Innovative, Reliable IT Services

CBM Technology Gold Service Package

CBM Technology, is a comprehensive Managed IT service provider, specializing in enterprise consultations, integrated solutions, cloud services, web solutions, software development, and proactive services.

Top 5%

Ranked Top 5% of MSPs in the world

Managed IT

Managed IT Services

  • 24 x 7 x 365 Monitoring
  • Proactive Ticketing

  • Microsoft Patching and Feature Updates

  • 3rd Party Patching (Catalog over 50 vendors)

  • Monthly Health Reports

  • Lifecycle Management

  • Procurement Management
  • Priority Care Back by Service Level Agreement

  • Unlimited 8×5 Remote Support

  • O365 User and Product Management and Optimization

  • Office 365 Multi-Factor Authentication
  • Dedicated Account Manager
  • Periodic Business and Budget Review Meeting (vCIO)

  • Industry leading Endpoint Detection and Response (EDR)

  • Vendor Management
  • Client DNS Filtering

Managed Care Firewall

Managed Services

  • Device Firmware Updates
  • Policy Management & Configuration
  • Device Warranty
  • Device EOL Replacement
IT Support: Reliable Assistance for Your Technology Needs

Cybersecurity Care+

  • 24/7/365 Monitoring
  • Behavioral data, System Data & Security Logs
  • Network Traffic Analysis – Inbound/Outbound Traffic
  • Real Time Process Monitoring – Disk/Fileless/PowerShell, etc.
  • Vulnerability Management, CVES
  • Real-Time Vulnerability Scanning
  • Identification of all files on disks
  • Threat Intelligence
  • SIEM Log Correlation with Firewall, Windows Events & Endpoint Protection
  • Complete networking scanning for vulnerabilities across multiple VLANs
  • Compares vulnerabilities to CVE ratings for remediation prioritizations
  • Maps vulnerabilities to security frameworks such as NIST and CIS
  • Active Directory Scanning of Users, Groups, and Group Policy
  • 24/7/365 – Alerting
  • Admin Privileges Granted/Removed
  • Malicious IP Detection
  • Brute Force Attack
  • Common Vulnerabilities & Exposures Detection
  • Suspicious Log Activity
  • User Accounts Created/Disabled
  • Local Firewall/Registry Values Modified
  • Root Cause Analysis
  • Tests the network as an intruder from the Internet would
  • Scans for vulnerabilities from outside of the network
  • Identifies any potential attack surfaces from the Internet
  • Discovers any exploitable security holes

Designed to Reduce RTO Cost Effectively

Backup Disaster & Recovery

  • 24/7 Fully Monitored and Managed
  • Local and Cloud Backup
  • Encrypted Data Transport
  • Includes 1TB of Cloud Storage per Server
  • 3 Copies of Backups
  • Monthly Reporting

Managed Switch & Wireless

Switch Management

  • Per Port Granular Configuration
  • Network/VLAN Configuration
  • PoE Settings Per Port
  • Port Isolation
  • 802.1X RADIUS Authentication and Dynamic VLAN
  • SNMP, Advanced Logging
  • Switch Statistics – LAN, WLAN and Internet Traffic

Wifi Management

  • Zero Handoff Roaming
  • Multi-Site Management
  • Detailed Analytics for Reporting and Troubleshooting
  • Client Device Isolation
  • Protected Management Frame – Prevent Intercepting or Forging Traffic
  • Device Filtering
  • RADIUS Authentication

Managed Services

  • Device Firmware Updates
  • Policy Management & Configuration
  • Device Warranty
  • Device EOL Replacement
Providing Relief for a CPA & Business Financial Consulting Firm: A CBM Case Study

Security Awareness Training

Proactively monitor the dark web for compromised account data. The sooner end-users are notified of a breach, the sooner they can change their passwords. End-users also can scan the dark web for their personal, friends, and family accounts with no limit.

Routine simulated phishing has been proven to minimize the risk of end-users falling victim to a malicious phishing attempt. Routine phishing instills into our users the very behaviors of IT professionals before they click on any link so that even on the most chaotic of days, they’re ready.

Weekly 2-minute micro-training video & short quiz combined with a monthly security newsletter keep cybersecurity short, engaging, and interactive. White-labeled emails sent on your behalf to all your users means hands-off management.

For end-users, an interactive leaderboard ignites friendly competition with just their screen name’s honor at stake. For managers, employee names are featured, with a report for performance evaluations, they can track just who needs more time bulking up

Office 365 Backup

Backup & Retention

  • Incremental, Unlimited Backup
  • Complete Office 365 Backup – Exchange, SharePoint, OneDrive, Teams
  • Restore directly to Office 365, Download/Export Data
  • Advanced Search supporting regular expressions

Backup Frequency

  • Email: 12x/day
  • OneDrive: 1x/day
  • SharePoint: 3x/day
  • Teams: 3x/day

Compliance Storage

  • Data centers are SOC2, FISMA, ISO 27001,
  • 256-bit (AES) encryption at rest and in transit
Microsoft Office 365 Logo

IT Helpdesk & Management

IT Helpdesk and Management: Providing Comprehensive Support and Oversight

Additional Services Highlights

  • vCIO
  • IT Help Desk Services
  • IT Compliance Management
  • Servers & Storage
  • Workstations, Laptops & Tablets
  • Microsoft Office 365
  • Systems & Database Integration
  • Business Intelligence Reporting
  • Cloud Consulting and Implementation
  • Printing & Document Imaging
  • VoIP Solutions
  • Network Implementation & Support
  • Virtualization & Support
  • Strategic Planning & Consulting
  • Inventory and Control of Enterprise Assets
  • Inventory and Control of Software Assets
  • Data Protection
  • Secure Configuration of Enterprise Assets and Software
  • Account Management
  • Access Control Management
  • Continuous Vulnerability Management
  • Audit Log Management
  • Email and Web Browser Protections
  • Malware Defenses
  • Data Recovery
  • Network Infrastructure Management
  • Network Monitoring and Defense
  • Security Awareness and Skills Training
  • Service Provider Management
  • Application Software Security
  • Incident Response Management
  • Penetration Testing