Upfront Pricing for
Any Size Business
Our Hybrid Helpdesk is included at $50 per organization, mix and match any two plans to cover your staff.
Minnow
$23
Per user / month
-
IT Helpdesk AccessWeb-based support
-
Malware Threat ProtectionNext-Gen Managed Antivirus
-
Remote Network SupportManaged LAN and Wireless
-
Remote Desktop SupportBilled on usage
-
Custom Knowledge Base
-
Online Course Library
-
Marketplace App Deployments
Dolphin
Popular
$113
Per user / month
-
Enhanced Cyber-SecurityAi Powered Threat Prevention
-
Phone in Support Tickets
-
On-Premise EngineersLimited*
-
Desktop Support IncludedLimited*
-
Advanced Email SecurityEmail Fraud Prevention
-
Password ManagerEnterprise Password Management
-
Automated BackupsBackup & Recover 365 or Workspace
Whale
$229
Per user / month
-
Custom Branded PortalOur Full Platform on your Domain
-
Omnichannel Help DeskChat, Voice & SMS Help Access
-
Dedicated Phone Numbera direct line to expedited help
-
Unlimited SupportOn-Premise Support Included
-
24/7 Premium Support
-
Active Network MonitoringAutomatic Ticket Creation
-
Disaster RecoveryFull Disk Image Backup & Restore
-
Compliance MonitoringEnforce and Monitor HIPAA, PCI, & others
-
Security Awareness TrainingActive Security Programs & Assessments
Minnow
Annual
$21
Per user / month
$192 Billed Annually
-
IT Helpdesk AccessWeb-based support
-
Malware Threat ProtectionNext-Gen Managed Antivirus
-
Remote Network SupportManaged LAN and Wireless
-
Remote Desktop SupportBilled on usage
-
Custom Knowledge Base
-
Online Course Library
-
Marketplace App Deployments
Dolphin
Annual
$107
Per user / month
$1,284 Billed Annually
-
Enhanced Cyber-SecurityAi Powered Threat Prevention
-
Phone in Support Tickets
-
On-Premise EngineersLimited*
-
Desktop Support IncludedLimited*
-
Advanced Email SecurityEmail Fraud Prevention
-
Password ManagerEnterprise Password Management
-
Automated BackupsBackup & Recover 365 or Workspace
Whale
Annual
$209
Per user / month
$2,508 Billed Annually
-
Custom Branded PortalOur Full Platform on your Domain
-
Omnichannel Help DeskChat, Voice & SMS Help Access
-
Dedicated Phone Numbera direct line to expedited help
-
Unlimited SupportOn-Premise Support Included
-
24/7 Premium Support
-
Active Network MonitoringAutomatic Ticket Creation
-
Disaster RecoveryFull Disk Image Backup & Restore
-
Compliance MonitoringEnforce and Monitor HIPAA, PCI, & others
-
Security Awareness TrainingActive Security Programs & Assessments
Don’t know what to choose?
Contact us to get help with your plan.
Contact us to get help with your plan.
Compare Plans
Choose the level of support and security that fits your business.
General & Platform Access
| Features | Minnow | Dolphin | Whale | ||||||
|---|---|---|---|---|---|---|---|---|---|
Minimum Seats/UsersThe minimum number of users required for your organization to qualify for this plan tier. This helps us match the right level of support infrastructure to your team size and ensures you're getting appropriate value for your investment.
|
1
|
3
|
3
| ||||||
Custom Helpdesk PortalYour dedicated support hub accessible from web browsers, Windows desktops, and Microsoft Teams—giving your team a single place to submit tickets, track IT issues, and access resources without hunting through emails. The portal includes a service catalog for common requests (new users, hardware, access changes), real-time status updates, and dashboards that give leadership clear visibility into your IT environment, open tickets, security status, and infrastructure health. Built-in training courses, a searchable knowledge base, and self-service guides help your team solve simple issues themselves, reducing downtime and support volume. Granular permissions ensure different roles see relevant information, while secure Azure hosting and integration with your existing systems (like Microsoft 365 and Google Workspace) keep everything synchronized and tailored to your organization's specific workflows.
|
|
|
| ||||||
Fully Branded PortalYour helpdesk portal hosted on your own domain (e.g., support.yourcompany.com) with your company's logo, colors, and branding throughout. This creates a seamless experience for your team and reinforces your brand identity even in IT support interactions.
