Our Service Offerings

At our core, we're a computer support firm, but that's just the beginning

Qore Service Plans

Services

Here's everything we offer

PC automation (RMM)

Endpoint Privilege Management

Managed Windows Updates

Managed third-party software updates

Enforced Windows Defender endpoint security/anti-virus

Managed Endpoint Detection and Response (EDR)

24/7 Human-powered Threat Hunting

Ransomware Protection/Canaries

Web filtering

Secure remote PC access

Microsoft 365 backup

Phishing and spam filtering

PC warranty monitoring and reporting

Printix

Automated software deployment

Automated PC provisioning

Free onboarding

Qore Business Reviews

Network documentation

Network infrastructure monitoring

Monthly per-user fee as low as

Secure

Here's what's included in our Secure plan

<>


<>


<>


<>


<>



<>



<>


<>


<>


<>


<>


<>


<>


<>


<>


<










$50


$

Support

Our Secure plan includes everything in our Secure plan plus remote-only technical support services

As we learn of new best practices, we add them to our best practices alignment checklist and implement them upon your approval. This way, you’ll benefit tomorrow from what we learn today.

Manage

Our Manage plan includes everything in our Support plan plus on-site technical support services

As we learn of new best practices, we add them to our best practices alignment checklist and implement them upon your approval. This way, you’ll benefit tomorrow from what we learn today.

Security is our highest priority

Obscurity is not security; cloud providers’ security resources outweigh their target-richness.

A rising tide lifts all boats

Our in-house-developed Best Practices Alignment system ensures that all clients are challenged to meet our evolving security and infrastructure guidance.

Checklists are not insulting

Better than just documenting process, we build and adhere to checklists for every routine, client-facing process, which ensures accountability.

Document everything

What do we document? Everything. When do we do it? Immediately. We make no changes without documenting it.

Internal Security Posture

IT providers are target-rich since we all use remote monitoring and management (RMM) software to manage our clients' networks. If an IT provider’s RMM platform is breached, it's lights out; the adversary has access to all of the MSP's clients' networks.
It's easy to find published reports of IT providers and their clients being breached. We don't want that kind of publicity, so we've adopted a strong security posture.

MFA all the things

All services in our stack must support app-based (TOTP) MFA or SSO with Azure AD. No MFA?
Do not pass Go.

Three-factor authentication

SSO makes Azure AD a rich target for threat actors. And while there are no reported breaches of app-based MFA, we protect with Azure MFA with Duo for a third authentication factor.

Principle of least privilege

Our daily driver accounts never have admin-level rights, which reduces our attack surface.

Leadership

We take a leadership role within your organization. Less mature service providers are content to wait for you to ring their help desk. Not so with Qore; we'll be contacting you more often than you'll be contacting us as we guide you through our evolving best practices alignment process.

Security-first
since 2003

Security extends beyond computing. Practicing good operational security hygiene means protecting our and our clients’ anonymity. To that end, you won’t find our employee’s names, client list, or attributable testimonials here.

Ready to right
your ship?

Get Started