Introduction

About Us

Resilient Mid-market IT

Midsize professional service firms owe their strength to their flexibility, to their responsiveness, and to empowered employees. We give them IT to match built on anti-fragility principles in a seamless experience.

Use this page to order our services, our payment portal to manage your "subscriptions", and our onboarding page to manage your users.

For a thorough description of our role at your side, check our blog or ask for a copy of our concise and easy to read IT Flipbook, a resource for those who think about what information technology and IT staff should do for them.

And of course, let's meet.

1 - 4 0 8 - 4 7 9 - 3 1 3 6

Book a free consultation

WHY US

Concierge CIO

Sound Business Model

The difference we make is in the productivity you gain. Your IT infrastructure is the backbone of your organization. It empowers people and runs the apps that run your business. It delivers customer and workplace experiences that define who you are. It must evolve rapidly. Our role at your side is to build and manage this infrastructure, but first and foremost, it is to help you unlock business value, in your leadership circle and in your teams, with knowledge, prompt hands-on support, and enabling training. [More]

Zero Trust | EDR/MDR | AVD/VAD

Security at the Edge

In today’s business landscape, remote work, mobile technology, cloud computing, and shadow IT have rendered the traditional castle-and-moat approach to cybersecurity ineffective. The network perimeter is no longer a reliable security boundary, and the focus has shifted to securing endpoints and applications. Our technology stack is designed to natively support this contemporary context, providing robust security measures that protect your organization’s data and assets from all known types of cyber threats. [More]

Microsoft 365 | Google Workspace...

Higher Cloud Productivity

Individuals, departments, and organizations have different needs, preferences, and expectations. Managers who value simplicity, flexibility, and teamwork may prefer Google Workspace. Others, who value compatibility, familiarity, and advanced functionalities like Microsoft 365. Some add on Proton because they need the security and privacy it offers, or Zoho for its simple business applications. With us, you can mix and match, and use multiple cloud productivity suites across the organization with a single domain name. [More]

Software-defined infrastructure

On Premises IT simplified

There is a proper way to host resources on premises (when the cloud isn’t cost-effective or suitable): through the use of a Hyperconverged Infrastructure (HCI) virtualization platform. This resilient software-based system combines all the elements of a data center (storage, compute, networking, backups, and management) in a cluster of three or more physical servers. HCI disentangles hardware, software and data, facilitating usage, maintenance and security. New virtual desktops, applications, or file shares can be deployed in hours (within or outside of your firewall perimeter). [More]

Anti-fragility | Systematic Redundancy

Business Continuity

We protect our clients' IT infrastructure from downtime and catastrophes through systematic redundancy along anti-fragility principles. Whatever can fail has its failover mechanism: computers (with Azure Virtual Desktop clones readily available), cloud storage (with SharePoint/Google Drive sync.), physical and virtual servers (on-prem, off site, or in the cloud), access to the Internet, backups, firewalls, switches, file shares, applications, VPN, network, and Office Suites. Even we, in our IT management role, are always two to support you. [More]

Third party risk management

Infrastructure Sovereignty

We shield our clients from the vendor lock-in and security risks inherent to using proprietary or niche solutions (through the use of FOSS). Access to your data and infrastructure by third party entities is limited to service providers you trust (e.g.: LOBs, Microsoft 365, Google Workspace...). The work we invest in building your cloud infrastructure remains yours after we leave (it is not tied to our infrastructure). We support PCs, Macs, Linux, and Chrome OS devices. Furthermore, The tools we use to manage and monitor your computers and M365 are self-hosted in single-tenant servers (to insulate you from supply chain and other "ka...ya" type ransomware attacks.) [More]

Open Source Technology

FOSS = Resilience

We achieve dramatic efficiency gains and cost savings through the use of industry-standard, battle-tested, and scalable open-source software. Along with "Big Tech", we leverage open source at the infrastructure, middleware, and application layers for both our clients' and our own needs (virtualization, networking, cybersecurity, maintenance, backups, monitoring...) Open-source software is a cornerstone of anti-fragile IT. [More]

Predictable Pricing


For the sake of simplicity, accuracy, and transparency, we price our services on a per-user and/or per-device basis. To each device corresponds a service.

