blue spiral banner

Find Your Ideal Plan

We provide flexible, affordable, managed IT services designed exclusively for small and medium sized businesses in London and the surrounding areas.

White curved arrow

Save 10%

White curved arrow

Price locked for 2 years

White curved arrow

Choose a plan

The Secure

Protect, secure and update your devices with core managed IT security.

 


£13

Paid monthly

Microsoft 365 license not included

The Secure plan includes:


  • Patch management
  • Remote monitoring management (RMM)
  • Endpoint detection and response (EDR)
Learn More

The Essentials

Empower your frontline workforce to do their best work with essential support, productivity apps and cloud services.


£49

Paid monthly

Microsoft 365 Business Standard

Word logo Excel logo PowerPoint logo Teams logo Outlook logo onedrive logo Publisher logo microsoft access logo

Everything in Secure, plus


  • Helpdesk support
  • Secure configuration of 365 Business Standard
  • OneDrive support
  • Desktop versions of 365 apps
  • Business spam filtering
  • Multi-factor authentication (MFA)
  • 365 cloud data backup
  • Impossible login ticketing & alerting
  • Starters, movers, and leavers
Learn More

The Premium

Get best-in-class IT service desk, productivity apps, core security and compliance capabilities.

 


£69

Paid monthly

Microsoft 365 Business Standard

Word logo Excel logo PowerPoint logo Teams logo Outlook logo onedrive logo Publisher logo microsoft access logo

Everything in Essentials, plus


  • Egnyte Cloud File Server
  • Unlimited helpdesk support
  • Office 365 'track & trace' centre
  • Microsoft 365 advanced monitoring
  • Security awareness training
  • IT policy management
  • Threat protection simulations
  • Dark web monitoring
  • Designated account manager
  • Cybersecurity GAP analysis
Learn More

Help desk

  • You must purchase PAYG helpdesk support in addition to this plan to benefit from our helpdesk.

Onsite support

  • Not included

Starters, movers & leavers

  • Installation and deployment of patch management, endpoint detection and response apps
  • Basic inventory management

Patch management

  • Security patches, bug fixes and feature updates
    Security patches, bug fixes and feature updates are three types of software updates that aim to improve the performance, security and functionality of a software product. Security patches are updates that fix vulnerabilities or flaws in the software that could be exploited by hackers or malicious programs. Bug fixes are updates that resolve errors or glitches in the software that affect its functionality or usability. Feature updates are updates that add new or enhanced features to the software that improve its user experience or capabilities. Whilst these are delivered ad-hoc we make sure that these are rolled out and completed every Wednesday evening, leaving you updated with any compliance.

Remote monitoring & management

  • Drag and drop automation
  • Asset discovery and inventory tracking
  • Unattended remote support
  • Response automation & self-healing

Endpoint detection & response

  • Next generation EDR anti-virus software
    EDR is a powerful solution that provides comprehensive visibility, detection, and response capabilities across endpoints, networks, and cloud environments. EDR leverages artificial intelligence and machine learning to automatically identify and stop threats in real time, reducing the workload and complexity of security operations. EDR also enables proactive hunting, forensic analysis, and remediation of incidents, enhancing security posture and resilience.
  • Setup, configuration & support
  • Identifying malicious behaviors

Email protection to secure & scale your business

  • Not included

Your Microsoft Office 365 plan

  • Not included

Office 365 advanced monitoring & management services

  • Not included

365 cloud backup

  • Not included

Microsoft Teams phone system

  • Available as an add-on (£6.60)
    - Teams phone is a cloud-based phone system that integrates with Microsoft 365 and allows you to make and receive calls from anywhere, on any device. - Offering advanced features such as call routing, auto attendants, voicemail, call recording, and analytics, to help you manage your communications more efficiently and professionally. - Enables you to collaborate with your colleagues and customers more easily, by using chat, video, and screen sharing within the same app. - Helps you save money and simplify your IT management, by eliminating the need for separate phone systems and hardware, and by providing a unified security and compliance framework across Microsoft 365. - Supports a wide range of devices and accessories, such as desk phones, headsets, speakers, and conference phones, to suit your preferences and needs.
  • Unlimited domestic calls to landline and mobile (£6.00)

Security awareness training

  • Not included

Everything you need to measure & reduce phishing vulnerability

  • Not included

Policy management – fit for compliance

  • Not included

Dark web monitoring

  • Not included

Appropriately supporting staff to ensure they make a positive contribution

  • Not included

Cyber Essentials certification

  • Not included

Email signature management

  • Not included

Egnyte file sharing and collaboration

  • Not included

Access governance

  • Not included

Discovery and classification

  • Not included

Lifecycle management

  • Not included

Data controls

  • Not included

Threat management

  • Not included

Privacy and compliance

  • Not included

Governed data sources

  • Not included

Help desk

  • 120 minutes of helpdesk support per user per annum - pooled. Reverts to PAYG helpdesk thereafter
  • Helpdesk open between 08:00 - 18:00 Mon - Fri
  • Full ticket management

Onsite support

  • Not included

Starters, movers & leavers

  • Installation and deployment of patch management, endpoint detection and response apps
  • Basic inventory management
  • Installation & setup of Microsoft 365
  • Access to OneDrive and SharePoint
  • Hardware procurement and fulfilment
  • Data transfer and email management for leavers

Patch management

  • Security patches, bug fixes and feature updates
    Security patches, bug fixes and feature updates are three types of software updates that aim to improve the performance, security and functionality of a software product. Security patches are updates that fix vulnerabilities or flaws in the software that could be exploited by hackers or malicious programs. Bug fixes are updates that resolve errors or glitches in the software that affect its functionality or usability. Feature updates are updates that add new or enhanced features to the software that improve its user experience or capabilities. Whilst these are delivered ad-hoc we make sure that these are rolled out and completed every Wednesday evening, leaving you updated with any compliance.
  • Automated Microsoft patch management

Remote monitoring & management

  • Drag and drop automation
  • Asset discovery and inventory tracking
  • Attended and unattended support
  • Response automation & self-healing
  • Remote policy depolyment

Endpoint detection & response

  • Next generation EDR anti-virus software
    EDR is a powerful solution that provides comprehensive visibility, detection, and response capabilities across endpoints, networks, and cloud environments. EDR leverages artificial intelligence and machine learning to automatically identify and stop threats in real time, reducing the workload and complexity of security operations. EDR also enables proactive hunting, forensic analysis, and remediation of incidents, enhancing security posture and resilience.
  • Setup, configuration & support
  • Identifying malicious behaviors

Email protection to secure & scale your business

  • Detect phishing and protect in real time with collective threat intelligence and machine learning
  • Secure inbound and encrypted email with full SPF/DKIM/DMARC support
  • Advanced email protection

Your Microsoft Office 365 plan

  • Microsoft 365 Business Standard - Upgrade to 365 Business Premium for £9.36 or Office 365 E3 for £16.50
  • Desktop versions of Office apps with premium features
  • Word, Excel, PowerPoint, Teams, Outlook, Exchange, OneDrive, SharePoint, Access & Publisher
  • 1TB of cloud storage per user
  • Business-class email
  • Standard security

Office 365 advanced monitoring & management services

  • Track & trace AI monitoring & alerting
  • Location lockdown
    This service will alert LAN Support and create a service ticket should someone attempt to login outside specified safe regions. Safe locations can be added, removed, or set up on a temporary basis by contacting the LAN Support team.

365 cloud backup

  • Back up Outlook, OneDrive, SharePoint, Contacts, Calendars, Tasks, Groups & Teams (Microsoft 365)
  • Insights email business intelligence
  • Closes common Office 365 data protection gaps
  • Supports compliance efforts

Microsoft Teams phone system

  • Available as an add-on (£6.60)
    - Teams phone is a cloud-based phone system that integrates with Microsoft 365 and allows you to make and receive calls from anywhere, on any device. - Offering advanced features such as call routing, auto attendants, voicemail, call recording, and analytics, to help you manage your communications more efficiently and professionally. - Enables you to collaborate with your colleagues and customers more easily, by using chat, video, and screen sharing within the same app. - Helps you save money and simplify your IT management, by eliminating the need for separate phone systems and hardware, and by providing a unified security and compliance framework across Microsoft 365. - Supports a wide range of devices and accessories, such as desk phones, headsets, speakers, and conference phones, to suit your preferences and needs.
  • Unlimited domestic calls to landline and mobile (£6.00)

Security awareness training

  • Not included

Everything you need to measure & reduce phishing vulnerability

  • Not included

Policy management – fit for compliance

  • Not included

Dark web monitoring

  • Not included

Appropriately supporting staff to ensure they make a positive contribution

  • Not included

Cyber Essentials certification

  • Available from £995.00 per year or £95.00 per month. Includes £25,000 cyber insurance cover

Email signature management

  • Not included

Egnyte file sharing and collaboration

  • Not included

Access governance

  • Two factor authentication app
    Make your account even more secure using two-step login verification (TSLV). TSLV requires a third piece of information, in addition to your username and password, to log you in. This includes logging in from the web UI, the mobile app, or the desktop app.
  • Strong password policy enforcement

Discovery and classification

  • Not included

Lifecycle management

  • Not included

Data controls

  • Not included

Threat management

  • Not included

Privacy and compliance

  • Not included

Governed data sources

  • Not included

Help desk

  • Unlimited helpdesk support
    Speak to a designated team of 6 helpdesk agents for improved continuity
  • Helpdesk open between 08:00 - 18:00 Mon - Fri
  • Full ticket management
  • Client portal access
    Our client portal provides two levels of access for different user roles. All employees can use Level 1, which is a basic but effective tool. You can create and view tickets, as well as chat with our support team directly to solve problems faster. Level 2 is for managers or stakeholders who need more functionality, such as requesting new staff, transfers, or terminations; ordering onsite support or hardware; and accessing documents like Cyber Essentials certificates, PI documents, liability insurance certificates, contracts, Microsoft NCE agreements, and more.
  • Service level agreement

Onsite support

  • Next day onsite support (P1)
    Next day onsite for tickets escalated from our support team before 13:00 - 50% discount on callout fee - saving you £75.00 on your first onsite hour.

Starters, movers & leavers

  • Installation and deployment of patch management, endpoint detection and response apps
  • Basic inventory management
  • Installation & setup of Microsoft 365
  • Configuration of shared calendars
  • Access to OneDrive and SharePoint
  • Hardware procurement and fulfilment
  • Data transfer and email management for leavers
  • Installation of cloud file server
  • Folder permissions and testing
    Folder permissions in Egnyte are a powerful feature that allow us to control who can access, edit, and share your files and folders within your organisation. Our team can set permissions at the folder level, or inherit them from the parent folder. We can also assign different permissions to different groups or users, depending on their roles and needs. Folder permissions help you to protect your data, collaborate efficiently, and comply with security policies.
  • Serial number and warranty management
  • Security awareness gap analysis review
  • Collection and reconditioning of hardware

Patch management

  • Security patches, bug fixes and feature updates
    Security patches, bug fixes and feature updates are three types of software updates that aim to improve the performance, security and functionality of a software product. Security patches are updates that fix vulnerabilities or flaws in the software that could be exploited by hackers or malicious programs. Bug fixes are updates that resolve errors or glitches in the software that affect its functionality or usability. Feature updates are updates that add new or enhanced features to the software that improve its user experience or capabilities. Whilst these are delivered ad-hoc we make sure that these are rolled out and completed every Wednesday evening, leaving you updated with any compliance.
  • Automated Microsoft patch management
  • Test patches before implementation
  • Vulnerability management
  • ITIL compliance

Remote monitoring & management

  • Drag and drop automation
  • Asset discovery and inventory tracking
  • Attended and unattended support
  • Response automation & self-healing
  • Remote policy deployment
  • Remote software deployment

Endpoint detection & response

  • Next generation EDR anti-virus software
    EDR is a powerful solution that provides comprehensive visibility, detection, and response capabilities across endpoints, networks, and cloud environments. EDR leverages artificial intelligence and machine learning to automatically identify and stop threats in real time, reducing the workload and complexity of security operations. EDR also enables proactive hunting, forensic analysis, and remediation of incidents, enhancing security posture and resilience.
  • Setup, configuration & support
  • Identifying malicious behaviours

Email protection to secure & scale your business

  • Detect phishing and protect in real time with collective threat intelligence and machine learning
  • Secure inbound and encrypted email with full SPF/DKIM/DMARC support
  • Advanced email protection

Your Microsoft Office 365 plan

  • Microsoft 365 Business Standard - Upgrade to 365 Business Premium for £9.36 or Office 365 E3 for £16.50
  • Desktop versions of Office apps with premium features
  • Word, Excel, PowerPoint, Teams, Outlook, Exchange, OneDrive, SharePoint, Access & Publisher
  • 1TB of cloud storage per user
  • Business-class email
  • Standard security

Office 365 advanced monitoring & management services

  • Impossible login ticketing & alerting
  • Location lockdown
    This service will alert LAN Support and create a service ticket should someone attempt to login outside specified safe regions. Safe locations can be added, removed, or set up on a temporary basis by contacting the LAN Support team.
  • Email forwarding alerts
    Sends an alert if an external forwarder is set up on an account. By default, this alert goes out to Three accounts; LAN Support’s PSA helpdesk system; The customer notification email if specified within our service and to the individual who has a forwarder detected on their account. Forwarders detected by our team can be approved or removed using the associated companion tool Approve / Remove detected forwarders’.
  • Password expiry notifications
    This will alert your users directly when their password is about to expire, preventing unexpected account lockouts. Reminder emails will be sent daily for one week before expiry until the password is updated.
  • Block external inbox rules
    Prevents inbox rules from forwarding email externally. The user will receive an email informing them that this option is disabled. Exceptions can be made if necessary, but it is not recommended as it may affect compliance.
  • Monitor admin roles
  • Internal spoofing protection
    This service adds a warning banner to emails where possible spoofing has been detected

365 cloud backup

  • Full backup included
  • Calendars, tasks, and attachments backup for both Microsoft 365 and Google Workspace
  • Insights email business intelligence
  • Closes common Office 365 data protection gaps
  • Supports compliance efforts

Microsoft Teams phone system

  • Available as an add-on (£6.60)
    - Teams phone is a cloud-based phone system that integrates with Microsoft 365 and allows you to make and receive calls from anywhere, on any device. - Offering advanced features such as call routing, auto attendants, voicemail, call recording, and analytics, to help you manage your communications more efficiently and professionally. - Enables you to collaborate with your colleagues and customers more easily, by using chat, video, and screen sharing within the same app. - Helps you save money and simplify your IT management, by eliminating the need for separate phone systems and hardware, and by providing a unified security and compliance framework across Microsoft 365. - Supports a wide range of devices and accessories, such as desk phones, headsets, speakers, and conference phones, to suit your preferences and needs.
  • Unlimited domestic calls to landline and mobile (£6.00)

Security awareness training

  • Automated cyber awareness training
    Security awareness training is an essential part of protecting a business from cyber attacks and data breaches. It helps employees to understand the importance of security measures and procedures, as well as how to recognise and respond to potential threats.
  • Onboarding gap analysis testing
    A security awareness gap analysis review is a process of evaluating the current level of security awareness among employees in an organisation. It identifies the strengths and weaknesses of the existing security awareness program, and the areas where improvement is needed. The purpose of the review is to enhance the security culture and behavior of the employees, and to reduce the risk of human error, negligence, or malicious actions that could compromise the confidentiality, integrity, or availability of the organisation's information assets.
  • Training unique to your employees' security weaknesses
    Gives your customers confidence that you keep their data safe and secure
  • Building a culture of security with employee progress reporting
  • A GDPR & Cyber Essentials certification requirement
  • Add your own in-house training assessments

Everything you need to measure & reduce phishing vulnerability

  • Automated phishing simulations
  • Ready-made template library
  • Monitor user risk
  • In-depth reporting
  • Seasonal campaigns

Policy management – fit for compliance

  • Choose 6 essential prewritten IT polices from a centralised document library
    The security of your systems depends on the safe behavior of your staff. You need to establish and communicate clear guidelines for preventing or reducing security incidents. This is not only a legal requirement, but also a way to protect your business, your staff and your clients. You should also have a cybersecurity staff handbook that explains the rules and expectations for your staff, and have them sign it as part of their training.
  • Create your own policies
    create policies from scratch using an in-software editor tool with version control.
  • Policy version control
    Store and amend documents in one centralised location, making it easy to find, send and revise different policies.
  • Automatic policy updates with eSign
    Notify users of relevant policy updates via email announcements and provide self-service access for employees to read and approve at a time of their convenience.

