Skip to content
"VC3 has made it easier than ever before for our local government to serve our citizens by providing us with modern web tools and a team
of talented and courteous professionals.
City of Valdosta, GA

2024 Managed IT Services Cost & Pricing Guide

You’ve probably heard about how managed IT services saves businesses money and are wondering if that’s possible for your organization too. This guide will help walk you through different pricing strategies and costs you can expect.

Woman connecting cellphone and laptop computer-185481-edited

Multifactor Authentication (MFA)

Protect user account access for Microsoft 365 files and data. If needed, we also provide MFA for devices in case they are compromised.

Organizations turn to VC3 for
MFA when they...

Need to meet compliance and cyber insurance requirements.
Need to meet compliance and cyber insurance requirements.
Need to better secure remote access to systems and applications without needing a VPN.
Need to better secure remote access to systems and applications without needing a VPN.
Need extra protection for devices in case they are lost, stolen, or accessed by unauthorized users.
Need extra protection for devices in case they are lost, stolen, or accessed by unauthorized users.
Need an extra layer of protection to prevent lateral movement inside their network.
Need an extra layer of protection to prevent lateral movement inside their network.

Different Levels of MFA for Different Needs

We include Microsoft 365 MFA with VC3 Manage, VC3 Essentials, and VC3 Co-Manage. However, you may need additional MFA for devices. Let’s look at each kind of MFA.

Microsoft 365 MFA

For many organizations, employees use Microsoft 365 all day, every day. Applications like Outlook, Teams, OneDrive, and SharePoint are not only critical for work but also store extremely sensitive data that hackers want to access.

Cyberattackers are very good at stealing Microsoft 365 credentials, making MFA a necessity in today’s environment. Microsoft 365 MFA adds an extra layer of security when someone logs into their account. In addition to a username and password, an employee will need to confirm their identity using a second method such as a text message, app notification, or biometric method.

Device MFA

While Microsoft 365 MFA protects access to Microsoft applications, a cyberattacker could still access a physical device such as a computer or laptop. For organizations that have strict compliance requirements, large field teams, or guests coming in and out of an office all day, you may have concerns about unauthorized access to lost, stolen, or publicly accessible devices.

Device MFA requires that users verify their identity through MFA before logging into a computer, laptop, or other protected device. This way, if someone gets physical access to an organization’s device, MFA blocks access and prevents them from stealing sensitive information.

Here’s a quick comparison of both services.

FAQ

Microsoft 365 MFA
(included with VC3 Manage, VC3 Essentials, and VC3 Co-Manage)

Device MFA
(an extra service offered by VC3)

What is protected?

Microsoft 365 accounts such as your email, Teams, files, etc.

Physical devices such as laptops and desktop computers.

When is MFA triggered?

When an employee logs into Microsoft 365 from any location.

When an employee logs into a device.

Why do I need it?

Stops cyberattackers from using stolen credentials to access your Microsoft 365 data.

Blocks access to stolen, misplaced, or physically accessible devices.

What is the experience for employees?

They will receive a mobile prompt or mobile app confirmation.

Depending on organizational preference, they could receive a text code, mobile app confirmation, or biometric (like a fingerprint).

Does this MFA help improve remote access security to my organization’s data?

Yes. In fact, Microsoft 365 MFA is essential security if you have work-from-home employees.

Yes. Device MFA is especially important when employees are travelling or at home and accessing company resources from their device.

Does MFA help with compliance?

Yes. Microsoft 365 MFA helps you meet HIPAA, CJIS, and other security standards.

Yes. Device MFA adds an extra layer of protection required by some compliance frameworks (such as CJIS).

MFA Features That Reduce Your Organizational Risk

  • Conditional Access Policies

    Microsoft 365 MFA blocks or limits access to users based on risk-level such as someone logging in from an unusual location or untrusted device.

  • Extra Device Security

    Device MFA prevents unauthorized access to a computer even if it’s stolen or left unlocked.

  • Holistic Security Across Your Microsoft Environment

    Microsoft 365 MFA works across all your Microsoft services such as your email, OneDrive, SharePoint, Teams, etc.

  • Compliance Enforcement

    Device MFA blocks users from logging into your systems from a device that doesn’t meet minimum security standards.

  • Reduced Risk of Cyberattacks from Stolen Credentials

    Microsoft 365 MFA prevents hacking attempts when cyberattackers use credentials stolen through phishing or data breach leaks.

  • Advanced Local and Network Protection

    Device MFA helps stop lateral movement across your network from a compromised device.

What Our Clients Are Saying

We hadn’t seen anyone like VC3 before.

I was pleasantly surprised by VC3’s remote IT support and how well it served our city. We learned the hard way that we needed a vendor that helped us stay secure from ransomware and cyberattacks, update and patch everything constantly, and stay on top of IT issues. With VC3, everything is getting done. You don’t know what you’re missing if you’ve never seen it before—and we hadn’t seen anyone like VC3 before.

Captain Jeff Swain
Isle of Palms Police Department, SC

Great working relationship.

We have such a great working relationship and we’re always talking about the next thing. Chris and VC3 are my trusted advisors.

Lucy Papp, CFO
Stollery Children's Hospital

They placed us in a position to better service our staff.

When it comes to establishing an effective IT infrastructure, consulting experienced professionals is the first and most important step. It is one we are glad to have taken with VC3 as they placed us in a position to better service our staff and the residents of our city.

Police Chief Christopher Hodge
City of Auburn, Georgia

VC3 has so far been the most enjoyable.

I've been working with outsourcing partners since 1998 and working with VC3 has so far been the most enjoyable and least painful experience.

 
Gabor Szentivanyi, Chief Information Officer
Kymera International

Our Strategic Advisor has always been a fantastic advocate for us.

Our Strategic Advisor has always been a fantastic advocate for us. If we do have issues, he’s a reasonable voice that is very good at seeing our perspective and helping us see it through.

Karl McCollester, IT Consultant
City of Sumter, SC

VC3 keeps your organization proactive and protected.

52 K

User Accounts Under Active Management

29 +
Years

of Experience Evolving with the Threat Landscape

96 %

Client Satisfaction

The capacity, skill set, and experience to help you AIM higher.

  • Fast Deployment

    Our streamlined onboarding process helps VC3 deploy MFA quickly, correctly, and consistently—reducing the risk of misconfigurations or gaps.

  • Decreased Cyber Risk

    Extra layers of authentication reduce the risk of a cyberattack, data theft, or unauthorized access.

  • Meet Compliance and Cyber Insurance Mandates

    MFA is an essential part of meeting compliance requirements and acquiring affordable cyber insurance.

  • Real-Time Risk Detection

    Through our 24/7 support, we quickly know if a risky sign-in attempt occurred that may indicate a threat—often before you even notice an issue.

  • Simplified User Onboarding and Offboarding

    We ensure that all new users are enrolled into MFA while offboarded users have their access revoked immediately, lessening the risk of unused accounts that may lead to a credential compromise.

     

  • Security Policy Enforcement

    To follow cybersecurity best practices and meet compliance requirements, we can enforce MFA policies across your organization—avoiding the problem of users bypassing MFA requirements.

Our approach to technology enables your organization to AIM Higher.

Lots of companies can set up your laptops or manage your infrastructure. In order to contend with today's challenges, you need more than a break fix vendor with a "24/7" helpdesk ticket to nowhere. You need a proactive partner that stops the issues before they start. That's where VC3 comes in.

Let's talk about how VC3 can help you AIM higher.