker. Sometimes being able to see the problem with our own eyes is the best way to help fix it.
Unlimited Advisement and Consultation
While Support is a big part of what we do, what might be even more important is our Consulting and Advisement Services. Templeton can help you plan your short and long term strategies for hardware, software, networking, security as well as discuss any IT concerns you may have.
SECURITY UPDATES AND MONITORING
Apple is constantly pushing updates to meet security standards and help keep your Macs as protected as possible. Failing to keep up with these updates can leave you open to cyber attacks or Virus/Malware/Spyware infiltration. Our Monitoring Software will help ensure that your systems are up to date and running the latest security updates and patches to confirm optimal protection.
vendor management
Your technology universe most certainly includes conversations with the printer folks, your internet service provider, the phone service company and more. Templeton provides complete Vendor Management services where we can manage these relationships so you can focus on your job.
slack support channel
If your organization uses Slack, Templeton can assign you or join into your Slack channel to provide direct access to our techs for support and service. Slack allows for instant response and communication as well as sharing files.
ios consulting
If your organization uses Slack, Templeton can assign you or join into your Slack channel to provide direct access to our techs for support and service.
social media strategy
Our technology experts have a solid foundation in the tools that let you extend your brand online. Let our consultants help you design the most cost-effective strategy for your online presence.
database development
The Templeton Group has skilled programmers specializing in FileMaker Pro database development. We can develop and implement custom databases that fit your organization’s needs, as well as modify and enhance existing databases already in use.
web development
Templeton has the capability to build full, customized websites from the ground up. We work with you throughout the development process to ensure your Internet presence is precisely what you envisioned it to be.
cloud strategy
Templeton can help guide you through the sometimes confusing world of Cloud services. Let us show you how to take advantage of services like Dropbox, Google Apps, Evernote, Amazon Web Services, iCloud and many others. It's no secret that many businesses are moving to the Cloud. Let us help you assess your needs and see which Cloud services are right for you.
remote access
Whether you're working from home, another office, or you just want to catch up on some work while on vacation, Templeton can create a remote access strategy that will let you work as if your at your own desk. Our Remote Access strategies are simple and secure and will let you access everything you need, anywhere you are.
web and email hosting
Through our network of partners, Templeton is proud to offer Web and Email hosting solutions that range from Small Business plans up to Enterprise Class solutions. Our hosting service is backed by one of the largest providers on the planet and we work closely with them to ensure that our clients receive the best hosting service available.
data recovery
DriveSavers provides Templeton clients with cutting edge recovery procedures that include the largest recovery cleanroom in the world. They are able to recover data from any drive-based device including RAIDs, iOS devices, NAS servers and more.
user Account and password management
Templeton can help manage your user accounts, assets, services and licensing. With so many cloud services and SaaS apps, management can become a logistical nightmare. Let Templeton handle the organizing of your IT details and credentials so you know your information is safe.
cyber security assessment
We will help guide you through the appropriate security technology for your organization including next-generation firewalls, DNS filtering, malware protection, antivirus software, and email security solutions.
cyber security training
Users can be educated and trained to understand basic data security principles like choosing strong passwords, being wary of attachments in email, and backing up data.
phishing simulation
Phishing simulation guards your business against social-engineering threats by training your employees to identify and report them. Cybercriminals use phishing by disguising as a trustworthy organization or reputable person in an email communication in order to try and steal data or credentials.