Dark web monitoring

  • Detection of compromised data
  • Identify what data is exposed
  • Get notified when new breaches are found
  • Encourage secure email and password use

Appropriately supporting staff to ensure they make a positive contribution

  • Not included

Cyber Essentials certification

  • Available from £995.00 per year or £95.00 per month. Includes £25,000 cyber insurance cover

Email signature management

  • Not included

Egnyte file sharing and collaboration

  • Egnyte Cloud File Server (CFS)
    Egnyte's entry level cloud server offering
  • Desktop & mobile apps
    The Desktop App provides fast real-time access to your files and folders stored in the cloud from your computer. Once connected, all content you can access in the cloud will appear in a network drive in Windows Explorer or volume on Mac Finder. You will be able to view all your files and folders in the cloud without having to sync them to your computer first. Furthermore, you'll also be able to select specific folders to be synchronised for access, even when you are offline. Mobile App - Extend the office through your mobile device and work from anywhere with ease. Collaborate seamlessly with internal and external users and boost your organisation’s productivity. The Egnyte mobile app supports iOS and Android platforms for phones and tablets. Access your data, preview files and folders, upload new content, and collaborate through shared folders and file links when you want, wherever you are.
  • 200GB per user up to 10TB
    Additional storage available upon request
  • File size up to 50GB
  • 1-click co-editing in Microsoft Office & Google Workspace
    Native integrations help you centralise content, battle sprawl and maintain file consistency, giving everyone a unified experience. With a single secure source of truth, users get work done in the right application - like M365, Google Workspace, Slack and many industry-unique apps. For peace of mind it safeguards the flow of content across every app your teams use.
  • File and folder sharing
    If you want to share a file with someone without requiring them to log in, send them a link to a specific file. When your colleague clicks on the link, Egnyte will generate a preview of your file. Your partner can review it there or download the file.
  • File versioning and upload links
    Appending file names with indicators like v 2.1 and 2013 03 23 is an inconvenient way to track the iterations of a file and dramatically increases your storage needs. By contrast, Egnyte automatically creates a new version of a file each time a change is saved for an existing document. Your Administrator has set up version policies to dictate how many versions are collected before the old versions are moved to trash. Read on to learn more about file versions and how to "promote" old versions to replace the existing file. Upload links are a great way for people outside your Egnyte account to upload content to a specific shared folder, without being able to see the contents of that folder. Construction companies may need to securely solicit bids from subcontractors, but don't want them to see their competitors’ pricing or a university professor wants a way for students to upload problem sets without peeking at each other's answers. Upload links can solve both of these dilemmas.
  • File and folder templates
    Many organisations repeatedly use the same structure of files or folders in their processes. Your use cases might be different, but to illustrate, we've given a couple of examples below: Company A has a default presentation template that should be used by all employees to keep the branding and messaging consistent externally. Company B works on several projects. Any project should include the same static list of folders due to public regulations. Our file sharing software improves file sharing processes and allows easier management and access to templates.
  • Video playback
    Video files are an increasingly common file type to upload and share. With web UI preview capabilities, a user can see video previews for all formats, not just for formats natively supported for preview in the user’s web browser.
  • Single-step approval workflow
    Review and approval workflows help you get documents reviewed and approved efficiently. You can also assign documents to people to add content, publish, or validate content.
  • Granular sub-folder permissions
    When fellow employees and outside business partners collaborate on a project, you may want collaborators to have different levels of control over the files contained in the folder to protect against file deletions and other unauthorised modifications. Gain the ability to assign four different access levels to project folders: Viewer, Editor, Full, and Owner.
  • File link expiry & password-protected links
    Set your file link expiry date before sharing a linked document and set passwords to protect your links and access to documents.
  • Egnyte Snapshots available as an add-on (£6.60)
    Allows you to restore your data to a previous state, useful for recovery from ransomware attacks. Snapshot backup schedule: 0-7 days: Every 4 hours (6 snapshots available per day) 8-15 days: Every 12 hours (2 snapshots available per day) 16-30 days: Every 24 hours (1 snapshot available per day)

Access governance

  • Two factor authentication app
    Make your account even more secure using two-step login verification (TSLV). TSLV requires a third piece of information, in addition to your username and password, to log you in. This includes logging in from the web UI, the mobile app, or the desktop app.
  • Strong password policy enforcement
  • Global file access policies

Discovery and classification

  • Not included

Lifecycle management

  • Trash retention
    Up to 180 days

Data controls

  • Encryption in transit (SSL)
    All data transmission, including uploads, downloads, and browsing is encrypted using 256-bit AES protocol
  • Encryption in rest

Threat management

  • Not included

Privacy and compliance

  • Not included

Governed data sources

  • Not included

Help desk

  • Unlimited+ helpdesk support
  • Support desk open between 08:00 - 18:00 Mon - Fri
  • Full ticket management
  • Client portal access
    Our client portal provides two levels of access for different user roles. All employees can use Level 1, which is a basic but effective tool. You can create and view tickets, as well as chat with our support team directly to solve problems faster. Level 2 is for managers or stakeholders who need more functionality, such as requesting new staff, transfers, or terminations; ordering onsite support or hardware; and accessing documents like Cyber Essentials certificates, PI documents, liability insurance certificates, contracts, Microsoft NCE agreements, and more.
  • Service level agreement
  • Monthly reporting

Onsite support

  • Next day onsite support (P2)
    Next day onsite support for tickets escalated from our support team before 13:00 - No callout fee - free for first 60 minutes - saving you £150.00 each time you need an engineer onsite.

Starters, movers & leavers

  • Installation and deployment of patch management, endpoint detection and response apps
  • Basic inventory management
  • Installation & setup of Microsoft 365
  • Configuration of shared calendars
  • Access to OneDrive and SharePoint
  • Hardware procurement and fulfilment
  • Data transfer and email management for leavers
  • Installation of cloud file server
  • Folder permissions and testing
    Folder permissions in Egnyte are a powerful feature that allow us to control who can access, edit, and share your files and folders within your organisation. Our team can set permissions at the folder level, or inherit them from the parent folder. We can also assign different permissions to different groups or users, depending on their roles and needs. Folder permissions help you to protect your data, collaborate efficiently, and comply with security policies.
  • Serial number and warranty management
  • Security awareness gap analysis review
  • Collection and reconditioning of hardware
  • A personal introductory call to introduce the IT helpdesk to explain services and answer questions

Patch management

  • Security patches, bug fixes and feature updates
    Security patches, bug fixes and feature updates are three types of software updates that aim to improve the performance, security and functionality of a software product. Security patches are updates that fix vulnerabilities or flaws in the software that could be exploited by hackers or malicious programs. Bug fixes are updates that resolve errors or glitches in the software that affect its functionality or usability. Feature updates are updates that add new or enhanced features to the software that improve its user experience or capabilities. Whilst these are delivered ad-hoc we make sure that these are rolled out and completed every Wednesday evening, leaving you updated with any compliance.
  • Automated Microsoft patch management
  • Test patches before implementation
  • Vulnerability management
  • ITIL compliance

Remote monitoring & management

  • Drag and drop automation
  • Asset discovery and inventory tracking
  • Attended and unattended support
  • Response automation & self-healing
  • Remote policy deployment
  • Remote software deployment

Endpoint detection & response

  • Next generation EDR anti-virus software
    EDR is a powerful solution that provides comprehensive visibility, detection, and response capabilities across endpoints, networks, and cloud environments. EDR leverages artificial intelligence and machine learning to automatically identify and stop threats in real time, reducing the workload and complexity of security operations. EDR also enables proactive hunting, forensic analysis, and remediation of incidents, enhancing security posture and resilience.
  • Setup, configuration & support
  • Identifying malicious behaviors

Email protection to secure & scale your business

  • Detect phishing and protect in real time with collective threat intelligence and machine learning
  • Secure inbound and encrypted email with full SPF/DKIM/DMARC support
  • Advanced email protection

Your Microsoft Office 365 plan

  • Microsoft 365 Business Standard - Upgrade to 365 Business Premium for £9.36 or Office 365 E3 for £16.50
  • Desktop version of Office apps with premium features
  • Word, Excel, PowerPoint, Teams, Outlook, Exchange, OneDrive, SharePoint, Access & Publisher
  • 1TB of cloud storage per user
  • Business-class email
  • Standard security

Office 365 advanced monitoring & management services

  • Impossible login ticketing & alerting
  • Location lockdown
  • Email forwarding alerts
  • Password expiry notifications
  • Block external inbox rules
  • Monitor admin roles
  • Internal spoofing protection
  • Employee login track & trace
  • License reporting

365 cloud backup

  • Full backup included
  • Calendars, tasks, and attachments backup for both Microsoft 365 and Google Workspace
  • Back up Outlook, OneDrive, SharePoint, Contacts, Calendars, Tasks, Groups & Teams (Microsoft 365)
  • Insights email business intelligence
  • Closes common Office 365 data protection gaps
  • Supports compliance efforts

Microsoft Teams phone system

  • Available as an add-on (£6.60)
    - Teams phone is a cloud-based phone system that integrates with Microsoft 365 and allows you to make and receive calls from anywhere, on any device. - Offering advanced features such as call routing, auto attendants, voicemail, call recording, and analytics, to help you manage your communications more efficiently and professionally. - Enables you to collaborate with your colleagues and customers more easily, by using chat, video, and screen sharing within the same app. - Helps you save money and simplify your IT management, by eliminating the need for separate phone systems and hardware, and by providing a unified security and compliance framework across Microsoft 365. - Supports a wide range of devices and accessories, such as desk phones, headsets, speakers, and conference phones, to suit your preferences and needs.
  • Unlimited domestic calls to landline and mobile (£6.00)

Security awareness training

  • Automated cyber awareness training
  • Onboarding gap analysis testing
  • Training unique to your employees' security weaknesses
  • Building a culture of security with employee progress reporting
  • A GDPR & Cyber Essentials certification requirement
  • Add your own in-house training assessments

Everything you need to measure & reduce phishing vulnerability

  • Automated phishing simulations
  • Ready-made template library
  • Monitor user risk
  • In-depth reporting
  • Seasonal campaigns
  • Managed phishing campaigns

Policy management – fit for compliance

  • Choose 6 essential prewritten polices from a centralised document library
  • Create your own policies
  • Policy version control
  • Automatic policy updates with eSign

Dark web monitoring

  • Detect compromised data
  • Identify what data is exposed
  • Get notified when new breaches are found
  • Encourage secure email and password use

Appropriately supporting staff to ensure they make a positive contribution

  • Client success manager
  • Supportive and active campaigns to encourage participation
  • Direct employee contact

Cyber Essentials certification

  • Available from £995.00 per year or £95.00 per month. Includes £25,000 cyber insurance cover

Email signature management

  • Centrally control the look and feel of email signatures
  • Maintain a consistent brand across business emails
  • Email compliance for GDPR
  • Creative departmental marketing

Egnyte file sharing and collaboration

  • Desktop & mobile apps
    The Desktop App provides fast real-time access to your files and folders stored in the cloud from your computer. Once connected, all content you can access in the cloud will appear in a network drive in Windows Explorer or volume on Mac Finder. You will be able to view all your files and folders in the cloud without having to sync them to your computer first. Furthermore, you'll also be able to select specific folders to be synchronised for access, even when you are offline. Mobile App - Extend the office through your mobile device and work from anywhere with ease. Collaborate seamlessly with internal and external users and boost your organisation’s productivity. The Egnyte mobile app supports iOS and Android platforms for phones and tablets. Access your data, preview files and folders, upload new content, and collaborate through shared folders and file links when you want, wherever you are.
  • 200GB per user up to 10TB
    Additional storage available upon request
  • File size up to 100GB
  • 1-click co-editing in Microsoft Office & Google Workspace
    Native integrations help you centralise content, battle sprawl and maintain file consistency, giving everyone a unified experience. With a single secure source of truth, users get work done in the right application - like M365, Google Workspace, Slack and many industry-unique apps. For peace of mind it safeguards the flow of content across every app your teams use.
  • File and folder sharing
    If you want to share a file with someone without requiring them to log in, send them a link to a specific file. When your colleague clicks on the link, Egnyte will generate a preview of your file. Your partner can review it there or download the file.
  • File versioning and upload links
    Appending file names with indicators like v 2.1 and 2013 03 23 is an inconvenient way to track the iterations of a file and dramatically increases your storage needs. By contrast, Egnyte automatically creates a new version of a file each time a change is saved for an existing document. Your Administrator has set up version policies to dictate how many versions are collected before the old versions are moved to trash. Read on to learn more about file versions and how to "promote" old versions to replace the existing file. Upload links are a great way for people outside your Egnyte account to upload content to a specific shared folder, without being able to see the contents of that folder. Construction companies may need to securely solicit bids from subcontractors, but don't want them to see their competitors’ pricing or a university professor wants a way for students to upload problem sets without peeking at each other's answers. Upload links can solve both of these dilemmas.
  • File and folder templates
    Many organisations repeatedly use the same structure of files or folders in their processes. Your use cases might be different, but to illustrate, we've given a couple of examples below: Company A has a default presentation template that should be used by all employees to keep the branding and messaging consistent externally. Company B works on several projects. Any project should include the same static list of folders due to public regulations. Our file sharing software improves file sharing processes and allows easier management and access to templates.
  • Video playback
    Video files are an increasingly common file type to upload and share. With web UI preview capabilities, a user can see video previews for all formats, not just for formats natively supported for preview in the user’s web browser.
  • Single-step approval workflow
    Review and approval workflows help you get documents reviewed and approved efficiently. You can also assign documents to people to add content, publish, or validate content.
  • Granular sub-folder permissions
    When fellow employees and outside business partners collaborate on a project, you may want collaborators to have different levels of control over the files contained in the folder to protect against file deletions and other unauthorised modifications. Gain the ability to assign four different access levels to project folders: Viewer, Editor, Full, and Owner.
  • File link expiry & password-protected links
    Set your file link expiry date before sharing a linked document and set passwords to protect your links and access to documents.
  • Mobile form filling
    Users who work on PDF files now have the tools for fast and easy editing. It reduces the time needed for file preparation as you can do it on the go within one app. It also reduces the costs of annotations. Individuals, teams, and organisations now have a new way of collaboration using their smartphones and tablets. With mobile form filling, you can fill out forms directly on your mobile device, with support for almost all PDF editable fields (input text, signature, dropdown, checkbox, etc.). The filled-out documents can be edited or previewed at any time. Previewing filled-out documents can also be done through the WebUI - the same document can then be viewed and worked on from multiple devices.
  • Smart local file caching & public cloud file caching (PCC)
    Determine the nearest Smart Cache device using network tests for bandwidth and latency and connect to the appropriate device or the cloud. This ensures users can seamlessly access their files in the most optimal way while moving between offices using the Desktop App. Smart Cache devices are effortlessly monitored and managed in the cloud. IT administrators can remotely check device synchronisation status, authorise user or group access, and perform software upgrades for all registered devices. Smart Cache enables file copying over a UNC path from various devices like network scanners, printers, lab instruments, and drones. This feature caters to situations where the host machines cannot have the Desktop App installed and a UNC path is the only available option to upload files from the device. In SMB collaboration mode, Smart Cache allows users to co-edit Revit files with enabled work sharing. This feature is designed specifically for the AEC industry, enabling real-time collaboration among peer designers working on Revit applications. Multi-User Civil 3D Support: In SMB collaboration mode, Smart Cache allows multiple users to work on single Civil 3D files. This feature allows Civil 3D master file to load cross-reference files faster and thus increasing the performance of the application loading time.
  • Egnyte Snapshots available as an add-on (£6.60)
    Allows you to restore your data to a previous state, useful for recovery from ransomware attacks. Snapshot backup schedule: 0-7 days: Every 4 hours (6 snapshots available per day) 8-15 days: Every 12 hours (2 snapshots available per day) 16-30 days: Every 24 hours (1 snapshot available per day)

Access governance

  • Two factor authentication app
    Make your account even more secure using two-step login verification (TSLV). TSLV requires a third piece of information, in addition to your username and password, to log you in. This includes logging in from the web UI, the mobile app, or the desktop app.
  • Strong password policy enforcement
  • Global file access policies
  • Mobile device control
    The device dashboard shows the full list of devices which have accessed your account. There are two pages: one for personal devices (like smartphones and laptops) and another for storage devices (like Storage Sync and Smart Cache (FKA Turbo). You can remove and remote wipe devices.
  • Desktop device control

Discovery and classification

  • Sensitive content classification
  • Custom classification policies
    Create custom classification policies to classify content by file and path names
  • OCR classification for text in images
    Text is extracted from images, analysed and categorised, helping you to organise your files more efficiently
  • Document type identification
  • Language country support
    Multi-language translation built in

Lifecycle management

  • Trash retention
    Up to 180 days

Data controls

  • Encryption in transit (SSL)
    All data transmission, including uploads, downloads, and browsing is encrypted using 256-bit AES protocol
  • Encryption in rest

Threat management

  • Not included

Privacy and compliance

  • Not included

Governed data sources

  • Not included

Help desk

  • Unlimited++ helpdesk support
  • Helpdesk open between 08:00 - 22:00 Mon - Fri
  • Saturday and Sunday open 10:00 - 17:00
  • Full ticket management
  • Client portal access
    Our client portal provides two levels of access for different user roles. All employees can use Level 1, which is a basic but effective tool. You can create and view tickets, as well as chat with our support team directly to solve problems faster. Level 2 is for managers or stakeholders who need more functionality, such as requesting new staff, transfers, or terminations; ordering onsite support or hardware; and accessing documents like Cyber Essentials certificates, PI documents, liability insurance certificates, contracts, Microsoft NCE agreements, and more.
  • Service level agreement
  • Monthly reporting

Onsite support

  • Next day onsite support (P3)
    Next day onsite support for tickets escalated from our support team before 13:00 - No callout fee - free for first 120 minutes
  • IT manager meetings
    You will have a regular meeting with your assigned IT manager, who will be your trusted partner and advisor for all your IT needs. In these sessions, we will work together to create a strategic plan for your IT infrastructure, address any HR-related issues such as access rights, onboarding and offboarding, and manage any ongoing or upcoming projects. You will get one half-day visit every two months for every 10 users you subscribe to our service.
  • Deskside support
    A regular appointment with your assigned IT manager or technician. During these sessions, your IT manager or technician will provide local support to your users. Deskside support is highly personalised and provides expert support to your designated head of IT. Assistance includes but is not limited to: laptop/desktop rebuilds, personal device assistance, office desk moves, and much more. You will receive 1 half day visit (every two months) per 10 subscribed users.

