Information Technology Solutions For Business

Cor-Care®, powered by Cornerstone IT are network support solutions designed to fit your firm’s own technology needs, including computer network and server support. Cor-Care is available in Complete and Secure Complete package solutions.

Easily transition your workforce from the office to home with virtual IT support from our experienced professionals. Ensure your team can work securely from anywhere with remote desktop and cloud applications.

What are managed IT services?

Many businesses are feeling the economic effects of a shrinking IT budget. The question to ask is, “Does a Managed Services approach make sense for my company?” We at Cornerstone IT believe the answer is yes. But first, what are Managed Services? Managed Services offer fixed budget options for managing your IT related expenses. Rather than incurring ad-hoc, capital expenses when your computers, servers or networks go awry, managed services allows you to have a fixed line-item operating expense. In turn, this allows you to accurately budget your IT expenditures.

Second, when you pay time and material, the expenses are usually higher in the end analysis. More time is spent trying to isolate the issues rather than proactively resolving them. Managed services, which usually includes some form of network monitoring, allows the IT service provider to address issues before they become major break-fix items for your business. These issues will create down time for your network, lost productivity for your employees, and customers not being serviced effectively. In this economy, customer service is crucial and effective IT solutions are what drive the business forward.

Download Cor-Care Product Sheet >

Companies are looking to extend the life and usefulness of the equipment they already have. Managed Services seeks to maximize the value of the investment already made. The goal is to spend your money on improvements where they will have the greatest effect.

Cor-Care® Includes the Following Services:

Cor-Care Complete Cor-Care Secure Complete

Plan

All Inclusive Pricing, Unlimited Support Yes, Per User Yes, Per User/Device
Intrusion Detection and Security Monitoring (SIEM) Not Included Included
Business Critical Response Time 15 Minutes or Less 15 Minutes or Less
Business Hours, Monday through Friday 7:30 AM to 5:30 PM EST 7:30 AM to 5:30 PM EST
On-Site Visits Included Included
Travel Time & Mileage Included Included
After Business Hours Support

  • Business Critical Issue
  • Non-Business Critical Issue – 1 Hour Minimum, Billable
  • Included
  • Not Included
  • Included
  • Not Included
Installation of the Following

  • Computers and Network Devices Purchased Through CornerstoneIT
  • Computers and Network Devices Not Purchased Through CornerstoneIT
  • Included
  • Not Included, Billable
  • Included
  • Not Included, Billable
Business Review Meetings Included Included

Support

Help Desk Services – Includes Ticketing and Tracking of all Issues Included Included
Microsoft Product Support Included Included
Line of Business Support. Requires Active Support Agreement with Vendor Best Effort, then Billable Best Effort, then Billable
Server, Desktop, Laptop and Thin Client Support Included Included
Network Equipment and Firewall Support Included Included
End User Support Portal Included Included

Monitoring & Maintenance

Managed Network Services Included Included
24/7 Monitoring of Network Devices

  • Remediation of Events Requiring Attention
Included Included
Software Updates for Microsoft & Supported Vendors

  • Weekly Update Interval – Reboots May Be Required
Included Included
Monthly Reports of Network Health & Ticket History Included Included
Business Review Meetings Included Included

Managed Security

AntiVirus License for Each Covered User Included Included
Identify Threats in Real-time Not Included Included
Response to Identified Emerging Threats Not Included Included
Generate Accurate Compliance Reports for PCI DSS, HIPAA and more Not Included Included
Insider Misusing Network Resources Not Included Included
Data Exfiltration Detection – Prevents Leakage of Sensitive/Proprietary Data Not Included Included
Remediation of Detected Events Not Included Included