|
|
|
|
Support & Operations
| Features | Minnow | Dolphin | Whale | ||||||
|---|---|---|---|---|---|---|---|---|---|
Support ModelDefines how we deliver support to your team. Remote support means we handle issues via remote access tools and communication. Remote & Onsite adds scheduled or emergency on-location visits when physical presence is needed. This determines whether we can come to your office when remote troubleshooting isn't sufficient.
|
Remote
|
Remote & Onsite
|
Remote & Onsite
| ||||||
Support ChannelsThe communication methods your team can use to reach our support team. Options include phone calls, email tickets, SMS text messaging, live chat, and portal submissions. More channels mean more flexibility in how your team requests help—whether they prefer a quick chat message or a detailed email.
|
Portal, Email
|
Phone, Email, Portal
|
SMS, Chat, Phone, Email, Portal
| ||||||
Remote Desktop SupportOur ability to securely connect to your team's computers to diagnose and fix issues directly. We use encrypted remote access tools to see exactly what you're seeing, troubleshoot problems in real-time, and resolve issues without requiring you to describe technical details over the phone. This is included in all plans because it's essential for efficient problem resolution.
|
|
|
| ||||||
On-Premise SupportPhysical visits to your office are provided under these terms as onsite services delivered at your business location, typically for issues that cannot be resolved remotely, such as hardware installation, network infrastructure work, or other hands-on troubleshooting, and are subject to the applicable Rates, call-out fees, and out-of-pocket expenses set out in the Rate Schedule and any Plan or Quote.
“Limited” onsite support means Baytech Logic may, at its discretion, schedule onsite visits for specific situations on a case-by-case basis, and such visits may incur call‑out fees and travel or related expenses in addition to standard service Rates, in line with the pricing and inclusion provisions in the Terms and Conditions.
“Included” onsite support means that, where expressly stated in your agreement, a reasonable number of onsite visits is bundled into your service arrangement without separate trip charges, subject to the applicable Plan Schedule, Rate Schedule, and any frequency or scope limits defined for that Plan.
All onsite activity remains governed by Baytech Logic’s general Conditions (including access, delivery, liability, and force majeure clauses), and any services outside the agreed scope, hours, or geography may be billed at the then‑current Rates.
|
|
Limited
|
Included
| ||||||
Automatic Ticket CreationSystem-generated support tickets when monitoring tools detect issues—like a server going offline or a backup failing. Instead of waiting for someone to notice and report a problem, we're automatically alerted and can begin working on it immediately. This reduces downtime by catching issues before they impact your team's work.
|
|
|
| ||||||
Premium IntegrationsConnections between your helpdesk portal and critical business systems like Microsoft 365, accounting software, CRM platforms, or industry-specific applications. These integrations allow for automated workflows, centralized data access, and streamlined processes. For example, automatically creating a ticket when a new employee is added to your HR system, or syncing device information from your asset management tools.
|
|
|
| ||||||
Support Hours IncludedThe amount of ongoing support time built into your monthly plan. This covers routine requests, troubleshooting, consultations, and project work. Rather than billing hourly for every small task, you have a predictable monthly allowance that handles the typical IT support needs for a business your size. Additional hours beyond the included amount are available when needed for larger projects.
|
|
|
|
Security & Cyber Defense
| Features | Minnow | Dolphin | Whale | ||||||
|---|---|---|---|---|---|---|---|---|---|
Antivirus & CybersecurityThe suite of baseline protection installed on all your devices. Next-Gen AV uses signature-based detection to catch known threats. Enhanced Cyber-Security adds behavior monitoring and heuristic detection to identify suspicious activity even from new, unknown threats. Full Security Suite provides comprehensive protection including advanced threat intelligence, exploit prevention, and integrated endpoint security layers that work together to defend against sophisticated attacks.
|
Next-Gen AV
|
Enhanced Cyber-Security
|
Full Security Suite
| ||||||
Active Network MonitoringContinuous surveillance of your network traffic, devices, and systems for unusual patterns or security threats. We monitor for signs of intrusion attempts, malware communication, unauthorized access, and compromised devices in real-time. When suspicious activity is detected, we investigate immediately rather than discovering issues during your next security review.
|
|
|
| ||||||
Email SecurityProtection for your email system against phishing, malware, spam, and business email compromise attacks. Advanced Email Security includes attachment sandboxing, link scanning, and impersonation detection. Advanced Email + Fraud Prevention adds AI-powered analysis that learns your organization's communication patterns to detect anomalies—like an executive's email account behaving unusually or vendors suddenly changing payment instructions.
|
|
Advanced Email Security
|
Advanced Email + Fraud Prevention
| ||||||
Password ManagementEnterprise password management tools that allow your team to create, store, and share strong, unique passwords securely. Standard provides encrypted password vaults for individual users and basic team sharing. Enterprise adds advanced controls like policy enforcement (requiring minimum password complexity), detailed access logs, emergency access procedures, and integrations with your authentication systems.