Starters, movers & leavers

  • Installation and deployment of patch management, endpoint detention and response apps
  • Basic inventory management
  • Installation & setup of Microsoft 365
  • Configuration of shared calendars
  • Access to OneDrive and SharePoint
  • Hardware procurement and fulfilment
  • Data transfer and email management for leavers
  • Installation of cloud file server
  • Folder permissions and testing
    Folder permissions in Egnyte are a powerful feature that allow us to control who can access, edit, and share your files and folders within your organisation. Our team can set permissions at the folder level, or inherit them from the parent folder. We can also assign different permissions to different groups or users, depending on their roles and needs. Folder permissions help you to protect your data, collaborate efficiently, and comply with security policies.
  • Serial number and warranty management
  • Security awareness gap analysis review
  • Collection and reconditioning of hardware
  • A personal introductory call to introduce the IT Helpdesk to explain services and answer questions

Patch management

  • Security patches, bug fixes and feature updates
    Security patches, bug fixes and feature updates are three types of software updates that aim to improve the performance, security and functionality of a software product. Security patches are updates that fix vulnerabilities or flaws in the software that could be exploited by hackers or malicious programs. Bug fixes are updates that resolve errors or glitches in the software that affect its functionality or usability. Feature updates are updates that add new or enhanced features to the software that improve its user experience or capabilities. Whilst these are delivered ad-hoc we make sure that these are rolled out and completed every Wednesday evening, leaving you updated with any compliance.
  • Automated Microsoft patch management
  • Vulnerability management
  • ITIL compliance

Remote monitoring & management

  • Drag and drop automation
  • Asset discovery and inventory tracking
  • Attended and unattended support
  • Response automation & self-healing

Endpoint detection & response

  • Extended detection and response (XDR)
    EDR is a powerful solution that provides comprehensive visibility, detection, and response capabilities across endpoints, networks, and cloud environments. EDR leverages artificial intelligence and machine learning to automatically identify and stop threats in real time, reducing the workload and complexity of security operations. EDR also enables proactive hunting, forensic analysis, and remediation of incidents, enhancing security posture and resilience.
  • Setup, configuration & support
  • Identify malicious behaviors
  • Incident response tooling
  • Insider threat & deception
  • Attack surface management

Email protection to secure & scale your business

  • Detect phishing and protect in real time with collective threat intelligence and machine learing
  • Secure inbound and encrypted email with full SPF/DKIM/DMARC support
  • Advanced email protection

Your Microsoft Office 365 plan

  • Office 365 E3
  • Desktop version of Office apps with Premium features
  • Word, Excel, PowerPoint, Teams, Outlook, Exchange, OneDrive, SharePoint, Access & Publisher
  • 1TB of cloud storage per user
  • Business-class email
  • Attendee registration and reporting tools
  • Manage customer appointments
  • Advanced security
  • Access to data control
  • Threat protection
  • PC and mobile device management
  • Information protection
  • Advanced compliance
  • Advanced analytics

Office 365 advanced monitoring & management services

  • Impossible login ticketing & alerting
  • Location lockdown
  • Email forwarding alerts
  • Password expiry notifications
  • Block external inbox rules
  • Monitor admin roles
  • Internal spoofing protection
  • Employee login track & trace
  • License reporting

365 cloud backup

  • Full backup included
  • Calendars, tasks, and attachments backup for both Microsoft 365 and Google Workspace
  • Back up Outlook, OneDrive, SharePoint, Contacts, Calendars, Tasks, Groups & Teams (Microsoft 365)
  • Insights email business intelligence
  • Closes common Office 365 data protection gaps
  • Supports compliance efforts

Microsoft Teams phone system

  • Teams phone system
    - Teams phone is a cloud-based phone system that integrates with Microsoft 365 and allows you to make and receive calls from anywhere, on any device. - Offering advanced features such as call routing, auto attendants, voicemail, call recording, and analytics, to help you manage your communications more efficiently and professionally. - Enables you to collaborate with your colleagues and customers more easily, by using chat, video, and screen sharing within the same app. - Helps you save money and simplify your IT management, by eliminating the need for separate phone systems and hardware, and by providing a unified security and compliance framework across Microsoft 365. - Supports a wide range of devices and accessories, such as desk phones, headsets, speakers, and conference phones, to suit your preferences and needs.
  • Unlimited domestic calls to landline and mobile (£6.00)

Security awareness training

  • Automated cyber awareness training
  • Onboarding gap analysis testing
    A security awareness gap analysis review is a process of evaluating the current level of security awareness among employees in an organisation. It identifies the strengths and weaknesses of the existing security awareness program, and the areas where improvement is needed. The purpose of the review is to enhance the security culture and behavior of the employees, and to reduce the risk of human error, negligence, or malicious actions that could compromise the confidentiality, integrity, or availability of the organisation's information assets.
  • Training unique to your employees' security weaknesses
    A security awareness gap analysis review is a process of evaluating the current level of security awareness among employees in an organisation. It identifies the strengths and weaknesses of the existing security awareness program, and the areas where improvement is needed. The purpose of the review is to enhance the security culture and behavior of the employees, and to reduce the risk of human error, negligence, or malicious actions that could compromise the confidentiality, integrity, or availability of the organisation's information assets.
  • Build a culture of security with employee progress reporting
  • A GDPR & Cyber Essentials certification requirement
  • Add your own in-house training assessments

Everything you need to measure & reduce phishing vulnerability

  • Automated phishing simulations
  • Ready-made template library
  • Monitor user risk
  • In-depth reporting
  • Seasonal campaigns
  • Managed phishing campaigns
  • Hyper-targeted spear-phishing

Policy management – fit for compliance

  • Choose up to 18 prewritten polices from a centralised document library
  • Create your own policies
  • Policy version control
  • Automatic policy updates with eSign

Dark web monitoring

  • Detection of compromised data
  • Identify what data is exposed
  • Get notified when new breaches are found
  • Encourage secure email and password use

Appropriately supporting staff to ensure they make a positive contribution

  • Client success manager
  • Supportive and active campaigns to encourage participation
  • Direct employee contact

Cyber Essentials certification

  • Identify and address weaknesses in your cybersecurity measures, increasing confidence and trust in your business. Qualify for government contracts and tenders and save on cyber insurance premiums with Cyber Essentials
  • Simply being certified can reduce your cyber risk by up to 98.5%. And, it’s a great way to demonstrate to new customers and partners that you take cybersecurity seriously – helping you grow as well as stay safe.

Email signature management

  • Centrally control the look and feel of email signatures
  • Maintain a consistent brand across business emails
  • Email compliance for GDPR
  • Creative departmental marketing

Egnyte file sharing and collaboration

  • Desktop & mobile apps
    The Desktop App provides fast real-time access to your files and folders stored in the cloud from your computer. Once connected, all content you can access in the cloud will appear in a network drive in Windows Explorer or volume on Mac Finder. You will be able to view all your files and folders in the cloud without having to sync them to your computer first. Furthermore, you'll also be able to select specific folders to be synchronised for access, even when you are offline. Mobile App - Extend the office through your mobile device and work from anywhere with ease. Collaborate seamlessly with internal and external users and boost your organisation’s productivity. The Egnyte mobile app supports iOS and Android platforms for phones and tablets. Access your data, preview files and folders, upload new content, and collaborate through shared folders and file links when you want, wherever you are.
  • 100GB per user up to 10TB
    Additional storage available upon request
  • File size up to 100GB
  • 1-click co-editing in Microsoft Office & Google Workspace
    Native integrations help you centralise content, battle sprawl and maintain file consistency, giving everyone a unified experience. With a single secure source of truth, users get work done in the right application - like M365, Google Workspace, Slack and many industry-unique apps. For peace of mind it safeguards the flow of content across every app your teams use.
  • File and folder sharing
    If you want to share a file with someone without requiring them to log in, send them a link to a specific file. When your colleague clicks on the link, Egnyte will generate a preview of your file. Your partner can review it there or download the file.
  • File versioning and upload links
    Appending file names with indicators like v 2.1 and 2013 03 23 is an inconvenient way to track the iterations of a file and dramatically increases your storage needs. By contrast, Egnyte automatically creates a new version of a file each time a change is saved for an existing document. Your Administrator has set up version policies to dictate how many versions are collected before the old versions are moved to trash. Read on to learn more about file versions and how to "promote" old versions to replace the existing file. Upload links are a great way for people outside your Egnyte account to upload content to a specific shared folder, without being able to see the contents of that folder. Construction companies may need to securely solicit bids from subcontractors, but don't want them to see their competitors’ pricing or a university professor wants a way for students to upload problem sets without peeking at each other's answers. Upload links can solve both of these dilemmas.
  • File and folder templates
    Many organisations repeatedly use the same structure of files or folders in their processes. Your use cases might be different, but to illustrate, we've given a couple of examples below: Company A has a default presentation template that should be used by all employees to keep the branding and messaging consistent externally. Company B works on several projects. Any project should include the same static list of folders due to public regulations. Our file sharing software improves file sharing processes and allows easier management and access to templates.
  • Video playback
    Video files are an increasingly common file type to upload and share. With web UI preview capabilities, a user can see video previews for all formats, not just for formats natively supported for preview in the user’s web browser.
  • Single-step approval workflow
    Review and approval workflows help you get documents reviewed and approved efficiently. You can also assign documents to people to add content, publish, or validate content.Review and approval workflows help you get documents reviewed and approved efficiently. You can also assign documents to people to add content, publish, or validate content.
  • Granular sub-folder permissions
    When fellow employees and outside business partners collaborate on a project, you may want collaborators to have different levels of control over the files contained in the folder to protect against file deletions and other unauthorised modifications. Gain the ability to assign four different access levels to project folders: Viewer, Editor, Full, and Owner.
  • File link expiry & password-protected links
    Set your file link expiry date before sharing a linked document and set passwords to protect your links and access to documents.
  • Mobile form filling
    Users who work on PDF files now have the tools for fast and easy editing. It reduces the time needed for file preparation as you can do it on the go within one app. It also reduces the costs of annotations. Individuals, teams, and organisations now have a new way of collaboration using their smartphones and tablets. With mobile form filling, you can fill out forms directly on your mobile device, with support for almost all PDF editable fields (input text, signature, dropdown, checkbox, etc.). The filled-out documents can be edited or previewed at any time. Previewing filled-out documents can also be done through the WebUI - the same document can then be viewed and worked on from multiple devices.
  • Smart local file caching & public cloud file caching (PCC)
    Determine the nearest Smart Cache device using network tests for bandwidth and latency and connect to the appropriate device or the cloud. This ensures users can seamlessly access their files in the most optimal way while moving between offices using the Desktop App. Smart Cache devices are effortlessly monitored and managed in the cloud. IT administrators can remotely check device synchronisation status, authorise user or group access, and perform software upgrades for all registered devices. Smart Cache enables file copying over a UNC path from various devices like network scanners, printers, lab instruments, and drones. This feature caters to situations where the host machines cannot have the Desktop App installed and a UNC path is the only available option to upload files from the device. In SMB collaboration mode, Smart Cache allows users to co-edit Revit files with enabled work sharing. This feature is designed specifically for the AEC industry, enabling real-time collaboration among peer designers working on Revit applications. Multi-User Civil 3D Support: In SMB collaboration mode, Smart Cache allows multiple users to work on single Civil 3D files. This feature allows Civil 3D master file to load cross-reference files faster and thus increasing the performance of the application loading time.
  • Mobile PDF annotation
    Annotate and fill out PDF files on mobile devices
  • Project folders
    Project folders can be created to assign a specific folder and its contents to a particular project within your organisation. A project can exist for any purpose regardless of industry, but it is most commonly used in architecture, engineering, and construction. By marking a folder as a project folder, a Project name, Project ID, Project description, Project status (active, closed, etc.) and more can be assigned to the folder for richer life-cycle tracking capabilities.
  • Egnyte Snapshots
    Allows you to restore your data to a previous state, useful for recovery from Ransomware attacks. Snapshot backup schedule: 0-7 days: Every 4 hours (6 snapshots available per day) 8-15 days: Every 12 hours (2 snapshots available per day) 16-30 days: Every 24 hours (1 snapshot available per day)

Access governance

  • Two factor authentication app
    Make your account even more secure using two-step login verification (TSLV). TSLV requires a third piece of information, in addition to your username and password, to log you in. This includes logging in from the web UI, the mobile app, or the desktop app.
  • Strong password policy enforcement
  • Global file access policies
  • Mobile device control
    The device dashboard shows the full list of devices which have accessed your account. There are two pages: one for personal devices (like smartphones and laptops) and another for storage devices (like Storage Sync and Smart Cache (FKA Turbo). You can remove and remote wipe devices.
  • Desktop device control
  • Sensitive data access monitoring
    Calculates a risk score for each file and each location on a scale of 1 to 9 based on the type of contained sensitive content. Locations with more files containing more sensitive content will have higher risk scores. For example, a folder containing files with highly sensitive information such as employee national insurance numbers will have higher risk scores, while a folder containing just files with telephone numbers will have lower risk scores.
  • Sensitive data location control
  • Unified folder permissions viewer
    The permissions browser lets you quickly search and find which users and groups have access to which folders. You can also see what permission level they have and who granted the permissions. It makes it easy to see who has access to your sensitive data.
  • Two factor authentication SMS or voice
    Allow SMS or voice call methods for 2FA

Discovery and classification

  • Sensitive content classification
  • Custom classification policies
    Create custom classification policies to classify content by file and path names
  • OCR classification for text in images
    Text is extracted from images, analysed and categorised, helping you to organise your files more efficiently
  • Document type identification
  • Language country support
    Multi-language translation built in

Lifecycle management

  • Trash retention
    Up to 180 days
  • Unified analytics and reporting
  • Custom lifecycle policy creation engine
  • Automated file retention
  • Automated file archiving
  • Automated defensible delete
  • Redundant, obsolete, trivial (ROT) data management

Data controls

  • Encryption in transit (SSL)
    All data transmission, including uploads, downloads, and browsing is encrypted using 256-bit AES protocol
  • Encryption in rest
  • Sensitive content safeguards
  • Secure delivery - specific recipients
    Create links that allow the downloading of encrypted files. A way for link creators to control access to files after they have been downloaded.
  • Secure delivery with encryption
  • Watermarking
    Easily apply watermarks to files viewed through a preview-only file link. Watermarks can be set at any time, regardless of when the file was created.
  • Encryption key management

Threat management

  • Ransomware malware protection
  • Ransomware artifact detection
  • Ransomware alert
  • User individual file recovery
    User individual file recovery protects you from the Crypto virus, a type of ransomware that encrypts files stored on your local or network drive so that they are effectively inaccessible to you. Once your files are encrypted, it then offers to decrypt the data if a ransom is paid. The ransomware can be particularly troublesome once the encrypted data syncs to the cloud and down to other user devices. Our solution monitors content sources and provides early detection of ransomware. In fact, your files can be restored to their original state. While we’ve had 100% success rate in restoring customer’s data to date, the continued evolution of this ransomware is a risk for potential data loss.
  • Antivirus scan on all uploads
    Keeping your data safe and private is of utmost concern to us. We've utilised a range of security and encryption techniques to ensure that your data is secure. We use encryption techniques on all access routes. All data transmission, including uploads, downloads, and browsing is encrypted using 256-bit AES protocol. Passwords stored locally and in the Cloud are always encrypted, and your data at rest is encrypted. Browser access is just as safe as conducting a banking transaction. No data can be hacked or intercepted, owing to the encryption used.
  • Support services file recovery
  • Enhanced malware protection
    Strong malware protection capabilities prevent your domain from becoming a conduit for spreading malware in your organisation. Scan all data uploaded via any channel to your domain for malware. Scans are performed asynchronously after a file is uploaded to your domain. Files identified to contain malware are quarantined and available to your administrator. Any synced copies of the file are also deleted to protect your endpoint, storage sync and smart cache devices.
  • Security issue alerting
  • Unusual user behaviour detection
  • Suspicious login detection

Privacy and compliance

  • HIPAA compliant storage
    Maintain compliance with the strictest standards to ensure privacy and data protection. Gain complete control over where the data resides. This is particularly useful for those in highly-regulated industries (e.g. financial services, healthcare) and regulatory environments, such as the EU. We understand the importance of confidentiality and protection of an individual's protected health information (PHI). Comprehensive data security enables HIPAA compliance for payer, provider, pharmaceutical and biomedical businesses.
  • FINRA compliant storage
    FINRA-compliant online storage solution with complete end-to-end data protection. Enables full compliance under SEC 17a, 31a, 204 recordkeeping regulations for confidential data storage, retention, digitalisation and accessibility.
  • SOC2 compliant storage
    SOC 2 SSAE 18 Type 2 compliant storage ensures that your data is securely managed to protect the interests of your organisation and the privacy of all clients. This is supported by a SOC 2 attestation report issued by an independent auditor whose role is to assess our compliance within selected trust services categories.
  • GDPR UK data residency
  • ISO/IEC 27001 compliant storage
    For customers that need to comply with the minimum cybersecurity standards set by DFARS, you need the necessary controls in place to meet the NIST 800-171 requirements through the implementation of the ISO27001 controls. Our information security management system is ISO/IEC 27001:2013 certified. This certification is the leading global information security standard, and it outlines the policies and controls that organisations put in place to manage risk and secure their data.
  • Audit reporting
  • Legal hold
    A legal hold retains content related to a legal matter, securing all files created by selected users (referred to as custodians) within the specified date range. Typically, legal holds occur when litigation is pending or anticipated, when your organisation is subject to a government investigation or internal audits, or when any other matter forces your company to hold on to its records.
  • Breach reporting
    When the subject requests a summary of information collected about them, an Admin should submit a Notification SAR. The workflow notifies Administrators about completed requests, which can be inspected and exported. When a subject requests deletion of personal information collected about them, an Admin should submit a Right-to-be-Forgotten SAR. The workflow gives Administrators a one-click deletion option after the request is completed.
  • Subject access request workflow
  • Banking and financial compliance patterns
  • Healthcare compliance patterns
  • European compliance patterns

Governed data sources

  • Egnyte cloud
  • Connected desktop folders
  • Windows file server
  • Microsoft 365
  • Google Workshop
  • Box

Help desk

  • Unlimited++ helpdesk support
  • Helpdesk open between 08:00 - 22:00 Mon - Fri
  • Saturday and Sunday opening, 10:00 - 17:00
  • Full ticket management
  • Client portal access
    Our client portal provides two levels of access for different user roles. All employees can use Level 1, which is a basic but effective tool. You can create and view tickets, as well as chat with our support team directly to solve problems faster. Level 2 is for managers or stakeholders who need more functionality, such as requesting new staff, transfers, or terminations; ordering onsite support or hardware; and accessing documents like Cyber Essentials certificates, PI documents, liability insurance certificates, contracts, Microsoft NCE agreements, and more.
  • Service level agreement
  • Monthly reporting

Onsite support

  • Next day onsite support (P4)
    Next day onsite support for tickets escalated from our support team before 13:00 - No callout fee - free for first 480 minutes
  • IT manager meetings
    You will have a regular meeting with your assigned IT manager, who will be your trusted partner and advisor for all your IT needs. In these sessions, we will work together to create a strategic plan for your IT infrastructure, address any HR-related issues such as access rights, onboarding and offboarding, and manage any ongoing or upcoming projects. You will get one half-day visit every two months for every 10 users you subscribe to our service.
  • Deskside support
    A regular appointment with your assigned IT manager or technician. During these sessions, your IT manager or technician will provide local support to your users. Deskside support is highly personalised and provides expert support to your designated head of IT. Assistance includes but is not limited to: laptop/desktop rebuilds, personal device assistance, office desk moves, and much more. You will receive 1 half day visit (every two months) per 10 subscribed users.

