← Back to Service Plans

Plan features, side by side

See exactly what's in each tier before you talk to us.

Business-PRO — Core vs Strategic

Compare what's included in Core and Strategic. Both tiers include comprehensive day-to-day IT support; Strategic adds a dedicated strategic-management layer.

FeatureCoreStrategic
Day-to-Day Support
Service Desk, Incident & Problem ManagementFast support across phone, email and portal. Issues resolved quickly, repeats prevented.
Guaranteed Response TimesPriority-based SLAs for incidents and requests, qualified by impact and severity.
Change Control & ApprovalsChange requests reviewed, approved and documented before any work starts. Protected rollback path on every change.
Software & Hardware SupportCoverage for the equipment and applications your team relies on.
M365 / Google Workspace ManagementConfiguration, policies and ongoing management of your cloud productivity suite.
Remote & Onsite SupportHelp wherever your team is. Remote-first, onsite when needed.
Mobile Device SupportUser support for mobile devices. iPhones, iPads and Androids.
Mobile Device Management (MDM)Devices enrolled, secured and centrally managed across your team.
Vendor Coordination on Your BehalfWe coordinate with your ISP, software vendors and other IT-related providers when issues span beyond us.
User Support PortalTickets, approvals, pre-built request forms (new starters, leavers, common requests). All in one place.
Joiner-Mover-Leaver WorkflowsStaff onboarding and offboarding handled with automated access provisioning and revocation.
New Workstation SetupService-desk-driven workstation provisioning for new starters.
Zero-Touch Device DeploymentDevices auto-configure from first boot. No manual setup needed.
Centralised Endpoint Security PoliciesDisk encryption, screensaver lock and device security settings enforced centrally.
Major OS Upgrade ManagementAnnual major OS revisions tested in UAT, then phased rollout to all users. Managed end-to-end.
Security & Monitoring
Endpoint Detection & Incident ResponseEDR with managed remediation when threats are detected (SentinelOne).
24/7 Infrastructure MonitoringContinuous monitoring of your servers, network and key services.
Patch & Software ManagementOperating systems, applications and firmware kept current and secure.
Asset Inventory & Lifecycle TrackingLive record of every device and where it is in its lifecycle.
Documented IT Environment & Credential VaultNetwork diagrams, runbooks, recovery documentation and securely-stored credentials maintained as part of your service.
Backup & Disaster Recovery
Daily Server Backup MonitoringDaily verification that backups completed successfully and are recoverable.
Cloud Data Backups (M365 & Google Workspace)Independent backups of your cloud data. Recoverable even if your provider cannot help.
Backup Retention & Restoration SupportWe hold your data for the agreed retention period and handle restore requests when you need them.
Disaster Recovery TestingManual test and restore of server backups, scheduled annually.
Network Device Configuration BackupsRouter, switch and firewall configurations backed up with version control.
Proactive & Strategic Management
Annual Account ReviewAnnual review of your IT environment with your account manager.
Strategic Technology Reviews (vCIO)Monthly or quarterly business reviews with a dedicated vCIO. Frequency tailored to your business.
Technology Alignment AuditsDedicated alignment manager proactively audits your environment against best practice. Findings feed into your Strategic Technology Review.
IT Budget Planning & TrackingIT spend reviewed alongside your Strategic Technology Review cadence.
Vendor Renewal NegotiationWe negotiate IT-related vendor renewals on your behalf (ISP, SaaS, support contracts).
Licence & Warranty Renewal ManagementActive management of software licence and hardware warranty renewals.
Additional Benefits
Pre-Sales Scoping & ProposalsWe scope projects and prepare proposals at no charge, up to proposal stage. No upfront fees.
Fixed-Fee ProjectsOnce a project is scoped, we deliver to a fixed fee against an agreed scope.
Discounted Project RatesReduced day-rate for any project work outside your plan.
Flat-Rate Pricing for Routine Out-of-Plan TasksPredictable pricing for things not included in your plan (e.g. additional workstation deployments). No hourly surprises.
Cyber Insurance & Compliance Questionnaire SupportWe help you complete cyber insurance and compliance questionnaires accurately. Gathering technical detail, aligning responses with your real controls.