The "devices" are personal computers and servers - physical or virtual - and the software they run, as well as networking equipment. Mobile phones are supported alongside PC's. Prices decrease with quantity. The cost of your LOBs, cloud productivity suites, and other cloud services is not included.

IT service consumption varies significantly across organizations. Our plans are all inclusive. Use discount codes to adjust our feature sets to your needs and budget. Read and follow our terms to avoid overages and determine what constitute managed services (plans) and project services.

Check our service catalog for more details and options. Use our payment portal to manage your "subscriptions", and our onboarding page to manage your users.

Single-Cloud

Microsoft 365

Compatibility, familiarity,

and advanced functionalities.

  • Best for Windows or MacOS
  • Computer or Azure Virtual Desktop
  • Microsoft 365 Business Premium/E3/E5 Onboarding
  • Google Workspace Standard/Plus Onboarding
  • White Glove PC Setup (Microsoft Autopilot)
  • On-site Support
  • Remote Support
  • Initial Migration to Cloud (mail, docs, cal)
  • Calendar Sync between Clouds
  • Bitdefender GravityZone
  • or Microsoft Defender for Endpoint
  • Endpoint Detection & Response (EDR)
  • Managed EDR (MDR)
  • 24/7 SOC Monitoring & Breach Remediation
  • Shadow IT Monitoring
  • Unauthorized Cloud Login Monitoring
  • Compliance Enforcement (GLBA, HIPAA...)
  • Proactive General Infrastructure Monitoring
  • On-premises Data Backup & Recovery*
  • Multi-Cloud Data Backup & Recovery
  • Sharepoint Backup/Sync to Google Drive
  • Weekly OS, Firmware, & Apps Patching
  • Next Hour Update for Common Apps
  • Vulnerability Scanning and Remediation
  • Zero Day Remediation
  • Patchless Protection
  • Hardware Procurement
  • Hardware Shipping & Retrieval Management
  • Hardware Inventory Management
  • Software Management
  • Remote & Automated Application Deployment
  • Company Software Repository
  • Auto-Elevation for Select Users
  • Curated Application Block List
  • Mobile Device Management (Intune)
  • Mobile Device Management (Google MDM)
  • Network Print
  • Cloud / Universal Print
  • Microsoft Teams Phone VoIP
  • Google Voice VoIP
  • Remote Work via VPN*
  • Remote Work via Zero Trust
  • Email Distribution List Management
  • Shared Mailboxes Management
  • Email Security (SPF, DKIM, DMARC...)
  • DNS-Layer Security
  • Fake Microsoft Login Page Detection
  • Domain Impersonation Protection
  • Phishing & Spam Protection
  • Dark Web Monitoring
  • CIS Benchmarks Security Configurations
  • Endpoint Encryption
  • Outlook Purview Mail Encryption
  • Enterprise Multi-platform Password Management
  • Managed Multi-factor Authentication
  • Conditional Access Management
  • Managed Single-Sign-On
  • Browser Hardening against Cross-site Scripting (XSS)
  • Microsoft Edge Policy Management
  • Enterprise Bookmark Management
  • Ad-free Browsing
  • Device High Availability (1.2/u)
  • High Availability through Azure Virtual Desktop (optional)
  • Virtual Windows App Delivery (optional)
  • IT Consulting
  • Security Awareness Trainings
  • $180

    per user/month

Single-Cloud

Google Workspace

Simplicity, flexibility,

and teamwork for cloud-native organizations.