Starters, movers & leavers

  • Installation and deployment of patch management, endpoint detention and response apps
  • Basic inventory management
  • Installation & setup of Microsoft 365
  • Configuration of shared calendars
  • Access to OneDrive and SharePoint
  • Hardware procurement and fulfilment
  • Data transfer and email management for leavers
  • Installation of cloud file server
  • Folder permissions and testing
    Folder permissions in Egnyte are a powerful feature that allow us to control who can access, edit, and share your files and folders within your organisation. Our team can set permissions at the folder level, or inherit them from the parent folder. We can also assign different permissions to different groups or users, depending on their roles and needs. Folder permissions help you to protect your data, collaborate efficiently, and comply with security policies.
  • Serial number and warranty management
  • Security awareness gap analysis
  • Collection and reconditioning of hardware
  • A personal introductory call to introduce the IT Helpdesk to explain services and answer questions

Patch management

  • Security patches, bug fixes and feature updates
    Security patches, bug fixes and feature updates are three types of software updates that aim to improve the performance, security and functionality of a software product. Security patches are updates that fix vulnerabilities or flaws in the software that could be exploited by hackers or malicious programs. Bug fixes are updates that resolve errors or glitches in the software that affect its functionality or usability. Feature updates are updates that add new or enhanced features to the software that improve its user experience or capabilities. Whilst these are delivered ad-hoc we make sure that these are rolled out and completed every Wednesday evening, leaving you updated with any compliance.
  • Automated Microsoft patch management
  • Vulnerability management
  • ITIL compliance

Remote monitoring & management

  • Drag and drop automation
  • Asset discovery and inventory tracking
  • Attended and unattended support
  • Response automation & self-healing

Endpoint detection & response

  • Extended detection and response (XDR)
    EDR is a powerful solution that provides comprehensive visibility, detection, and response capabilities across endpoints, networks, and cloud environments. EDR leverages artificial intelligence and machine learning to automatically identify and stop threats in real time, reducing the workload and complexity of security operations. EDR also enables proactive hunting, forensic analysis, and remediation of incidents, enhancing security posture and resilience.
  • Setup, configuration & support
  • Identifying malicious behaviors
  • Incident response tooling
  • Insider threat & deception
  • Attack surface management

Email protection to secure & scale your business

  • Detect phishing and protect in real time with collective threat intelligence and machine learning
  • Secure inbound and encrypted email with full SPF/DKIM/DMARC support
  • Provide advanced email protection

Your Microsoft Office 365 plan

  • Office 365 E3
  • Desktop version of Office apps with premium features
  • Word, Excel, PowerPoint, Teams, Outlook, Exchange, OneDrive, SharePoint, Access & Publisher
  • 1TB of cloud storage per user
  • Business-class email
  • Attendee registration and reporting tools
  • Manage customer appointments
  • Advanced security
  • Access to data control
  • Threat protection
  • PC and mobile device management
  • Information protection
  • Advanced compliance
  • Advanced analytics

Office 365 advanced monitoring & management services

  • Impossible login ticketing & alerting
  • Location lockdown
  • Email forwarding alerts
  • Password expiry notifications
  • Block external inbox rules
  • Monitor admin roles
  • Internal spoofing protection
  • Employee login track & trace
  • License reporting

365 cloud backup

  • Full backup included
  • Calendars, tasks, and attachments backup for both Microsoft 365 and Google Workspace
  • Back up Outlook, OneDrive, SharePoint, Contacts, Calendars, Tasks, Groups & Teams (Microsoft 365)
  • Insights email business intelligence
  • Closes common Office 365 data protection gaps
  • Supports compliance efforts

Microsoft Teams phone system

  • Teams phone system
    - Teams phone is a cloud-based phone system that integrates with Microsoft 365 and allows you to make and receive calls from anywhere, on any device. - Offering advanced features such as call routing, auto attendants, voicemail, call recording, and analytics, to help you manage your communications more efficiently and professionally. - Enables you to collaborate with your colleagues and customers more easily, by using chat, video, and screen sharing within the same app. - Helps you save money and simplify your IT management, by eliminating the need for separate phone systems and hardware, and by providing a unified security and compliance framework across Microsoft 365. - Supports a wide range of devices and accessories, such as desk phones, headsets, speakers, and conference phones, to suit your preferences and needs.
  • Unlimited domestic calls to landline and mobile (£6.00)

Security awareness training

  • Automated cyber awareness training
  • Onboarding gap analysis testing
    A security awareness gap analysis review is a process of evaluating the current level of security awareness among employees in an organisation. It identifies the strengths and weaknesses of the existing security awareness program, and the areas where improvement is needed. The purpose of the review is to enhance the security culture and behavior of the employees, and to reduce the risk of human error, negligence, or malicious actions that could compromise the confidentiality, integrity, or availability of the organisation's information assets.
  • Training unique to your employees' security weaknesses
  • Building a culture of security with employee progress reporting
  • A GDPR & Cyber Essentials certification requirement
  • Add your own in-house training assessments

Everything you need to measure & reduce phishing vulnerability

  • Automated phishing simulations
  • Ready-made template library
  • Monitor user risk
  • In-depth reporting
  • Seasonal campaigns
  • Managed phishing campaigns

Policy management – fit for compliance

  • Full library of prewritten polices from a centralised document library
  • Create your own policies
  • Policy version control
  • Automatic policy updates with eSign

Dark web monitoring

  • Detect compromised data
  • Identify what data is exposed
  • Get notified when new breaches are found
  • Encourage secure email and password use

Appropriately supporting staff to ensure they make a positive contribution

  • Client success manager
  • Supportive and active campaigns to encourage participation
  • Direct employee contact

Cyber Essentials certification

  • Identify and address weaknesses in your cybersecurity measures, increasing confidence and trust in your business. Qualify for government contracts and tenders and save on cyber insurance premiums with Cyber Essentials
  • Simply being certified can reduce your cyber risk by up to 98.5%. And, it’s a great way to demonstrate to new customers and partners that you take cybersecurity seriously – helping you grow as well as stay safe.
  • Like CE, Cyber Essentials Plus covers everything your business should do to protect itself from 98.5% of cyberattacks. But, there’s one key difference:
  • Cyber Essentials Plus also includes an independent assessment carried out by one of our licensed auditors. This gives you complete peace of mind that your cybersecurity is up to scratch.

Email signature management

  • Centrally control the look and feel of email signatures
  • Maintain a consistent brand across business emails
  • Email compliance for GDPR
  • Creative departmental marketing

Egnyte file sharing and collaboration

  • Desktop & mobile apps
    The Desktop App provides fast real-time access to your files and folders stored in the cloud from your computer. Once connected, all content you can access in the cloud will appear in a network drive in Windows Explorer or volume on Mac Finder. You will be able to view all your files and folders in the cloud without having to sync them to your computer first. Furthermore, you'll also be able to select specific folders to be synchronised for access, even when you are offline. Mobile App - Extend the office through your mobile device and work from anywhere with ease. Collaborate seamlessly with internal and external users and boost your organisation’s productivity. The Egnyte mobile app supports iOS and Android platforms for phones and tablets. Access your data, preview files and folders, upload new content, and collaborate through shared folders and file links when you want, wherever you are.
  • 100GB per user up to 10TB
    Additional storage available upon request
  • File size up to 100GB
  • 1-click co-editing in Microsoft Office & Google Workspace
    Native integrations help you centralise content, battle sprawl and maintain file consistency, giving everyone a unified experience. With a single secure source of truth, users get work done in the right application - like M365, Google Workspace, Slack and many industry-unique apps. For peace of mind it safeguards the flow of content across every app your teams use.
  • File and folder sharing
    If you want to share a file with someone without requiring them to log in, send them a link to a specific file. When your colleague clicks on the link, Egnyte will generate a preview of your file. Your partner can review it there or download the file.
  • File versioning and upload links
    Appending file names with indicators like v 2.1 and 2013 03 23 is an inconvenient way to track the iterations of a file and dramatically increases your storage needs. By contrast, Egnyte automatically creates a new version of a file each time a change is saved for an existing document. Your Administrator has set up version policies to dictate how many versions are collected before the old versions are moved to trash. Read on to learn more about file versions and how to "promote" old versions to replace the existing file. Upload links are a great way for people outside your Egnyte account to upload content to a specific shared folder, without being able to see the contents of that folder. Construction companies may need to securely solicit bids from subcontractors, but don't want them to see their competitors’ pricing or a university professor wants a way for students to upload problem sets without peeking at each other's answers. Upload links can solve both of these dilemmas.
  • File and folder templates
    Many organisations repeatedly use the same structure of files or folders in their processes. Your use cases might be different, but to illustrate, we've given a couple of examples below: Company A has a default presentation template that should be used by all employees to keep the branding and messaging consistent externally. Company B works on several projects. Any project should include the same static list of folders due to public regulations. Our file sharing software improves file sharing processes and allows easier management and access to templates.
  • Video playback
    Video files are an increasingly common file type to upload and share. With web UI preview capabilities, a user can see video previews for all formats, not just for formats natively supported for preview in the user’s web browser.
  • Single-step approval workflow
    Review and approval workflows help you get documents reviewed and approved efficiently. You can also assign documents to people to add content, publish, or validate content.Review and approval workflows help you get documents reviewed and approved efficiently. You can also assign documents to people to add content, publish, or validate content.
  • Granular sub-folder permissions
    When fellow employees and outside business partners collaborate on a project, you may want collaborators to have different levels of control over the files contained in the folder to protect against file deletions and other unauthorised modifications. Gain the ability to assign four different access levels to project folders: Viewer, Editor, Full, and Owner.
  • Smart local file caching & public cloud file caching (PCC)
    Set your file link expiry date before sharing a linked document and set passwords to protect your links and access to documents.
  • Mobile form filling
    Users who work on PDF files now have the tools for fast and easy editing. It reduces the time needed for file preparation as you can do it on the go within one app. It also reduces the costs of annotations. Individuals, teams, and organisations now have a new way of collaboration using their smartphones and tablets. With mobile form filling, you can fill out forms directly on your mobile device, with support for almost all PDF editable fields (input text, signature, dropdown, checkbox, etc.). The filled-out documents can be edited or previewed at any time. Previewing filled-out documents can also be done through the WebUI - the same document can then be viewed and worked on from multiple devices.
  • Smart local file caching & public cloud file caching (PCC)
    Determine the nearest Smart Cache device using network tests for bandwidth and latency and connect to the appropriate device or the cloud. This ensures users can seamlessly access their files in the most optimal way while moving between offices using the Desktop App. Smart Cache devices are effortlessly monitored and managed in the cloud. IT administrators can remotely check device synchronisation status, authorise user or group access, and perform software upgrades for all registered devices. Smart Cache enables file copying over a UNC path from various devices like network scanners, printers, lab instruments, and drones. This feature caters to situations where the host machines cannot have the Desktop App installed and a UNC path is the only available option to upload files from the device. In SMB collaboration mode, Smart Cache allows users to co-edit Revit files with enabled work sharing. This feature is designed specifically for the AEC industry, enabling real-time collaboration among peer designers working on Revit applications. Multi-User Civil 3D Support: In SMB collaboration mode, Smart Cache allows multiple users to work on single Civil 3D files. This feature allows Civil 3D master file to load cross-reference files faster and thus increasing the performance of the application loading time.
  • Mobile PDF annotation
    Annotate and fill out PDF files on mobile devices
  • Project folders
    Project folders can be created to assign a specific folder and its contents to a particular project within your organisation. A project can exist for any purpose regardless of industry, but it is most commonly used in architecture, engineering, and construction. By marking a folder as a project folder, a Project name, Project ID, Project description, Project status (active, closed, etc.) and more can be assigned to the folder for richer life-cycle tracking capabilities.
  • Egnyte Snapshots
    Allows you to restore your data to a previous state, useful for recovery from ransomware attacks. Snapshot backup schedule: 0-7 days: Every 4 hours (6 snapshots available per day) 8-15 days: Every 12 hours (2 snapshots available per day) 16-30 days: Every 24 hours (1 snapshot available per day)

Access governance

  • Two factor authentication app
    Make your account even more secure using two-step login verification (TSLV). TSLV requires a third piece of information, in addition to your username and password, to log you in. This includes logging in from the web UI, the mobile app, or the desktop app.
  • Strong password policy enforcement
  • Global file access policies
  • Mobile device control
    The device dashboard shows the full list of devices which have accessed your account. There are two pages: one for personal devices (like smartphones and laptops) and another for storage devices (like Storage Sync and Smart Cache (FKA Turbo). You can remove and remote wipe devices.
  • Desktop device control
  • Sensitive data access monitoring
    Calculates a risk score for each file and each location on a scale of 1 to 9 based on the type of contained sensitive content. Locations with more files containing more sensitive content will have higher risk scores. For example, a folder containing files with highly sensitive information such as employee national insurance numbers will have higher risk scores, while a folder containing just files with telephone numbers will have lower risk scores.
  • Sensitive data location control
    The permissions browser lets you quickly search and find which users and groups have access to which folders. You can also see what permission level they have and who granted the permissions. It makes it easy to see who has access to your sensitive data.
  • Unified folder permissions viewer
    The permissions browser lets you quickly search and find which users and groups have access to which folders. You can also see what permission level they have and who granted the permissions. It makes it easy to see who has access to your sensitive data.
  • Two factor authentication SMS or voice
    Allow SMS or voice call methods for 2FA

Discovery and classification

  • Sensitive content classification
  • Custom classification policies
    Create custom classification policies to classify content by file and path names
  • OCR classification for text in images
    Text is extracted from images, analysed and categorised, helping you to organise your files more efficiently
  • Document type identification
  • Language country support
    Multi-language translation built in

Lifecycle management

  • Trash retention
    Up to 180 days
  • Unified analytics and reporting
  • Custom lifecycle policy creation engine
  • Automated file retention
  • Automated file archiving
  • Automated defensible delete
  • Redundant, obsolete, trivial (ROT) data management

Data controls

  • Encryption in transit (SSL)
    All data transmission, including uploads, downloads, and browsing is encrypted using 256-bit AES protocol
  • Encryption in rest
  • Sensitive content safeguards
  • Secure delivery - specific recipients
    Create links that allow the downloading of encrypted files. A way for link creators to control access to files after they have been downloaded.
  • Secure delivery with encryption
  • Watermarking
    Easily apply watermarks to files viewed through a preview-only file link. Watermarks can be set at any time, regardless of when the file was created.
  • Encryption key management

Threat management

  • Ransomware malware protection
  • Ransomware artifact detection
  • Ransomware alert
  • User individual file recovery
    User individual file recovery protects you from the Crypto virus, a type of ransomware that encrypts files stored on your local or network drive so that they are effectively inaccessible to you. Once your files are encrypted, it then offers to decrypt the data if a ransom is paid. The ransomware can be particularly troublesome once the encrypted data syncs to the cloud and down to other user devices. Our solution monitors content sources and provides early detection of ransomware. In fact, your files can be restored to their original state. While we’ve had 100% success rate in restoring customer’s data to date, the continued evolution of this ransomware is a risk for potential data loss.
  • Antivirus scan on all uploads
    Keeping your data safe and private is of utmost concern to us. We've utilised a range of security and encryption techniques to ensure that your data is secure. We use encryption techniques on all access routes. All data transmission, including uploads, downloads, and browsing is encrypted using 256-bit AES protocol. Passwords stored locally and in the Cloud are always encrypted, and your data at rest is encrypted. Browser access is just as safe as conducting a banking transaction. No data can be hacked or intercepted, owing to the encryption used.
  • Support services file recovery
  • Enhanced malware protection
    Strong malware protection capabilities prevent your domain from becoming a conduit for spreading malware in your organisation. Scan all data uploaded via any channel to your domain for malware. Scans are performed asynchronously after a file is uploaded to your domain. Files identified to contain malware are quarantined and available to your administrator. Any synced copies of the file are also deleted to protect your endpoint, storage sync and smart cache devices.
  • Security issue alerting
  • Unusual user behaviour detection
  • Suspicious login detection

Privacy and compliance

  • HIPAA compliant storage
    Maintain compliance with the strictest standards to ensure privacy and data protection. Gain complete control over where the data resides. This is particularly useful for those in highly-regulated industries (e.g. financial services, healthcare) and regulatory environments, such as the EU. We understand the importance of confidentiality and protection of an individual's protected health information (PHI). Comprehensive data security enables HIPAA compliance for payer, provider, pharmaceutical and biomedical businesses.
  • FINRA compliant storage
    FINRA-compliant online storage solution with complete end-to-end data protection. Enables full compliance under SEC 17a, 31a, 204 recordkeeping regulations for confidential data storage, retention, digitalisation and accessibility.
  • SOC2 compliant storage
    SOC 2 SSAE 18 Type 2 compliant storage ensures that your data is securely managed to protect the interests of your organisation and the privacy of all clients. This is supported by a SOC 2 attestation report issued by an independent auditor whose role is to assess our compliance within selected trust services categories.
  • GDPR EU data residency
  • ISO/IEC 27001 compliant storage
  • Audit reporting
  • Legal hold
    A legal hold retains content related to a legal matter, securing all files created by selected users (referred to as custodians) within the specified date range. Typically, legal holds occur when litigation is pending or anticipated, when your organisation is subject to a government investigation or internal audits, or when any other matter forces your company to hold on to its records.
  • Breach reporting
    When the subject requests a summary of information collected about them, an Admin should submit a Notification SAR. The workflow notifies Administrators about completed requests, which can be inspected and exported. When a subject requests deletion of personal information collected about them, an Admin should submit a Right-to-be-Forgotten SAR. The workflow gives Administrators a one-click deletion option after the request is completed.
  • Audit reporting
  • Legal hold
    A legal hold retains content related to a legal matter, securing all files created by selected users (referred to as custodians) within the specified date range. Typically, legal holds occur when litigation is pending or anticipated, when your organisation is subject to a government investigation or internal audits, or when any other matter forces your company to hold on to its records.
  • Breach reporting
    When the subject requests a summary of information collected about them, an Admin should submit a Notification SAR. The workflow notifies Administrators about completed requests, which can be inspected and exported. When a subject requests deletion of personal information collected about them, an Admin should submit a Right-to-be-Forgotten SAR. The workflow gives Administrators a one-click deletion option after the request is completed.
  • Subject access request workflow
  • Banking and financial compliance patterns
  • Healthcare compliance patterns
  • European compliance patterns

Governed data sources

  • Egnyte cloud
  • Connected desktop folders
  • Windows file server
  • Microsoft 365
  • Google Workshop
  • Box

Help desk

  • 120 minutes of helpdesk support per user per annum - pooled
  • Support desk open between 09:00 - 17:00 Mon - Fri
  • Full ticket management

Onsite support

  • Not included

Starters, movers & leavers

  • Installation and deployment of patch management, endpoint detention and response apps
  • Basic inventory management
  • Installation & setup of Microsoft 365
  • Access to OneDrive and SharePoint
  • Hardware procurement and fulfilment
  • Data transfer and email management for leavers