Compliance Monitoring
|
|
Standard
|
Enterprise
| ||||||
Compliance MonitoringAutomated tracking and reporting to help maintain compliance with regulatory requirements relevant to your industry. This includes monitoring for HIPAA security controls (healthcare), PCI DSS requirements (payment processing), or general cybersecurity frameworks. We track security configurations, access controls, and data handling practices, generating reports and alerts when systems drift from compliance requirements.
|
|
|
(HIPAA, PCI, etc.)
| ||||||
Security Awareness TrainingStructured training programs that teach your team to recognize and avoid cyber threats. This includes interactive modules on phishing identification, safe browsing habits, password security, and reporting suspicious activity. We deliver training regularly (monthly or quarterly), track completion rates, and simulate phishing attacks to measure and improve your team's security awareness over time. The human element is often the weakest link in security—this helps strengthen it.
|
|
|
| ||||||
Security Programs & AssessmentsFormal security evaluations and strategic planning for your organization's cybersecurity posture. This includes vulnerability assessments (scanning for technical weaknesses), security policy development, incident response planning, and regular reviews of your security controls. We document findings, prioritize remediation efforts, and provide roadmaps for improving your security over time rather than just reacting to threats as they occur.
|
|
|
| ||||||
Next Gen AntivirusModern endpoint protection that goes beyond traditional signature-based virus detection. It uses machine learning to identify malicious behavior patterns, monitors for fileless attacks, and can isolate compromised devices automatically. Unlike older antivirus that only catches known threats, next-gen AV can detect and stop new, never-before-seen malware based on how it behaves.
|
|
|
| ||||||
24 Hour MonitoringRound-the-clock surveillance of your critical systems, security alerts, and infrastructure. While our business support hours are defined separately, our monitoring systems never sleep—they watch for server failures, security breaches, backup problems, and system outages even at 2 AM. Critical alerts trigger immediate response protocols regardless of the time of day.
|
|
|
| ||||||
Threat ResponseActive investigation and remediation when security incidents occur. When our monitoring detects a potential breach or compromise, we don't just send an alert—we analyze the threat, contain affected systems, remove malicious elements, and restore normal operations. This includes forensic investigation to understand how the incident occurred and implementing measures to prevent recurrence.
|
Available
|
|
| ||||||
Network Content FilteringWeb filtering that blocks access to malicious, inappropriate, or productivity-draining websites across your organization. This protects against drive-by malware downloads, phishing sites, and other web-based threats. It also allows you to enforce acceptable use policies by restricting access to certain content categories during work hours.
|
|
|
| ||||||
Network Data InsightsDetailed analytics about your network usage, bandwidth consumption, application traffic, and connectivity patterns. This helps identify bandwidth hogs, understand which cloud services your team relies on, spot unusual data transfer patterns that might indicate security issues, and make informed decisions about network upgrades or optimizations.
|
|
|
| ||||||
Internet Threat ProtectionPerimeter defense at your network's connection to the internet. This includes intrusion prevention systems (IPS), advanced firewall capabilities, and threat intelligence feeds that block malicious traffic before it ever reaches your internal network. Think of it as a sophisticated security gate that examines everything entering or leaving your network.
|
|
|
|
Backup & Recovery
| Features | Minnow | Dolphin | Whale | ||||||
|---|---|---|---|---|---|---|---|---|---|
Backup & RecoveryAutomated data protection systems that continuously back up your critical business data, applications, and systems. Automated Backups (365/Workspace) covers your Microsoft 365 or Google Workspace cloud data—email, files, SharePoint content—which surprisingly isn't fully backed up by default. Full Disk Image + Disaster Recovery creates complete snapshots of your entire servers and workstations, allowing us to restore a failed computer to working condition in hours rather than days. Disaster recovery capabilities mean we can spin up virtual versions of your systems if hardware fails, keeping your business running while we arrange replacements.
|
|
Automated Backups (365/Workspace)
|
Full Disk Image + Disaster Recovery
|