Not sure which tier is right for you? We'll tell you straight.

Security Upgrades — Essential vs Advanced

Compare what's included in Essential and Advanced. Both tiers run on the same unified cybersecurity platform; Advanced adds visibility tools and structured compliance support.

FeatureEssentialAdvanced
Unified Cybersecurity Platform
A unified cybersecurity platform. Continuously monitored, tuned and managed by Rubicon, with monthly reporting and active incident response.
Cloud Directory SecurityContinuous monitoring of your M365 / Google directory. Rubicon investigates flagged risks (missing MFA, suspicious logins, inactive accounts).
Cloud Data Exposure MonitoringDetects external sharing of files and folders, plus potential data exfiltration in M365 and Google Workspace.
Dark Web MonitoringContinuous scanning for stolen credentials and exposed business data. Rubicon alerts and walks you through remediation.
Advanced Email ProtectionAI-driven detection of phishing, ransomware and business email compromise. Beyond native M365/Google filtering.
Security Awareness TrainingEngaging training modules teaching staff to spot phishing, suspicious links and unsafe browsing. Managed and tracked by Rubicon, with engagement reporting.
Phishing SimulationsSimulated phishing attacks measure user vulnerability and reinforce training. Rubicon runs the campaigns and reports on results.
Monthly Security ReportingPlain-English monthly reports showing threats blocked, risks identified, and recommended next steps.
Email & Identity Hardening
Domain Spoofing Protection (DMARC Enforcement)Rubicon-managed DMARC enforcement. Moves you from monitoring to block-spoofed-mail mode without breaking legitimate email.
Visibility & Threat Detection
SaaS Application DiscoveryIdentifies every SaaS app and web service in use across your team. Including unsanctioned ones.Optional add-on
Secure Browsing (DNS & Web Filtering)Blocks malicious websites and phishing pages at the DNS layer. Protection, not restriction.Optional add-on
Compliance & Assurance
Cyber Essentials Gap AnalysisInitial review of your environment against current Cyber Essentials criteria. Identifies gaps and prioritises remediation.
Cyber Essentials Annual Certification AssistanceOngoing support to maintain and renew your Cyber Essentials certification each year (IASME certification fee paid separately to IASME).
Security Questionnaire Assistance (TPN, vendor)Support completing security and content-handling questionnaires. TPN, vendor reviews, client audits (max 2 per annum).

Optional Add-Ons

Available with either Essential or Advanced. Bolt on when you need them. Pricing on request.

Add-OnDescription
24/7 SOC MonitoringContinuous monitoring by a Security Operations Centre. Threats detected, investigated and contained around the clock. Add to either tier when 24/7 cover is needed.
Password ManagerPer-user secure password vault, managed and supported by Rubicon. Tied into your wider IT documentation.
Cyber Essentials CertificationThe certification fee paid directly to IASME, separate from Rubicon's assistance work in the Advanced tier.
Cyber Essentials Plus CertificationHigher-assurance CE+ certification with technical audit, paid to IASME.
Cyber Essentials Initial Certification ProjectFull project to take you from gap analysis through implementation to first-time CE certification.
SIEM (Security Information & Event Management)Aggregates and analyses activity across your IT infrastructure to detect threats and anomalies.
External Penetration TestingAnnual external pen testing by a CREST-accredited tester. Finds vulnerabilities before attackers do.
Internal Vulnerability ScanningMonthly or quarterly scanning of your internal network for known vulnerabilities.
External Vulnerability ScanningMonthly scanning of your internet-facing systems for exposed services and known vulnerabilities.

Not sure which add-ons apply to your business? Tell us about your situation and we'll advise.

Ready to talk about your plan?

We'll walk you through which tier makes sense for your team — no jargon, no pressure.

Back to plans overview