Patch management

  • Security patches, bug fixes and feature updates
    Security patches, bug fixes and feature updates are three types of software updates that aim to improve the performance, security and functionality of a software product. Security patches are updates that fix vulnerabilities or flaws in the software that could be exploited by hackers or malicious programs. Bug fixes are updates that resolve errors or glitches in the software that affect its functionality or usability. Feature updates are updates that add new or enhanced features to the software that improve its user experience or capabilities. Whilst these are delivered ad-hoc we make sure that these are rolled out and completed every Wednesday evening, leaving you updated with any compliance.
  • Automated Microsoft patch management

Remote monitoring & management

  • Drag and drop automation
  • Asset discovery and inventory tracking
  • Attended and unattended support
  • Response automation & self-healing
  • Remote policy deployment

Endpoint detection & response

  • Next generation EDR anti-virus software
    EDR is a powerful solution that provides comprehensive visibility, detection, and response capabilities across endpoints, networks, and cloud environments. EDR leverages artificial intelligence and machine learning to automatically identify and stop threats in real time, reducing the workload and complexity of security operations. EDR also enables proactive hunting, forensic analysis, and remediation of incidents, enhancing security posture and resilience.
  • Setup, configuration & support
  • Identifying malicious behaviours

Email protection to secure & scale your business

  • Detect phishing and protect in real time with collective threat intelligence and machine learning
  • Secure inbound and encrypted email with full SPF/DKIM/DMARC support
  • Advanced email protection

Your Microsoft Office 365 plan

  • Microsoft 365 Business Standard - Upgrade to 365 Business Premium for £9.36 or Office 365 E3 for £16.50
  • Desktop versions of Office apps with premium features
  • Word, Excel, PowerPoint, Teams, Outlook, Exchange, OneDrive, SharePoint, Access & Publisher
  • 1TB of cloud storage per user
  • Business-class email
  • Standard security

Office 365 advanced monitoring & management services

  • Impossible login ticketing & alerting
  • Location lockdown
  • Email forwarding alerts
  • Password expiry notifications
  • Block external inbox rules
  • Monitor admin roles
  • Internal spoofing protection

365 cloud backup

  • Full backup
  • Calendars, tasks, and attachments backup for both Microsoft 365 and Google Workspace
  • Insights email business intelligence
  • Closes common Office 365 data protection gaps
  • Supports compliance efforts

Microsoft Teams phone system

  • Available as an add-on (£6.60)
    - Teams phone is a cloud-based phone system that integrates with Microsoft 365 and allows you to make and receive calls from anywhere, on any device. - Offering advanced features such as call routing, auto attendants, voicemail, call recording, and analytics, to help you manage your communications more efficiently and professionally. - Enables you to collaborate with your colleagues and customers more easily, by using chat, video, and screen sharing within the same app. - Helps you save money and simplify your IT management, by eliminating the need for separate phone systems and hardware, and by providing a unified security and compliance framework across Microsoft 365. - Supports a wide range of devices and accessories, such as desk phones, headsets, speakers, and conference phones, to suit your preferences and needs.
  • Unlimited domestic calls to landline and mobile (£6.00)

Security awareness training

  • Not included

Everything you need to measure & reduce phishing vulnerability

  • Not included

Policy management – fit for compliance

  • Not included

Dark web monitoring

  • Not included

Appropriately supporting staff to ensure they make a positive contribution

  • Not included

Cyber Essentials certification

  • Available from £995.00 per year or £95.00 per month. Includes £25,000 cyber insurance cover

Email signature management

  • Not included

Egnyte file sharing and collaboration

  • Not included

Access governance

  • Two factor authentication app
    Make your account even more secure using two-step login verification (TSLV). TSLV requires a third piece of information, in addition to your username and password, to log you in. This includes logging in from the web UI, the mobile app, or the desktop app.
  • Strong password policy enforcement

Discovery and classification

  • Not included

Lifecycle management

  • Not included

Data controls

  • Not included

Threat management

  • Not included

Privacy and compliance

  • Not included

Governed data sources

  • Not included

Help desk

  • Unlimited helpdesk support
  • Helpdesk open between 08:00 - 18:00 Mon - Fri
  • Full ticket management
  • Client portal access
    Our client portal provides two levels of access for different user roles. All employees can use Level 1, which is a basic but effective tool. You can create and view tickets, as well as chat with our support team directly to solve problems faster. Level 2 is for managers or stakeholders who need more functionality, such as requesting new staff, transfers, or terminations; ordering onsite support or hardware; and accessing documents like Cyber Essentials certificates, PI documents, liability insurance certificates, contracts, Microsoft NCE agreements, and more.
  • Service level agreement

Onsite support

  • Next day onsite support (P1)
    Next day onsite support for tickets escalated from our support team before 13:00 - 50% discount on callout fee - saving you £75.00 on your first onsite hour.

Starters, movers & leavers

  • Installation and deployment of patch management, endpoint detention and response apps
  • Basic inventory management
  • Installation & setup of Microsoft 365
  • Access to OneDrive and SharePoint
  • Hardware procurement and fulfilment
  • Data transfer and email management for leavers
  • Installation of cloud file server
  • Folder permissions and testing
    Folder permissions in Egnyte are a powerful feature that allow us to control who can access, edit, and share your files and folders within your organisation. Our team can set permissions at the folder level, or inherit them from the parent folder. We can also assign different permissions to different groups or users, depending on their roles and needs. Folder permissions help you to protect your data, collaborate efficiently, and comply with security policies.
  • Serial number and warranty management
  • Security awareness gap analysis review
  • Collection and reconditioning of hardware

Patch management

  • Security patches, bug fixes and feature updates
    Security patches, bug fixes and feature updates are three types of software updates that aim to improve the performance, security and functionality of a software product. Security patches are updates that fix vulnerabilities or flaws in the software that could be exploited by hackers or malicious programs. Bug fixes are updates that resolve errors or glitches in the software that affect its functionality or usability. Feature updates are updates that add new or enhanced features to the software that improve its user experience or capabilities. Whilst these are delivered ad-hoc we make sure that these are rolled out and completed every Wednesday evening, leaving you updated with any compliance.
  • Automated Microsoft patch management
  • Test patches before implementation
  • Vulnerability management
  • ITIL compliance

Remote monitoring & management

  • Drag and drop automation
  • Asset discovery and inventory tracking
  • Attended and unattended support
  • Response automation & self-healing
  • Remote policy deployment
  • Remote software deployment

Endpoint detection & response

  • Next generation EDR anti-virus software
    EDR is a powerful solution that provides comprehensive visibility, detection, and response capabilities across endpoints, networks, and cloud environments. EDR leverages artificial intelligence and machine learning to automatically identify and stop threats in real time, reducing the workload and complexity of security operations. EDR also enables proactive hunting, forensic analysis, and remediation of incidents, enhancing security posture and resilience.
  • Setup, configuration & support
  • Identifying malicious behaviors

Email protection to secure & scale your business

  • Detect phishing and protect in real time with collective threat intelligence and machine learing
  • Secure inbound and encrypted email with full SPF/DKIM/DMARC support
  • Advanced email protection

Your Microsoft Office 365 plan

  • Microsoft 365 Business Standard - Upgrade to 365 Business Premium for £9.36 or Office 365 E3 for £16.50
  • Desktop versions of Office apps with premium features
  • Word, Excel, PowerPoint, Teams, Outlook, Exchange, OneDrive, SharePoint, Access & Publisher
  • 1TB of cloud storage per user
  • Business-class email
  • Standard security
  • Attendee registration and reporting tools
  • Manage customer appointments

Office 365 advanced monitoring & management services

  • Impossible login ticketing & alerting
  • Location lockdown
  • Email forwarding alerts
  • Password expiry notifications
  • Block external inbox rules
  • Monitor admin roles
  • Internal spoofing protection
  • Employee login track & trace
  • License reporting

365 cloud backup

  • Full backup
  • Calendars, tasks, and attachments backup for both Microsoft 365 and Google Workspace
  • Insights email business intelligence
  • Closes common Office 365 data protection gaps
  • Supports compliance efforts

Microsoft Teams phone system

  • Available as an add-on (£6.60)
    - Teams phone is a cloud-based phone system that integrates with Microsoft 365 and allows you to make and receive calls from anywhere, on any device. - Offering advanced features such as call routing, auto attendants, voicemail, call recording, and analytics, to help you manage your communications more efficiently and professionally. - Enables you to collaborate with your colleagues and customers more easily, by using chat, video, and screen sharing within the same app. - Helps you save money and simplify your IT management, by eliminating the need for separate phone systems and hardware, and by providing a unified security and compliance framework across Microsoft 365. - Supports a wide range of devices and accessories, such as desk phones, headsets, speakers, and conference phones, to suit your preferences and needs.
  • Unlimited domestic calls to landline and mobile (£6.00)

Security awareness training

  • Automated cyber awareness training
  • Onboarding gap analysis testing
    A security awareness gap analysis review is a process of evaluating the current level of security awareness among employees in an organisation. It identifies the strengths and weaknesses of the existing security awareness program, and the areas where improvement is needed. The purpose of the review is to enhance the security culture and behavior of the employees, and to reduce the risk of human error, negligence, or malicious actions that could compromise the confidentiality, integrity, or availability of the organisation's information assets.
  • Training unique to your employees' security weaknesses
  • Building a culture of security with employee progress reporting
  • A GDPR & Cyber Essentials certification requirement

Everything you need to measure & reduce phishing vulnerability

  • Automated phishing simulations
  • Ready-made template library
  • Monitor user risk
  • In-depth reporting
  • Weekly summary reports

Policy management – fit for compliance

  • Available as an add-on (£2.00)
  • Centralised document library
  • Choose up to 3 pre-written IT polices from a centralised document library
    The security of your systems depends on the safe behavior of your staff. You need to establish and communicate clear guidelines for preventing or reducing security incidents. This is not only a legal requirement, but also a way to protect your business, your staff and your clients. You should also have a cybersecurity staff handbook that explains the rules and expectations for your staff, and have them sign it as part of their training.
  • Create your own policies
  • Policy version control
  • Automatic policy updates with eSign

Dark web monitoring

  • Detection of compromised data
  • Identify what data is exposed
  • Get notified when new breaches are found
  • Encourage secure email and password use

Appropriately supporting staff to ensure they make a positive contribution

  • Not included

Cyber Essentials certification

  • Available from £995.00 per year or £95.00 per month. Includes £25,000 cyber insurance cover

Email signature management

  • Not included

Egnyte file sharing and collaboration

  • Egnyte Cloud File Server (CFS)
    Egnyte's entry level cloud server offering
  • Desktop & mobile apps
    The Desktop App provides fast real-time access to your files and folders stored in the cloud from your computer. Once connected, all content you can access in the cloud will appear in a network drive in Windows Explorer or volume on Mac Finder. You will be able to view all your files and folders in the cloud without having to sync them to your computer first. Furthermore, you'll also be able to select specific folders to be synchronised for access, even when you are offline. Mobile App - Extend the office through your mobile device and work from anywhere with ease. Collaborate seamlessly with internal and external users and boost your organisation’s productivity. The Egnyte mobile app supports iOS and Android platforms for phones and tablets. Access your data, preview files and folders, upload new content, and collaborate through shared folders and file links when you want, wherever you are.
  • 200GB per user up to 10TB
    Additional storage available upon request
  • File size up to 50GB
  • 1-click co-editing in Microsoft Office & Google Workspace
    Native integrations help you centralise content, battle sprawl and maintain file consistency, giving everyone a unified experience. With a single secure source of truth, users get work done in the right application - like M365, Google Workspace, Slack and many industry-unique apps. For peace of mind it safeguards the flow of content across every app your teams use.
  • File and folder sharing
    If you want to share a file with someone without requiring them to log in, send them a link to a specific file. When your colleague clicks on the link, Egnyte will generate a preview of your file. Your partner can review it there or download the file.
  • File versioning and upload links
    Appending file names with indicators like v 2.1 and 2013 03 23 is an inconvenient way to track the iterations of a file and dramatically increases your storage needs. By contrast, Egnyte automatically creates a new version of a file each time a change is saved for an existing document. Your Administrator has set up version policies to dictate how many versions are collected before the old versions are moved to trash. Read on to learn more about file versions and how to "promote" old versions to replace the existing file. Upload links are a great way for people outside your Egnyte account to upload content to a specific shared folder, without being able to see the contents of that folder. Construction companies may need to securely solicit bids from subcontractors, but don't want them to see their competitors’ pricing or a university professor wants a way for students to upload problem sets without peeking at each other's answers. Upload links can solve both of these dilemmas.
  • File and folder templates
    Many organisations repeatedly use the same structure of files or folders in their processes. Your use cases might be different, but to illustrate, we've given a couple of examples below: Company A has a default presentation template that should be used by all employees to keep the branding and messaging consistent externally. Company B works on several projects. Any project should include the same static list of folders due to public regulations. Our file sharing software improves file sharing processes and allows easier management and access to templates.
  • Video playback
    Video files are an increasingly common file type to upload and share. With web UI preview capabilities, a user can see video previews for all formats, not just for formats natively supported for preview in the user’s web browser.
  • Single-step approval workflow
    Review and approval workflows help you get documents reviewed and approved efficiently. You can also assign documents to people to add content, publish, or validate content.
  • Granular sub-folder permissions
    When fellow employees and outside business partners collaborate on a project, you may want collaborators to have different levels of control over the files contained in the folder to protect against file deletions and other unauthorised modifications. Gain the ability to assign four different access levels to project folders: Viewer, Editor, Full, and Owner.
  • File link expiry & password-protected links
    Set your file link expiry date before sharing a linked document and set passwords to protect your links and access to documents.
  • Egnyte Snapshots available as an add-on (£6.60)
    Allows you to restore your data to a previous state, useful for recovery from ransomware attacks. Snapshot backup schedule: 0-7 days: Every 4 hours (6 snapshots available per day) 8-15 days: Every 12 hours (2 snapshots available per day) 16-30 days: Every 24 hours (1 snapshot available per day)

Access governance

  • Two factor authentication app
    Make your account even more secure using two-step login verification (TSLV). TSLV requires a third piece of information, in addition to your username and password, to log you in. This includes logging in from the web UI, the mobile app, or the desktop app.
  • Strong password policy enforcement
  • Global file access policies

Discovery and classification

  • Not included

Lifecycle management

  • Trash retention
    Up to 180 days

Data controls

  • Encryption in transit (SSL)
    All data transmission, including uploads, downloads, and browsing is encrypted using 256-bit AES protocol
  • Encryption in rest

Threat management

  • Not included

Privacy and compliance

  • Not included

Governed data sources

  • Not included

Our subscriptions

1 / 3
  • Starter Plans

The Secure

Protect, secure and update your devices with core managed IT security.

 

£13

£11

£9

The Secure plan includes:


  • Patch management
  • Remote monitoring management (RMM)
  • Endpoint detection and response (EDR)

This Plan includes


Help desk

  • You must purchase PAYG helpdesk support in addition to this plan to benefit from our helpdesk.

Onsite support

  • Not included

Starters, movers & leavers

  • Installation and deployment of patch management, endpoint detection and response apps
  • Basic inventory management

Patch management

  • Security patches, bug fixes and feature updates
    Security patches, bug fixes and feature updates are three types of software updates that aim to improve the performance, security and functionality of a software product. Security patches are updates that fix vulnerabilities or flaws in the software that could be exploited by hackers or malicious programs. Bug fixes are updates that resolve errors or glitches in the software that affect its functionality or usability. Feature updates are updates that add new or enhanced features to the software that improve its user experience or capabilities. Whilst these are delivered ad-hoc we make sure that these are rolled out and completed every Wednesday evening, leaving you updated with any compliance.

Remote monitoring & management

  • Drag and drop automation
  • Asset discovery and inventory tracking
  • Unattended remote support
  • Response automation & self-healing

Endpoint detection & response

  • Next generation EDR anti-virus software
    EDR is a powerful solution that provides comprehensive visibility, detection, and response capabilities across endpoints, networks, and cloud environments. EDR leverages artificial intelligence and machine learning to automatically identify and stop threats in real time, reducing the workload and complexity of security operations. EDR also enables proactive hunting, forensic analysis, and remediation of incidents, enhancing security posture and resilience.
  • Setup, configuration & support
  • Identifying malicious behaviors

Email protection to secure & scale your business

  • Not included

Your Microsoft Office 365 plan

  • Not included

Office 365 advanced monitoring & management services

  • Not included

365 cloud backup

  • Not included

Microsoft Teams phone system

  • Available as an add-on (£6.60)
    - Teams phone is a cloud-based phone system that integrates with Microsoft 365 and allows you to make and receive calls from anywhere, on any device. - Offering advanced features such as call routing, auto attendants, voicemail, call recording, and analytics, to help you manage your communications more efficiently and professionally. - Enables you to collaborate with your colleagues and customers more easily, by using chat, video, and screen sharing within the same app. - Helps you save money and simplify your IT management, by eliminating the need for separate phone systems and hardware, and by providing a unified security and compliance framework across Microsoft 365. - Supports a wide range of devices and accessories, such as desk phones, headsets, speakers, and conference phones, to suit your preferences and needs.
  • Unlimited domestic calls to landline and mobile (£6.00)

Security awareness training

  • Not included

Everything you need to measure & reduce phishing vulnerability

  • Not included

Policy management – fit for compliance

  • Not included

Dark web monitoring

  • Not included

Appropriately supporting staff to ensure they make a positive contribution

  • Not included

Cyber Essentials certification

  • Not included

Email signature management

  • Not included

Egnyte file sharing and collaboration

  • Not included

Access governance

  • Not included

Discovery and classification

  • Not included

Lifecycle management

  • Not included

Data controls

  • Not included

Threat management

  • Not included

Privacy and compliance

  • Not included

Governed data sources

  • Not included

  • Starter Plans

The Essentials

Empower your frontline workforce to do their best work with essential support, productivity apps and cloud services.

