| M365 License Plus Plan | Plan 1 | Plan 2 | Plan 3 | |
|---|---|---|---|---|
| Monthly Price |
Microsoft 365 Guardian user/month |
Microsoft 365 Guardian user/month |
Microsoft 365 Guardian user/month |
Microsoft 365 Guardian user/month |
| Microsoft 365 Licensing (Be productive and secure anywhere) | ||||
| M365 Business Premium including desktop applications like Teams, Outlook, Word, Excel, PowerPoint, and more. Get the latest features and capabilities with fully installed and always up-to-date versions of Teams, Outlook, Word, Excel, PowerPoint for Windows or Mac, OneNote (features vary), and Access and Publisher (PC only). |
||||
| Additional Licensing for Risky User Activity, Attack Simulation and Cybersecurity Training Identity Protection (Risky sign-ins, risky users, risk-based conditional access). Provide email attack simulation and cybersecurity training. |
||||
| M365 E5 for power users needing phone system and Power BI. Advanced Licensing that includes phone system and Power BI. |
||||
| M365 Guardian Security Configuration and Management | ||||
| Configure Microsoft Tenant for Compliance in Your Specific Regulated Industry We begin by setting up a Microsoft 365 tenant and ensuring services and policies are configured for secure remote work. Pre-configured settings address state and federal compliance requirements in your industry. For finance and mortgage, NYDFS, CFPB, and California Consumer Privacy Act (CCPA) mandates. For healthcare, HIPAA compliance, streamlining adherence to complex regulations. |
||||
| Identity Protection Accounts with MFA enabled are up to 99.9% less likely to be compromised. This is because passwords are easily compromised by phishing, social engineering, poor user habits, and persistent attacks. MFA immediately increases account security by requiring multiple forms of verification when signing into an application. Configure and enforce Multi-Factor Authentication (MFA), Conditional Access Policies, and Identity Protection rules to guard against unauthorized access and ensure the integrity of sensitive borrower data. |
||||
| Data Loss Prevention (DLP) Configuring information governance: Financial and mortgage companies have sensitive information under their control such as financial data, proprietary data, credit card numbers, and social security numbers. Healthcare has HIPAA requirements to help protect this sensitive data and reduce risk. They need a way to prevent their users from inappropriately sharing it with people who shouldn't have it. This practice is called data loss prevention (DLP) |
||||
| Device Security Configurations Configure and manage computers and mobile devices, enabling companies to protect and secure their resources and data. Configure security features and settings on Windows 11 and Windows 10 PCs, like the ability to remotely wipe company data from lost or stolen devices. Lock down endpoint devices with security policies for Windows, iOS, and Android, including BitLocker encryption, antivirus settings, and automated updates. |
||||
| Application Security Configure secure access and usage policies for essential applications safeguarding against data breaches and unauthorized use. |
||||
| Secure Collaboration Ensure secure sharing of files and communications with Microsoft Teams, SharePoint, and OneDrive, all configured to prevent external data leaks. |
||||
| Email protection against ransomware and phishing attacks Defend against phishing and malware attacks with pre-configured Microsoft Defender for Office 365 settings, safeguarding your organization’s most vulnerable communication channels. Ransomware restricts access to data by encrypting files or locking computer screens. It then attempts to extort money from victims by asking for "ransom," usually in the form of cryptocurrencies like Bitcoin, in exchange for access to data. We block file extensions commonly used for ransomware and configure targeted anti-phishing protection. Anti-phishing protection helps protect your organization from malicious impersonation-based phishing attacks. |
||||
| M365 Guardian Management Deployment of new guardian policies and settings in response to Microsoft Secure Score updates and newly discovered vulnerabilities. |
||||
| Microsoft Compliance Manager Gain insight into your compliance posture with actionable recommendations to meet industry-specific requirements. Purview licenses, available as an add-on, provide enhanced compliance monitoring and reporting. |
||||
| Customizable Solutions Tailor security and compliance configurations to meet your business’s specific needs. From state-specific compliance setups to advanced security measures, we help you stay ahead of threats. |
||||
| Guardian Security Monitoring and Response | ||||
| Microsoft Incident User and Device Monitoring Keep your environment secure with round-the-clock monitoring for suspicious activity, unauthorized access, and policy violations. Real-time alerts help identify issues before they escalate, giving you peace of mind. Ensure all devices accessing your network are secure and compliant. Real-time monitoring detects unauthorized or unmanaged devices and provides actionable insights to protect your environment. |
||||
| Microsoft Secure Score Monitoring, Management and Insights Overview Reports Microsoft 365 Secure Score is a crucial tool that measures an organization's security posture by identifying potential vulnerabilities and providing actionable recommendations to strengthen defenses. Maintaining a high Secure Score is essential to proactively mitigate risks, protect sensitive data, and ensure compliance with security best practices. |
||||
| Guardian Security Insights Reports Receive 12 detailed security reports, covering areas like MFA compliance, device health, stale accounts, and Conditional Access Policies. These reports give you a full snapshot of your organization’s current security posture. |
||||
| Guardian Advanced Security Insights Reports Receive additional security reports. |
||||
| Microsoft Incident Response (MxDR) Business Hours Our Cybersecurity team will leverage Microsoft 365 Defender and work through security incidents with you or on your behalf, following Microsoft best practices during regular business hours. |
||||
| Microsoft Incident Response (MxDR) After Hours Our Cybersecurity team will leverage Microsoft 365 Defender and work through security incidents with you or on your behalf, following Microsoft best practices, taking action 24x7. |
||||
| Security/Compliance/Productivity Add-Ons | ||||
| ABT Portal ABT's Web Portal for viewing security and productivity reports, manage users and licensing. |
||||
| App Pilot App Pilot toolbar is a better way to manage the applications, weblinks, and key documents. Get your "in office" and "remote" teams on the same page with custom workspaces by job role that include the applications, weblinks, and documents used by each team. |
||||
| DocumentGuardian ABT's secure document delivery system |
||||
| Guardian Cloud Backup for Microsoft 365 You use OneDrive for Business and SharePoint to store and share documents. We ensure those documents are protected and encrypted by backing them up to an alternate cloud location, helping you mitigate against and quickly recover from ransomware and other cybersecurity attacks. |
||||
| Guardian Productivity Insights Unlock powerful insights into your remote and in-office teams. Track productive hours, top applications, and final output for each team member. Leverage enhanced metrics to motivate, optimize workloads, and drive consistent productivity across your organization. |
||||
| SMART Email Signatures Compliant Email Signatures for the Mortgage Industry. Centrally manage your email signatures with industry standards and compliance in mind. |
||||
| Expert Technical Support | ||||
| Microsoft 365 Admin Support M365 Administrator activities including user maintenance, security policies, device management. |
||||
| Microsoft 365 Application Support End-User support for Microsoft 365 Applications |
||||
| After Hours Emergency Technical Support * | ||||
| Device Support End-User computers, and mobile devices |
||||
| Support Method | ||||