  • Best for MacOS, ChromeOS, or Linux
  • Computer or Azure Virtual Desktop
  • Microsoft 365 Business Premium/E3/E5 Onboarding
  • Google Workspace Standard/Plus Onboarding
  • White Glove PC Setup (Microsoft Autopilot)
  • On-site Support
  • Remote Support
  • Initial Migration to Cloud (mail, docs, cal)
  • Calendar Sync between Clouds
  • Bitdefender GravityZone
  • or Microsoft Defender for Endpoint
  • Endpoint Detection & Response (EDR)
  • Managed EDR (MDR)
  • 24/7 SOC Monitoring & Breach Remediation
  • Shadow IT Monitoring
  • Unauthorized Cloud Login Monitoring
  • Compliance Enforcement (GLBA, HIPAA...)
  • Proactive General Infrastructure Monitoring
  • On-premises Data Backup & Recovery*
  • Multi-Cloud Data Backup & Recovery
  • Sharepoint Backup/Sync to Google Drive
  • Weekly OS, Firmware, & Apps Patching
  • Next Hour Update for Common Apps
  • Vulnerability Scanning and Remediation
  • Zero Day Remediation
  • Patchless Protection
  • Hardware Procurement
  • Hardware Shipping & Retrieval Management
  • Hardware Inventory Management
  • Software Management
  • Remote & Automated Application Deployment
  • Company Software Repository
  • Auto-Elevation for Select Users
  • Curated Application Block List
  • Mobile Device Management (Intune)
  • Mobile Device Management (Google MDM)
  • Network Print
  • Cloud / Universal Print
  • Microsoft Teams Phone VoIP
  • Google Voice VoIP
  • Remote Work via VPN*
  • Remote Work via Zero Trust
  • Email Distribution List Management
  • Shared Mailboxes Management
  • Email Security (SPF, DKIM, DMARC...)
  • DNS-Layer Security
  • Fake Microsoft Login Page Detection
  • Domain Impersonation Protection
  • Phishing & Spam Protection
  • Dark Web Monitoring
  • CIS Benchmarks Security Configurations
  • Endpoint Encryption
  • Outlook Purview Mail Encryption
  • Enterprise Multi-platform Password Management
  • Managed Multi-factor Authentication
  • Conditional Access Management
  • Managed Single-Sign-On
  • Browser Hardening against Cross-site Scripting (XSS)
  • Microsoft Edge Policy Management
  • Enterprise Bookmark Management
  • Ad-free Browsing
  • Device High Availability (1.2/u)
  • High Availability through Azure Virtual Desktop (optional)
  • Virtual Windows App Delivery (optional)
  • IT Consulting
  • Security Awareness Trainings
  • $160

    per user/month

Standalone Security Bundle

  • Bitdefender GravityZone Endpoint Security
  • or Microsoft Defender for Endpoint*
  • Endpoint Detection and Response (EDR)
  • 24/7 Managed Detection and Response (MDR)
  • Shadow IT Monitoring
  • Email Security (DMARC, SPF, DKIM...)
  • Outlook Purview mail encryption*
  • DNS-Layer Security
  • Password Management
  • Managed SSO
  • Managed MFA*
  • Endpoint Encryption*
  • Security Awareness Trainings
  • Dark Web Monitoring
  • Vulnerability Scanning & zero day remediation
  • OS and apps patching
  • $100

    per endpoint/month

Networking

  • Hardware or Appliance(s) Selection, & Setup
  • Stateful Firewalls Installation & Management
  • Multi-WAN Aggregation
  • Mesh WiFi Setup and Management
  • Access Points Performance Tracking
  • Access Control and Arpwatch
  • Snort Intrusion Detection & Prevention*
  • DHCPv4 & DHCPv6
  • DNS Resolver
  • Virtual LAN's (VLANs)
  • Virtual Private Networks (VPNs)
  • Dynamic DNS
  • Ingress & Egress Rules Management
  • High Availability or Live Backup
  • Local and Remote Backups
  • One or two nodes per LAN
  • $120

    per LAN/month + setup fee

About You

Contact

Contact

Address
1301 S. Bowen Road, Suite 435, Arlington TX 76013
Phone
00 1 408-479-3136
Mail
info (at) conciergeCIO (dot) com
Web
www.conciergecio.com

Send us a Message

Use this contact form to introduce yourself and let us know when and how to contact you. You can also use this form to ask for a free copy of our book. This book is one of the most concise IT Plans you will ever read. Thank you.

  • Please use a REAL email address so that we can get back to you.