£49

£44

£42

Microsoft 365 Business Standard

Word logo Excel logo PowerPoint logo Teams logo Outlook logo onedrive logo Publisher logo microsoft access logo

Everything in Secure, plus


  • Helpdesk support
  • Secure configuration of 365 Business Standard
  • OneDrive support
  • Desktop versions of 365 apps
  • Business spam filtering
  • Multi-factor authentication (MFA)
  • 365 cloud data backup
  • Impossible login ticketing & alerting
  • Starters, movers, and leavers

This Plan includes


Help desk

  • 120 minutes of helpdesk support per user per annum - pooled. Reverts to PAYG helpdesk thereafter
  • Helpdesk open between 08:00 - 18:00 Mon - Fri
  • Full ticket management

Onsite support

  • Not included

Starters, movers & leavers

  • Installation and deployment of patch management, endpoint detection and response apps
  • Basic inventory management
  • Installation & setup of Microsoft 365
  • Access to OneDrive and SharePoint
  • Hardware procurement and fulfilment
  • Data transfer and email management for leavers

Patch management

  • Security patches, bug fixes and feature updates
    Security patches, bug fixes and feature updates are three types of software updates that aim to improve the performance, security and functionality of a software product. Security patches are updates that fix vulnerabilities or flaws in the software that could be exploited by hackers or malicious programs. Bug fixes are updates that resolve errors or glitches in the software that affect its functionality or usability. Feature updates are updates that add new or enhanced features to the software that improve its user experience or capabilities. Whilst these are delivered ad-hoc we make sure that these are rolled out and completed every Wednesday evening, leaving you updated with any compliance.
  • Automated Microsoft patch management

Remote monitoring & management

  • Drag and drop automation
  • Asset discovery and inventory tracking
  • Attended and unattended support
  • Response automation & self-healing
  • Remote policy depolyment

Endpoint detection & response

  • Next generation EDR anti-virus software
    EDR is a powerful solution that provides comprehensive visibility, detection, and response capabilities across endpoints, networks, and cloud environments. EDR leverages artificial intelligence and machine learning to automatically identify and stop threats in real time, reducing the workload and complexity of security operations. EDR also enables proactive hunting, forensic analysis, and remediation of incidents, enhancing security posture and resilience.
  • Setup, configuration & support
  • Identifying malicious behaviors

Email protection to secure & scale your business

  • Detect phishing and protect in real time with collective threat intelligence and machine learning
  • Secure inbound and encrypted email with full SPF/DKIM/DMARC support
  • Advanced email protection

Your Microsoft Office 365 plan

  • Microsoft 365 Business Standard - Upgrade to 365 Business Premium for £9.36 or Office 365 E3 for £16.50
  • Desktop versions of Office apps with premium features
  • Word, Excel, PowerPoint, Teams, Outlook, Exchange, OneDrive, SharePoint, Access & Publisher
  • 1TB of cloud storage per user
  • Business-class email
  • Standard security

Office 365 advanced monitoring & management services

  • Track & trace AI monitoring & alerting
  • Location lockdown
    This service will alert LAN Support and create a service ticket should someone attempt to login outside specified safe regions. Safe locations can be added, removed, or set up on a temporary basis by contacting the LAN Support team.

365 cloud backup

  • Back up Outlook, OneDrive, SharePoint, Contacts, Calendars, Tasks, Groups & Teams (Microsoft 365)
  • Insights email business intelligence
  • Closes common Office 365 data protection gaps
  • Supports compliance efforts

Microsoft Teams phone system

  • Available as an add-on (£6.60)
    - Teams phone is a cloud-based phone system that integrates with Microsoft 365 and allows you to make and receive calls from anywhere, on any device. - Offering advanced features such as call routing, auto attendants, voicemail, call recording, and analytics, to help you manage your communications more efficiently and professionally. - Enables you to collaborate with your colleagues and customers more easily, by using chat, video, and screen sharing within the same app. - Helps you save money and simplify your IT management, by eliminating the need for separate phone systems and hardware, and by providing a unified security and compliance framework across Microsoft 365. - Supports a wide range of devices and accessories, such as desk phones, headsets, speakers, and conference phones, to suit your preferences and needs.
  • Unlimited domestic calls to landline and mobile (£6.00)

Security awareness training

  • Not included

Everything you need to measure & reduce phishing vulnerability

  • Not included

Policy management – fit for compliance

  • Not included

Dark web monitoring

  • Not included

Appropriately supporting staff to ensure they make a positive contribution

  • Not included

Cyber Essentials certification

  • Available from £995.00 per year or £95.00 per month. Includes £25,000 cyber insurance cover

Email signature management

  • Not included

Egnyte file sharing and collaboration

  • Not included

Access governance

  • Two factor authentication app
    Make your account even more secure using two-step login verification (TSLV). TSLV requires a third piece of information, in addition to your username and password, to log you in. This includes logging in from the web UI, the mobile app, or the desktop app.
  • Strong password policy enforcement

Discovery and classification

  • Not included

Lifecycle management

  • Not included

Data controls

  • Not included

Threat management

  • Not included

Privacy and compliance

  • Not included

Governed data sources

  • Not included

  • Starter Plans

The Premium

Get best-in-class IT service desk, productivity apps, core security and compliance capabilities.

 

£69

£62

£59

Microsoft 365 Business Standard

Word logo Excel logo PowerPoint logo Teams logo Outlook logo onedrive logo Publisher logo microsoft access logo

Everything in Essentials, plus


  • Egnyte Cloud File Server
  • Unlimited helpdesk support
  • Office 365 'track & trace' centre
  • Microsoft 365 advanced monitoring
  • Security awareness training
  • IT policy management
  • Threat protection simulations
  • Dark web monitoring
  • Designated account manager
  • Cybersecurity GAP analysis

This Plan includes


Help desk

  • Unlimited helpdesk support
    Speak to a designated team of 6 helpdesk agents for improved continuity
  • Helpdesk open between 08:00 - 18:00 Mon - Fri
  • Full ticket management
  • Client portal access
    Our client portal provides two levels of access for different user roles. All employees can use Level 1, which is a basic but effective tool. You can create and view tickets, as well as chat with our support team directly to solve problems faster. Level 2 is for managers or stakeholders who need more functionality, such as requesting new staff, transfers, or terminations; ordering onsite support or hardware; and accessing documents like Cyber Essentials certificates, PI documents, liability insurance certificates, contracts, Microsoft NCE agreements, and more.
  • Service level agreement

Onsite support

  • Next day onsite support (P1)
    Next day onsite for tickets escalated from our support team before 13:00 - 50% discount on callout fee - saving you £75.00 on your first onsite hour.

Starters, movers & leavers

  • Installation and deployment of patch management, endpoint detection and response apps
  • Basic inventory management
  • Installation & setup of Microsoft 365
  • Configuration of shared calendars
  • Access to OneDrive and SharePoint
  • Hardware procurement and fulfilment
  • Data transfer and email management for leavers
  • Installation of cloud file server
  • Folder permissions and testing
    Folder permissions in Egnyte are a powerful feature that allow us to control who can access, edit, and share your files and folders within your organisation. Our team can set permissions at the folder level, or inherit them from the parent folder. We can also assign different permissions to different groups or users, depending on their roles and needs. Folder permissions help you to protect your data, collaborate efficiently, and comply with security policies.
  • Serial number and warranty management
  • Security awareness gap analysis review
  • Collection and reconditioning of hardware

Patch management

  • Security patches, bug fixes and feature updates
    Security patches, bug fixes and feature updates are three types of software updates that aim to improve the performance, security and functionality of a software product. Security patches are updates that fix vulnerabilities or flaws in the software that could be exploited by hackers or malicious programs. Bug fixes are updates that resolve errors or glitches in the software that affect its functionality or usability. Feature updates are updates that add new or enhanced features to the software that improve its user experience or capabilities. Whilst these are delivered ad-hoc we make sure that these are rolled out and completed every Wednesday evening, leaving you updated with any compliance.
  • Automated Microsoft patch management
  • Test patches before implementation
  • Vulnerability management
  • ITIL compliance

Remote monitoring & management

  • Drag and drop automation
  • Asset discovery and inventory tracking
  • Attended and unattended support
  • Response automation & self-healing
  • Remote policy deployment
  • Remote software deployment

Endpoint detection & response

  • Next generation EDR anti-virus software
    EDR is a powerful solution that provides comprehensive visibility, detection, and response capabilities across endpoints, networks, and cloud environments. EDR leverages artificial intelligence and machine learning to automatically identify and stop threats in real time, reducing the workload and complexity of security operations. EDR also enables proactive hunting, forensic analysis, and remediation of incidents, enhancing security posture and resilience.
  • Setup, configuration & support
  • Identifying malicious behaviours

Email protection to secure & scale your business

  • Detect phishing and protect in real time with collective threat intelligence and machine learning
  • Secure inbound and encrypted email with full SPF/DKIM/DMARC support
  • Advanced email protection

Your Microsoft Office 365 plan

  • Microsoft 365 Business Standard - Upgrade to 365 Business Premium for £9.36 or Office 365 E3 for £16.50
  • Desktop versions of Office apps with premium features
  • Word, Excel, PowerPoint, Teams, Outlook, Exchange, OneDrive, SharePoint, Access & Publisher
  • 1TB of cloud storage per user
  • Business-class email
  • Standard security

Office 365 advanced monitoring & management services

  • Impossible login ticketing & alerting
  • Location lockdown
    This service will alert LAN Support and create a service ticket should someone attempt to login outside specified safe regions. Safe locations can be added, removed, or set up on a temporary basis by contacting the LAN Support team.
  • Email forwarding alerts
    Sends an alert if an external forwarder is set up on an account. By default, this alert goes out to Three accounts; LAN Support’s PSA helpdesk system; The customer notification email if specified within our service and to the individual who has a forwarder detected on their account. Forwarders detected by our team can be approved or removed using the associated companion tool Approve / Remove detected forwarders’.
  • Password expiry notifications
    This will alert your users directly when their password is about to expire, preventing unexpected account lockouts. Reminder emails will be sent daily for one week before expiry until the password is updated.
  • Block external inbox rules
    Prevents inbox rules from forwarding email externally. The user will receive an email informing them that this option is disabled. Exceptions can be made if necessary, but it is not recommended as it may affect compliance.
  • Monitor admin roles
  • Internal spoofing protection
    This service adds a warning banner to emails where possible spoofing has been detected

365 cloud backup

  • Full backup included
  • Calendars, tasks, and attachments backup for both Microsoft 365 and Google Workspace
  • Insights email business intelligence
  • Closes common Office 365 data protection gaps
  • Supports compliance efforts

Microsoft Teams phone system

  • Available as an add-on (£6.60)
    - Teams phone is a cloud-based phone system that integrates with Microsoft 365 and allows you to make and receive calls from anywhere, on any device. - Offering advanced features such as call routing, auto attendants, voicemail, call recording, and analytics, to help you manage your communications more efficiently and professionally. - Enables you to collaborate with your colleagues and customers more easily, by using chat, video, and screen sharing within the same app. - Helps you save money and simplify your IT management, by eliminating the need for separate phone systems and hardware, and by providing a unified security and compliance framework across Microsoft 365. - Supports a wide range of devices and accessories, such as desk phones, headsets, speakers, and conference phones, to suit your preferences and needs.
  • Unlimited domestic calls to landline and mobile (£6.00)

Security awareness training

  • Automated cyber awareness training
    Security awareness training is an essential part of protecting a business from cyber attacks and data breaches. It helps employees to understand the importance of security measures and procedures, as well as how to recognise and respond to potential threats.
  • Onboarding gap analysis testing
    A security awareness gap analysis review is a process of evaluating the current level of security awareness among employees in an organisation. It identifies the strengths and weaknesses of the existing security awareness program, and the areas where improvement is needed. The purpose of the review is to enhance the security culture and behavior of the employees, and to reduce the risk of human error, negligence, or malicious actions that could compromise the confidentiality, integrity, or availability of the organisation's information assets.
  • Training unique to your employees' security weaknesses
    Gives your customers confidence that you keep their data safe and secure
  • Building a culture of security with employee progress reporting
  • A GDPR & Cyber Essentials certification requirement
  • Add your own in-house training assessments

Everything you need to measure & reduce phishing vulnerability

  • Automated phishing simulations
  • Ready-made template library
  • Monitor user risk
  • In-depth reporting
  • Seasonal campaigns

Policy management – fit for compliance

  • Choose 6 essential prewritten IT polices from a centralised document library
    The security of your systems depends on the safe behavior of your staff. You need to establish and communicate clear guidelines for preventing or reducing security incidents. This is not only a legal requirement, but also a way to protect your business, your staff and your clients. You should also have a cybersecurity staff handbook that explains the rules and expectations for your staff, and have them sign it as part of their training.
  • Create your own policies
    create policies from scratch using an in-software editor tool with version control.
  • Policy version control
    Store and amend documents in one centralised location, making it easy to find, send and revise different policies.
  • Automatic policy updates with eSign
    Notify users of relevant policy updates via email announcements and provide self-service access for employees to read and approve at a time of their convenience.

Dark web monitoring

  • Detection of compromised data
  • Identify what data is exposed
  • Get notified when new breaches are found
  • Encourage secure email and password use

Appropriately supporting staff to ensure they make a positive contribution

  • Not included

Cyber Essentials certification

  • Available from £995.00 per year or £95.00 per month. Includes £25,000 cyber insurance cover

Email signature management

  • Not included

Egnyte file sharing and collaboration

  • Egnyte Cloud File Server (CFS)
    Egnyte's entry level cloud server offering
  • Desktop & mobile apps
    The Desktop App provides fast real-time access to your files and folders stored in the cloud from your computer. Once connected, all content you can access in the cloud will appear in a network drive in Windows Explorer or volume on Mac Finder. You will be able to view all your files and folders in the cloud without having to sync them to your computer first. Furthermore, you'll also be able to select specific folders to be synchronised for access, even when you are offline. Mobile App - Extend the office through your mobile device and work from anywhere with ease. Collaborate seamlessly with internal and external users and boost your organisation’s productivity. The Egnyte mobile app supports iOS and Android platforms for phones and tablets. Access your data, preview files and folders, upload new content, and collaborate through shared folders and file links when you want, wherever you are.
  • 200GB per user up to 10TB
    Additional storage available upon request
  • File size up to 50GB
  • 1-click co-editing in Microsoft Office & Google Workspace
    Native integrations help you centralise content, battle sprawl and maintain file consistency, giving everyone a unified experience. With a single secure source of truth, users get work done in the right application - like M365, Google Workspace, Slack and many industry-unique apps. For peace of mind it safeguards the flow of content across every app your teams use.
  • File and folder sharing
    If you want to share a file with someone without requiring them to log in, send them a link to a specific file. When your colleague clicks on the link, Egnyte will generate a preview of your file. Your partner can review it there or download the file.
  • File versioning and upload links
    Appending file names with indicators like v 2.1 and 2013 03 23 is an inconvenient way to track the iterations of a file and dramatically increases your storage needs. By contrast, Egnyte automatically creates a new version of a file each time a change is saved for an existing document. Your Administrator has set up version policies to dictate how many versions are collected before the old versions are moved to trash. Read on to learn more about file versions and how to "promote" old versions to replace the existing file. Upload links are a great way for people outside your Egnyte account to upload content to a specific shared folder, without being able to see the contents of that folder. Construction companies may need to securely solicit bids from subcontractors, but don't want them to see their competitors’ pricing or a university professor wants a way for students to upload problem sets without peeking at each other's answers. Upload links can solve both of these dilemmas.
  • File and folder templates
    Many organisations repeatedly use the same structure of files or folders in their processes. Your use cases might be different, but to illustrate, we've given a couple of examples below: Company A has a default presentation template that should be used by all employees to keep the branding and messaging consistent externally. Company B works on several projects. Any project should include the same static list of folders due to public regulations. Our file sharing software improves file sharing processes and allows easier management and access to templates.
  • Video playback
    Video files are an increasingly common file type to upload and share. With web UI preview capabilities, a user can see video previews for all formats, not just for formats natively supported for preview in the user’s web browser.
  • Single-step approval workflow
    Review and approval workflows help you get documents reviewed and approved efficiently. You can also assign documents to people to add content, publish, or validate content.
  • Granular sub-folder permissions
    When fellow employees and outside business partners collaborate on a project, you may want collaborators to have different levels of control over the files contained in the folder to protect against file deletions and other unauthorised modifications. Gain the ability to assign four different access levels to project folders: Viewer, Editor, Full, and Owner.
  • File link expiry & password-protected links
    Set your file link expiry date before sharing a linked document and set passwords to protect your links and access to documents.
  • Egnyte Snapshots available as an add-on (£6.60)
    Allows you to restore your data to a previous state, useful for recovery from ransomware attacks. Snapshot backup schedule: 0-7 days: Every 4 hours (6 snapshots available per day) 8-15 days: Every 12 hours (2 snapshots available per day) 16-30 days: Every 24 hours (1 snapshot available per day)

Access governance

  • Two factor authentication app
    Make your account even more secure using two-step login verification (TSLV). TSLV requires a third piece of information, in addition to your username and password, to log you in. This includes logging in from the web UI, the mobile app, or the desktop app.
  • Strong password policy enforcement
  • Global file access policies

Discovery and classification

  • Not included

Lifecycle management

  • Trash retention
    Up to 180 days

Data controls

  • Encryption in transit (SSL)
    All data transmission, including uploads, downloads, and browsing is encrypted using 256-bit AES protocol
  • Encryption in rest

Threat management

  • Not included

Privacy and compliance

  • Not included

Governed data sources

  • Not included

Most Popular
  • Advanced Plans

The Premium +

Includes Egnyte’s advanced cloud collaboration suite with better threat detection, double the storage and maximum file size, as well as onsite support.

£85

£76

£69

Microsoft 365 Business Standard

Word logo Excel logo PowerPoint logo Teams logo Outlook logo onedrive logo Publisher logo microsoft access logo

Everything in Premium, plus


  • Egnyte's Advanced File System
  • Managed phishing campaigns
  • Hyper-targeted spear-phishing
  • Client success security manager
  • Supportive and active campaigns to encourage participation
  • New starters, movers, and leavers fulfilment
  • Next day onsite support
  • Professional email signature management
  • Business spam filtering & email archiving

This Plan includes


Help desk

  • Unlimited+ helpdesk support
  • Support desk open between 08:00 - 18:00 Mon - Fri
  • Full ticket management
  • Client portal access
    Our client portal provides two levels of access for different user roles. All employees can use Level 1, which is a basic but effective tool. You can create and view tickets, as well as chat with our support team directly to solve problems faster. Level 2 is for managers or stakeholders who need more functionality, such as requesting new staff, transfers, or terminations; ordering onsite support or hardware; and accessing documents like Cyber Essentials certificates, PI documents, liability insurance certificates, contracts, Microsoft NCE agreements, and more.
  • Service level agreement
  • Monthly reporting

Onsite support

  • Next day onsite support (P2)
    Next day onsite support for tickets escalated from our support team before 13:00 - No callout fee - free for first 60 minutes - saving you £150.00 each time you need an engineer onsite.

Starters, movers & leavers

  • Installation and deployment of patch management, endpoint detection and response apps
  • Basic inventory management
  • Installation & setup of Microsoft 365
  • Configuration of shared calendars
  • Access to OneDrive and SharePoint
  • Hardware procurement and fulfilment
  • Data transfer and email management for leavers
  • Installation of cloud file server
  • Folder permissions and testing
    Folder permissions in Egnyte are a powerful feature that allow us to control who can access, edit, and share your files and folders within your organisation. Our team can set permissions at the folder level, or inherit them from the parent folder. We can also assign different permissions to different groups or users, depending on their roles and needs. Folder permissions help you to protect your data, collaborate efficiently, and comply with security policies.
  • Serial number and warranty management
  • Security awareness gap analysis review
  • Collection and reconditioning of hardware
  • A personal introductory call to introduce the IT helpdesk to explain services and answer questions

Patch management

  • Security patches, bug fixes and feature updates
    Security patches, bug fixes and feature updates are three types of software updates that aim to improve the performance, security and functionality of a software product. Security patches are updates that fix vulnerabilities or flaws in the software that could be exploited by hackers or malicious programs. Bug fixes are updates that resolve errors or glitches in the software that affect its functionality or usability. Feature updates are updates that add new or enhanced features to the software that improve its user experience or capabilities. Whilst these are delivered ad-hoc we make sure that these are rolled out and completed every Wednesday evening, leaving you updated with any compliance.
  • Automated Microsoft patch management
  • Test patches before implementation
  • Vulnerability management
  • ITIL compliance

Remote monitoring & management

  • Drag and drop automation
  • Asset discovery and inventory tracking
  • Attended and unattended support
  • Response automation & self-healing
  • Remote policy deployment
  • Remote software deployment

Endpoint detection & response

  • Next generation EDR anti-virus software
    EDR is a powerful solution that provides comprehensive visibility, detection, and response capabilities across endpoints, networks, and cloud environments. EDR leverages artificial intelligence and machine learning to automatically identify and stop threats in real time, reducing the workload and complexity of security operations. EDR also enables proactive hunting, forensic analysis, and remediation of incidents, enhancing security posture and resilience.
  • Setup, configuration & support
  • Identifying malicious behaviors

Email protection to secure & scale your business

  • Detect phishing and protect in real time with collective threat intelligence and machine learning
  • Secure inbound and encrypted email with full SPF/DKIM/DMARC support
  • Advanced email protection

Your Microsoft Office 365 plan

  • Microsoft 365 Business Standard - Upgrade to 365 Business Premium for £9.36 or Office 365 E3 for £16.50
  • Desktop version of Office apps with premium features
  • Word, Excel, PowerPoint, Teams, Outlook, Exchange, OneDrive, SharePoint, Access & Publisher
  • 1TB of cloud storage per user
  • Business-class email
  • Standard security

Office 365 advanced monitoring & management services

  • Impossible login ticketing & alerting
  • Location lockdown
  • Email forwarding alerts
  • Password expiry notifications
  • Block external inbox rules
  • Monitor admin roles
  • Internal spoofing protection
  • Employee login track & trace
  • License reporting

365 cloud backup

  • Full backup included
  • Calendars, tasks, and attachments backup for both Microsoft 365 and Google Workspace
  • Back up Outlook, OneDrive, SharePoint, Contacts, Calendars, Tasks, Groups & Teams (Microsoft 365)
  • Insights email business intelligence
  • Closes common Office 365 data protection gaps
  • Supports compliance efforts

Microsoft Teams phone system

  • Available as an add-on (£6.60)
    - Teams phone is a cloud-based phone system that integrates with Microsoft 365 and allows you to make and receive calls from anywhere, on any device. - Offering advanced features such as call routing, auto attendants, voicemail, call recording, and analytics, to help you manage your communications more efficiently and professionally. - Enables you to collaborate with your colleagues and customers more easily, by using chat, video, and screen sharing within the same app. - Helps you save money and simplify your IT management, by eliminating the need for separate phone systems and hardware, and by providing a unified security and compliance framework across Microsoft 365. - Supports a wide range of devices and accessories, such as desk phones, headsets, speakers, and conference phones, to suit your preferences and needs.
  • Unlimited domestic calls to landline and mobile (£6.00)

Security awareness training

  • Automated cyber awareness training
  • Onboarding gap analysis testing
  • Training unique to your employees' security weaknesses
  • Building a culture of security with employee progress reporting
  • A GDPR & Cyber Essentials certification requirement
  • Add your own in-house training assessments

Everything you need to measure & reduce phishing vulnerability

  • Automated phishing simulations
  • Ready-made template library
  • Monitor user risk
  • In-depth reporting
  • Seasonal campaigns
  • Managed phishing campaigns

Policy management – fit for compliance

  • Choose 6 essential prewritten polices from a centralised document library
  • Create your own policies
  • Policy version control
  • Automatic policy updates with eSign

Dark web monitoring

  • Detect compromised data
  • Identify what data is exposed
  • Get notified when new breaches are found
  • Encourage secure email and password use

Appropriately supporting staff to ensure they make a positive contribution

  • Client success manager
  • Supportive and active campaigns to encourage participation
  • Direct employee contact

Cyber Essentials certification

  • Available from £995.00 per year or £95.00 per month. Includes £25,000 cyber insurance cover

Email signature management

  • Centrally control the look and feel of email signatures
  • Maintain a consistent brand across business emails
  • Email compliance for GDPR
  • Creative departmental marketing

Egnyte file sharing and collaboration

  • Desktop & mobile apps
    The Desktop App provides fast real-time access to your files and folders stored in the cloud from your computer. Once connected, all content you can access in the cloud will appear in a network drive in Windows Explorer or volume on Mac Finder. You will be able to view all your files and folders in the cloud without having to sync them to your computer first. Furthermore, you'll also be able to select specific folders to be synchronised for access, even when you are offline. Mobile App - Extend the office through your mobile device and work from anywhere with ease. Collaborate seamlessly with internal and external users and boost your organisation’s productivity. The Egnyte mobile app supports iOS and Android platforms for phones and tablets. Access your data, preview files and folders, upload new content, and collaborate through shared folders and file links when you want, wherever you are.
  • 200GB per user up to 10TB
    Additional storage available upon request
  • File size up to 100GB
  • 1-click co-editing in Microsoft Office & Google Workspace
    Native integrations help you centralise content, battle sprawl and maintain file consistency, giving everyone a unified experience. With a single secure source of truth, users get work done in the right application - like M365, Google Workspace, Slack and many industry-unique apps. For peace of mind it safeguards the flow of content across every app your teams use.
  • File and folder sharing
    If you want to share a file with someone without requiring them to log in, send them a link to a specific file. When your colleague clicks on the link, Egnyte will generate a preview of your file. Your partner can review it there or download the file.
  • File versioning and upload links
    Appending file names with indicators like v 2.1 and 2013 03 23 is an inconvenient way to track the iterations of a file and dramatically increases your storage needs. By contrast, Egnyte automatically creates a new version of a file each time a change is saved for an existing document. Your Administrator has set up version policies to dictate how many versions are collected before the old versions are moved to trash. Read on to learn more about file versions and how to "promote" old versions to replace the existing file. Upload links are a great way for people outside your Egnyte account to upload content to a specific shared folder, without being able to see the contents of that folder. Construction companies may need to securely solicit bids from subcontractors, but don't want them to see their competitors’ pricing or a university professor wants a way for students to upload problem sets without peeking at each other's answers. Upload links can solve both of these dilemmas.
  • File and folder templates
    Many organisations repeatedly use the same structure of files or folders in their processes. Your use cases might be different, but to illustrate, we've given a couple of examples below: Company A has a default presentation template that should be used by all employees to keep the branding and messaging consistent externally. Company B works on several projects. Any project should include the same static list of folders due to public regulations. Our file sharing software improves file sharing processes and allows easier management and access to templates.
  • Video playback
    Video files are an increasingly common file type to upload and share. With web UI preview capabilities, a user can see video previews for all formats, not just for formats natively supported for preview in the user’s web browser.
  • Single-step approval workflow
    Review and approval workflows help you get documents reviewed and approved efficiently. You can also assign documents to people to add content, publish, or validate content.
  • Granular sub-folder permissions
    When fellow employees and outside business partners collaborate on a project, you may want collaborators to have different levels of control over the files contained in the folder to protect against file deletions and other unauthorised modifications. Gain the ability to assign four different access levels to project folders: Viewer, Editor, Full, and Owner.
  • File link expiry & password-protected links
    Set your file link expiry date before sharing a linked document and set passwords to protect your links and access to documents.
  • Mobile form filling
    Users who work on PDF files now have the tools for fast and easy editing. It reduces the time needed for file preparation as you can do it on the go within one app. It also reduces the costs of annotations. Individuals, teams, and organisations now have a new way of collaboration using their smartphones and tablets. With mobile form filling, you can fill out forms directly on your mobile device, with support for almost all PDF editable fields (input text, signature, dropdown, checkbox, etc.). The filled-out documents can be edited or previewed at any time. Previewing filled-out documents can also be done through the WebUI - the same document can then be viewed and worked on from multiple devices.
  • Smart local file caching & public cloud file caching (PCC)
    Determine the nearest Smart Cache device using network tests for bandwidth and latency and connect to the appropriate device or the cloud. This ensures users can seamlessly access their files in the most optimal way while moving between offices using the Desktop App. Smart Cache devices are effortlessly monitored and managed in the cloud. IT administrators can remotely check device synchronisation status, authorise user or group access, and perform software upgrades for all registered devices. Smart Cache enables file copying over a UNC path from various devices like network scanners, printers, lab instruments, and drones. This feature caters to situations where the host machines cannot have the Desktop App installed and a UNC path is the only available option to upload files from the device. In SMB collaboration mode, Smart Cache allows users to co-edit Revit files with enabled work sharing. This feature is designed specifically for the AEC industry, enabling real-time collaboration among peer designers working on Revit applications. Multi-User Civil 3D Support: In SMB collaboration mode, Smart Cache allows multiple users to work on single Civil 3D files. This feature allows Civil 3D master file to load cross-reference files faster and thus increasing the performance of the application loading time.
  • Egnyte Snapshots available as an add-on (£6.60)
    Allows you to restore your data to a previous state, useful for recovery from ransomware attacks. Snapshot backup schedule: 0-7 days: Every 4 hours (6 snapshots available per day) 8-15 days: Every 12 hours (2 snapshots available per day) 16-30 days: Every 24 hours (1 snapshot available per day)

Access governance

  • Two factor authentication app
    Make your account even more secure using two-step login verification (TSLV). TSLV requires a third piece of information, in addition to your username and password, to log you in. This includes logging in from the web UI, the mobile app, or the desktop app.
  • Strong password policy enforcement
  • Global file access policies
  • Mobile device control
    The device dashboard shows the full list of devices which have accessed your account. There are two pages: one for personal devices (like smartphones and laptops) and another for storage devices (like Storage Sync and Smart Cache (FKA Turbo). You can remove and remote wipe devices.
  • Desktop device control

Discovery and classification

  • Sensitive content classification
  • Custom classification policies
    Create custom classification policies to classify content by file and path names
  • OCR classification for text in images
    Text is extracted from images, analysed and categorised, helping you to organise your files more efficiently
  • Document type identification
  • Language country support
    Multi-language translation built in

Lifecycle management

  • Trash retention
    Up to 180 days

Data controls

  • Encryption in transit (SSL)
    All data transmission, including uploads, downloads, and browsing is encrypted using 256-bit AES protocol
  • Encryption in rest

Threat management

  • Not included

Privacy and compliance

  • Not included

Governed data sources

  • Not included

  • Advanced Plans

The Regulator

Increase productivity with state-of-the-art productivity applications, security and professional management solutions, plus cyber essentials certification and onsite support.

£155

£139

£125

Microsoft 365 E3

Word logo Excel logo PowerPoint logo Teams logo Outlook logo onedrive logo Publisher logo microsoft access logo Exchange logo SharePoint logo azure logo Yammer logo Bookings logo

Everything in Premium +, plus


  • Egnyte's Enterprise Lite System
  • Secure configuration of Microsoft E3
  • Regular IT manager meeting
  • Password management
  • Cyber Essentials certification
  • Monthly reporting
  • Extended opening hours
  • Advanced threat protection
  • Regular deskside support
  • Content discovery and classification
  • Lifecycle management
  • Advanced data controls
  • Privacy & compliance

This Plan includes


Help desk

  • Unlimited++ helpdesk support
  • Helpdesk open between 08:00 - 22:00 Mon - Fri
  • Saturday and Sunday open 10:00 - 17:00
  • Full ticket management
  • Client portal access
    Our client portal provides two levels of access for different user roles. All employees can use Level 1, which is a basic but effective tool. You can create and view tickets, as well as chat with our support team directly to solve problems faster. Level 2 is for managers or stakeholders who need more functionality, such as requesting new staff, transfers, or terminations; ordering onsite support or hardware; and accessing documents like Cyber Essentials certificates, PI documents, liability insurance certificates, contracts, Microsoft NCE agreements, and more.
  • Service level agreement
  • Monthly reporting

Onsite support

  • Next day onsite support (P3)
    Next day onsite support for tickets escalated from our support team before 13:00 - No callout fee - free for first 120 minutes
  • IT manager meetings
    You will have a regular meeting with your assigned IT manager, who will be your trusted partner and advisor for all your IT needs. In these sessions, we will work together to create a strategic plan for your IT infrastructure, address any HR-related issues such as access rights, onboarding and offboarding, and manage any ongoing or upcoming projects. You will get one half-day visit every two months for every 10 users you subscribe to our service.
  • Deskside support
    A regular appointment with your assigned IT manager or technician. During these sessions, your IT manager or technician will provide local support to your users. Deskside support is highly personalised and provides expert support to your designated head of IT. Assistance includes but is not limited to: laptop/desktop rebuilds, personal device assistance, office desk moves, and much more. You will receive 1 half day visit (every two months) per 10 subscribed users.

Starters, movers & leavers

  • Installation and deployment of patch management, endpoint detention and response apps
  • Basic inventory management
  • Installation & setup of Microsoft 365
  • Configuration of shared calendars
  • Access to OneDrive and SharePoint
  • Hardware procurement and fulfilment
  • Data transfer and email management for leavers
  • Installation of cloud file server
  • Folder permissions and testing
    Folder permissions in Egnyte are a powerful feature that allow us to control who can access, edit, and share your files and folders within your organisation. Our team can set permissions at the folder level, or inherit them from the parent folder. We can also assign different permissions to different groups or users, depending on their roles and needs. Folder permissions help you to protect your data, collaborate efficiently, and comply with security policies.
  • Serial number and warranty management
  • Security awareness gap analysis review
  • Collection and reconditioning of hardware
  • A personal introductory call to introduce the IT Helpdesk to explain services and answer questions

Patch management

  • Security patches, bug fixes and feature updates
    Security patches, bug fixes and feature updates are three types of software updates that aim to improve the performance, security and functionality of a software product. Security patches are updates that fix vulnerabilities or flaws in the software that could be exploited by hackers or malicious programs. Bug fixes are updates that resolve errors or glitches in the software that affect its functionality or usability. Feature updates are updates that add new or enhanced features to the software that improve its user experience or capabilities. Whilst these are delivered ad-hoc we make sure that these are rolled out and completed every Wednesday evening, leaving you updated with any compliance.
  • Automated Microsoft patch management
  • Vulnerability management
  • ITIL compliance

Remote monitoring & management

  • Drag and drop automation
  • Asset discovery and inventory tracking
  • Attended and unattended support
  • Response automation & self-healing

Endpoint detection & response

  • Extended detection and response (XDR)
    EDR is a powerful solution that provides comprehensive visibility, detection, and response capabilities across endpoints, networks, and cloud environments. EDR leverages artificial intelligence and machine learning to automatically identify and stop threats in real time, reducing the workload and complexity of security operations. EDR also enables proactive hunting, forensic analysis, and remediation of incidents, enhancing security posture and resilience.
  • Setup, configuration & support
  • Identify malicious behaviors
  • Incident response tooling
  • Insider threat & deception
  • Attack surface management

Email protection to secure & scale your business

  • Detect phishing and protect in real time with collective threat intelligence and machine learing
  • Secure inbound and encrypted email with full SPF/DKIM/DMARC support
  • Advanced email protection

Your Microsoft Office 365 plan

  • Office 365 E3
  • Desktop version of Office apps with Premium features
  • Word, Excel, PowerPoint, Teams, Outlook, Exchange, OneDrive, SharePoint, Access & Publisher
  • 1TB of cloud storage per user
  • Business-class email
  • Attendee registration and reporting tools
  • Manage customer appointments
  • Advanced security
  • Access to data control
  • Threat protection
  • PC and mobile device management
  • Information protection
  • Advanced compliance
  • Advanced analytics

Office 365 advanced monitoring & management services

  • Impossible login ticketing & alerting
  • Location lockdown
  • Email forwarding alerts
  • Password expiry notifications
  • Block external inbox rules
  • Monitor admin roles
  • Internal spoofing protection
  • Employee login track & trace
  • License reporting

365 cloud backup

  • Full backup included
  • Calendars, tasks, and attachments backup for both Microsoft 365 and Google Workspace
  • Back up Outlook, OneDrive, SharePoint, Contacts, Calendars, Tasks, Groups & Teams (Microsoft 365)
  • Insights email business intelligence
  • Closes common Office 365 data protection gaps
  • Supports compliance efforts

Microsoft Teams phone system

  • Teams phone system
    - Teams phone is a cloud-based phone system that integrates with Microsoft 365 and allows you to make and receive calls from anywhere, on any device. - Offering advanced features such as call routing, auto attendants, voicemail, call recording, and analytics, to help you manage your communications more efficiently and professionally. - Enables you to collaborate with your colleagues and customers more easily, by using chat, video, and screen sharing within the same app. - Helps you save money and simplify your IT management, by eliminating the need for separate phone systems and hardware, and by providing a unified security and compliance framework across Microsoft 365. - Supports a wide range of devices and accessories, such as desk phones, headsets, speakers, and conference phones, to suit your preferences and needs.
  • Unlimited domestic calls to landline and mobile (£6.00)

Security awareness training

  • Automated cyber awareness training
  • Onboarding gap analysis testing
    A security awareness gap analysis review is a process of evaluating the current level of security awareness among employees in an organisation. It identifies the strengths and weaknesses of the existing security awareness program, and the areas where improvement is needed. The purpose of the review is to enhance the security culture and behavior of the employees, and to reduce the risk of human error, negligence, or malicious actions that could compromise the confidentiality, integrity, or availability of the organisation's information assets.
  • Training unique to your employees' security weaknesses
    A security awareness gap analysis review is a process of evaluating the current level of security awareness among employees in an organisation. It identifies the strengths and weaknesses of the existing security awareness program, and the areas where improvement is needed. The purpose of the review is to enhance the security culture and behavior of the employees, and to reduce the risk of human error, negligence, or malicious actions that could compromise the confidentiality, integrity, or availability of the organisation's information assets.
  • Build a culture of security with employee progress reporting
  • A GDPR & Cyber Essentials certification requirement
  • Add your own in-house training assessments

Everything you need to measure & reduce phishing vulnerability

  • Automated phishing simulations
  • Ready-made template library
  • Monitor user risk
  • In-depth reporting
  • Seasonal campaigns
  • Managed phishing campaigns
  • Hyper-targeted spear-phishing

Policy management – fit for compliance

  • Choose up to 18 prewritten polices from a centralised document library
  • Create your own policies
  • Policy version control
  • Automatic policy updates with eSign

Dark web monitoring

  • Detection of compromised data
  • Identify what data is exposed
  • Get notified when new breaches are found
  • Encourage secure email and password use

Appropriately supporting staff to ensure they make a positive contribution

  • Client success manager
  • Supportive and active campaigns to encourage participation
  • Direct employee contact

Cyber Essentials certification

  • Identify and address weaknesses in your cybersecurity measures, increasing confidence and trust in your business. Qualify for government contracts and tenders and save on cyber insurance premiums with Cyber Essentials
  • Simply being certified can reduce your cyber risk by up to 98.5%. And, it’s a great way to demonstrate to new customers and partners that you take cybersecurity seriously – helping you grow as well as stay safe.

Email signature management

  • Centrally control the look and feel of email signatures
  • Maintain a consistent brand across business emails
  • Email compliance for GDPR
  • Creative departmental marketing

Egnyte file sharing and collaboration

  • Desktop & mobile apps
    The Desktop App provides fast real-time access to your files and folders stored in the cloud from your computer. Once connected, all content you can access in the cloud will appear in a network drive in Windows Explorer or volume on Mac Finder. You will be able to view all your files and folders in the cloud without having to sync them to your computer first. Furthermore, you'll also be able to select specific folders to be synchronised for access, even when you are offline. Mobile App - Extend the office through your mobile device and work from anywhere with ease. Collaborate seamlessly with internal and external users and boost your organisation’s productivity. The Egnyte mobile app supports iOS and Android platforms for phones and tablets. Access your data, preview files and folders, upload new content, and collaborate through shared folders and file links when you want, wherever you are.
  • 100GB per user up to 10TB
    Additional storage available upon request
  • File size up to 100GB
  • 1-click co-editing in Microsoft Office & Google Workspace
    Native integrations help you centralise content, battle sprawl and maintain file consistency, giving everyone a unified experience. With a single secure source of truth, users get work done in the right application - like M365, Google Workspace, Slack and many industry-unique apps. For peace of mind it safeguards the flow of content across every app your teams use.
  • File and folder sharing
    If you want to share a file with someone without requiring them to log in, send them a link to a specific file. When your colleague clicks on the link, Egnyte will generate a preview of your file. Your partner can review it there or download the file.
  • File versioning and upload links
    Appending file names with indicators like v 2.1 and 2013 03 23 is an inconvenient way to track the iterations of a file and dramatically increases your storage needs. By contrast, Egnyte automatically creates a new version of a file each time a change is saved for an existing document. Your Administrator has set up version policies to dictate how many versions are collected before the old versions are moved to trash. Read on to learn more about file versions and how to "promote" old versions to replace the existing file. Upload links are a great way for people outside your Egnyte account to upload content to a specific shared folder, without being able to see the contents of that folder. Construction companies may need to securely solicit bids from subcontractors, but don't want them to see their competitors’ pricing or a university professor wants a way for students to upload problem sets without peeking at each other's answers. Upload links can solve both of these dilemmas.
  • File and folder templates
    Many organisations repeatedly use the same structure of files or folders in their processes. Your use cases might be different, but to illustrate, we've given a couple of examples below: Company A has a default presentation template that should be used by all employees to keep the branding and messaging consistent externally. Company B works on several projects. Any project should include the same static list of folders due to public regulations. Our file sharing software improves file sharing processes and allows easier management and access to templates.
  • Video playback
    Video files are an increasingly common file type to upload and share. With web UI preview capabilities, a user can see video previews for all formats, not just for formats natively supported for preview in the user’s web browser.
  • Single-step approval workflow
    Review and approval workflows help you get documents reviewed and approved efficiently. You can also assign documents to people to add content, publish, or validate content.Review and approval workflows help you get documents reviewed and approved efficiently. You can also assign documents to people to add content, publish, or validate content.
  • Granular sub-folder permissions
    When fellow employees and outside business partners collaborate on a project, you may want collaborators to have different levels of control over the files contained in the folder to protect against file deletions and other unauthorised modifications. Gain the ability to assign four different access levels to project folders: Viewer, Editor, Full, and Owner.
  • File link expiry & password-protected links
    Set your file link expiry date before sharing a linked document and set passwords to protect your links and access to documents.
  • Mobile form filling
    Users who work on PDF files now have the tools for fast and easy editing. It reduces the time needed for file preparation as you can do it on the go within one app. It also reduces the costs of annotations. Individuals, teams, and organisations now have a new way of collaboration using their smartphones and tablets. With mobile form filling, you can fill out forms directly on your mobile device, with support for almost all PDF editable fields (input text, signature, dropdown, checkbox, etc.). The filled-out documents can be edited or previewed at any time. Previewing filled-out documents can also be done through the WebUI - the same document can then be viewed and worked on from multiple devices.
  • Smart local file caching & public cloud file caching (PCC)
    Determine the nearest Smart Cache device using network tests for bandwidth and latency and connect to the appropriate device or the cloud. This ensures users can seamlessly access their files in the most optimal way while moving between offices using the Desktop App. Smart Cache devices are effortlessly monitored and managed in the cloud. IT administrators can remotely check device synchronisation status, authorise user or group access, and perform software upgrades for all registered devices. Smart Cache enables file copying over a UNC path from various devices like network scanners, printers, lab instruments, and drones. This feature caters to situations where the host machines cannot have the Desktop App installed and a UNC path is the only available option to upload files from the device. In SMB collaboration mode, Smart Cache allows users to co-edit Revit files with enabled work sharing. This feature is designed specifically for the AEC industry, enabling real-time collaboration among peer designers working on Revit applications. Multi-User Civil 3D Support: In SMB collaboration mode, Smart Cache allows multiple users to work on single Civil 3D files. This feature allows Civil 3D master file to load cross-reference files faster and thus increasing the performance of the application loading time.
  • Mobile PDF annotation
    Annotate and fill out PDF files on mobile devices
  • Project folders
    Project folders can be created to assign a specific folder and its contents to a particular project within your organisation. A project can exist for any purpose regardless of industry, but it is most commonly used in architecture, engineering, and construction. By marking a folder as a project folder, a Project name, Project ID, Project description, Project status (active, closed, etc.) and more can be assigned to the folder for richer life-cycle tracking capabilities.
  • Egnyte Snapshots
    Allows you to restore your data to a previous state, useful for recovery from Ransomware attacks. Snapshot backup schedule: 0-7 days: Every 4 hours (6 snapshots available per day) 8-15 days: Every 12 hours (2 snapshots available per day) 16-30 days: Every 24 hours (1 snapshot available per day)

Access governance

  • Two factor authentication app
    Make your account even more secure using two-step login verification (TSLV). TSLV requires a third piece of information, in addition to your username and password, to log you in. This includes logging in from the web UI, the mobile app, or the desktop app.
  • Strong password policy enforcement
  • Global file access policies
  • Mobile device control
    The device dashboard shows the full list of devices which have accessed your account. There are two pages: one for personal devices (like smartphones and laptops) and another for storage devices (like Storage Sync and Smart Cache (FKA Turbo). You can remove and remote wipe devices.
  • Desktop device control
  • Sensitive data access monitoring
    Calculates a risk score for each file and each location on a scale of 1 to 9 based on the type of contained sensitive content. Locations with more files containing more sensitive content will have higher risk scores. For example, a folder containing files with highly sensitive information such as employee national insurance numbers will have higher risk scores, while a folder containing just files with telephone numbers will have lower risk scores.
  • Sensitive data location control
  • Unified folder permissions viewer
    The permissions browser lets you quickly search and find which users and groups have access to which folders. You can also see what permission level they have and who granted the permissions. It makes it easy to see who has access to your sensitive data.
  • Two factor authentication SMS or voice
    Allow SMS or voice call methods for 2FA

Discovery and classification

  • Sensitive content classification
  • Custom classification policies
    Create custom classification policies to classify content by file and path names
  • OCR classification for text in images
    Text is extracted from images, analysed and categorised, helping you to organise your files more efficiently
  • Document type identification
  • Language country support
    Multi-language translation built in

Lifecycle management

  • Trash retention
    Up to 180 days
  • Unified analytics and reporting
  • Custom lifecycle policy creation engine
  • Automated file retention
  • Automated file archiving
  • Automated defensible delete
  • Redundant, obsolete, trivial (ROT) data management

Data controls

  • Encryption in transit (SSL)
    All data transmission, including uploads, downloads, and browsing is encrypted using 256-bit AES protocol
  • Encryption in rest
  • Sensitive content safeguards
  • Secure delivery - specific recipients
    Create links that allow the downloading of encrypted files. A way for link creators to control access to files after they have been downloaded.
  • Secure delivery with encryption
  • Watermarking
    Easily apply watermarks to files viewed through a preview-only file link. Watermarks can be set at any time, regardless of when the file was created.
  • Encryption key management

Threat management

  • Ransomware malware protection
  • Ransomware artifact detection
  • Ransomware alert
  • User individual file recovery
    User individual file recovery protects you from the Crypto virus, a type of ransomware that encrypts files stored on your local or network drive so that they are effectively inaccessible to you. Once your files are encrypted, it then offers to decrypt the data if a ransom is paid. The ransomware can be particularly troublesome once the encrypted data syncs to the cloud and down to other user devices. Our solution monitors content sources and provides early detection of ransomware. In fact, your files can be restored to their original state. While we’ve had 100% success rate in restoring customer’s data to date, the continued evolution of this ransomware is a risk for potential data loss.
  • Antivirus scan on all uploads
    Keeping your data safe and private is of utmost concern to us. We've utilised a range of security and encryption techniques to ensure that your data is secure. We use encryption techniques on all access routes. All data transmission, including uploads, downloads, and browsing is encrypted using 256-bit AES protocol. Passwords stored locally and in the Cloud are always encrypted, and your data at rest is encrypted. Browser access is just as safe as conducting a banking transaction. No data can be hacked or intercepted, owing to the encryption used.
  • Support services file recovery
  • Enhanced malware protection
    Strong malware protection capabilities prevent your domain from becoming a conduit for spreading malware in your organisation. Scan all data uploaded via any channel to your domain for malware. Scans are performed asynchronously after a file is uploaded to your domain. Files identified to contain malware are quarantined and available to your administrator. Any synced copies of the file are also deleted to protect your endpoint, storage sync and smart cache devices.
  • Security issue alerting
  • Unusual user behaviour detection
  • Suspicious login detection

Privacy and compliance

  • HIPAA compliant storage
    Maintain compliance with the strictest standards to ensure privacy and data protection. Gain complete control over where the data resides. This is particularly useful for those in highly-regulated industries (e.g. financial services, healthcare) and regulatory environments, such as the EU. We understand the importance of confidentiality and protection of an individual's protected health information (PHI). Comprehensive data security enables HIPAA compliance for payer, provider, pharmaceutical and biomedical businesses.
  • FINRA compliant storage
    FINRA-compliant online storage solution with complete end-to-end data protection. Enables full compliance under SEC 17a, 31a, 204 recordkeeping regulations for confidential data storage, retention, digitalisation and accessibility.
  • SOC2 compliant storage
    SOC 2 SSAE 18 Type 2 compliant storage ensures that your data is securely managed to protect the interests of your organisation and the privacy of all clients. This is supported by a SOC 2 attestation report issued by an independent auditor whose role is to assess our compliance within selected trust services categories.
  • GDPR UK data residency
  • ISO/IEC 27001 compliant storage
    For customers that need to comply with the minimum cybersecurity standards set by DFARS, you need the necessary controls in place to meet the NIST 800-171 requirements through the implementation of the ISO27001 controls. Our information security management system is ISO/IEC 27001:2013 certified. This certification is the leading global information security standard, and it outlines the policies and controls that organisations put in place to manage risk and secure their data.
  • Audit reporting
  • Legal hold
    A legal hold retains content related to a legal matter, securing all files created by selected users (referred to as custodians) within the specified date range. Typically, legal holds occur when litigation is pending or anticipated, when your organisation is subject to a government investigation or internal audits, or when any other matter forces your company to hold on to its records.
  • Breach reporting
    When the subject requests a summary of information collected about them, an Admin should submit a Notification SAR. The workflow notifies Administrators about completed requests, which can be inspected and exported. When a subject requests deletion of personal information collected about them, an Admin should submit a Right-to-be-Forgotten SAR. The workflow gives Administrators a one-click deletion option after the request is completed.
  • Subject access request workflow
  • Banking and financial compliance patterns
  • Healthcare compliance patterns
  • European compliance patterns

Governed data sources

  • Egnyte cloud
  • Connected desktop folders
  • Windows file server
  • Microsoft 365
  • Google Workshop
  • Box

  • Advanced Plans

The Complete

Bleeding-edge productivity and security, Cyber Essentials Plus certification, comprehensive compliance solutions, smart management tools and consultancy.

£195

£175

£165

Microsoft 365 E3

Word logo Excel logo PowerPoint logo Teams logo Outlook logo onedrive logo Publisher logo microsoft access logo Exchange logo SharePoint logo azure logo Yammer logo Bookings logo

Everything in Regulator, plus


  • Egnyte's Enterprise System
  • Cyber Essentials Plus
  • GDPR readiness certification
  • CTO consultancy
  • Data residency
  • Data sovereignty
  • Advanced AI ransomware and recovery
  • Penetration testing
  • Vulnerability testing

This Plan includes


Help desk

  • Unlimited++ helpdesk support
  • Helpdesk open between 08:00 - 22:00 Mon - Fri
  • Saturday and Sunday opening, 10:00 - 17:00
  • Full ticket management
  • Client portal access
    Our client portal provides two levels of access for different user roles. All employees can use Level 1, which is a basic but effective tool. You can create and view tickets, as well as chat with our support team directly to solve problems faster. Level 2 is for managers or stakeholders who need more functionality, such as requesting new staff, transfers, or terminations; ordering onsite support or hardware; and accessing documents like Cyber Essentials certificates, PI documents, liability insurance certificates, contracts, Microsoft NCE agreements, and more.
  • Service level agreement
  • Monthly reporting

Onsite support

  • Next day onsite support (P4)
    Next day onsite support for tickets escalated from our support team before 13:00 - No callout fee - free for first 480 minutes
  • IT manager meetings
    You will have a regular meeting with your assigned IT manager, who will be your trusted partner and advisor for all your IT needs. In these sessions, we will work together to create a strategic plan for your IT infrastructure, address any HR-related issues such as access rights, onboarding and offboarding, and manage any ongoing or upcoming projects. You will get one half-day visit every two months for every 10 users you subscribe to our service.
  • Deskside support
    A regular appointment with your assigned IT manager or technician. During these sessions, your IT manager or technician will provide local support to your users. Deskside support is highly personalised and provides expert support to your designated head of IT. Assistance includes but is not limited to: laptop/desktop rebuilds, personal device assistance, office desk moves, and much more. You will receive 1 half day visit (every two months) per 10 subscribed users.

Starters, movers & leavers

  • Installation and deployment of patch management, endpoint detention and response apps
  • Basic inventory management
  • Installation & setup of Microsoft 365
  • Configuration of shared calendars
  • Access to OneDrive and SharePoint
  • Hardware procurement and fulfilment
  • Data transfer and email management for leavers
  • Installation of cloud file server
  • Folder permissions and testing
    Folder permissions in Egnyte are a powerful feature that allow us to control who can access, edit, and share your files and folders within your organisation. Our team can set permissions at the folder level, or inherit them from the parent folder. We can also assign different permissions to different groups or users, depending on their roles and needs. Folder permissions help you to protect your data, collaborate efficiently, and comply with security policies.
  • Serial number and warranty management
  • Security awareness gap analysis
  • Collection and reconditioning of hardware
  • A personal introductory call to introduce the IT Helpdesk to explain services and answer questions

Patch management

  • Security patches, bug fixes and feature updates
    Security patches, bug fixes and feature updates are three types of software updates that aim to improve the performance, security and functionality of a software product. Security patches are updates that fix vulnerabilities or flaws in the software that could be exploited by hackers or malicious programs. Bug fixes are updates that resolve errors or glitches in the software that affect its functionality or usability. Feature updates are updates that add new or enhanced features to the software that improve its user experience or capabilities. Whilst these are delivered ad-hoc we make sure that these are rolled out and completed every Wednesday evening, leaving you updated with any compliance.
  • Automated Microsoft patch management
  • Vulnerability management
  • ITIL compliance

Remote monitoring & management

  • Drag and drop automation
  • Asset discovery and inventory tracking
  • Attended and unattended support
  • Response automation & self-healing

Endpoint detection & response

  • Extended detection and response (XDR)
    EDR is a powerful solution that provides comprehensive visibility, detection, and response capabilities across endpoints, networks, and cloud environments. EDR leverages artificial intelligence and machine learning to automatically identify and stop threats in real time, reducing the workload and complexity of security operations. EDR also enables proactive hunting, forensic analysis, and remediation of incidents, enhancing security posture and resilience.
  • Setup, configuration & support
  • Identifying malicious behaviors
  • Incident response tooling
  • Insider threat & deception
  • Attack surface management

Email protection to secure & scale your business

  • Detect phishing and protect in real time with collective threat intelligence and machine learning
  • Secure inbound and encrypted email with full SPF/DKIM/DMARC support
  • Provide advanced email protection

Your Microsoft Office 365 plan

  • Office 365 E3
  • Desktop version of Office apps with premium features
  • Word, Excel, PowerPoint, Teams, Outlook, Exchange, OneDrive, SharePoint, Access & Publisher
  • 1TB of cloud storage per user
  • Business-class email
  • Attendee registration and reporting tools
  • Manage customer appointments
  • Advanced security
  • Access to data control
  • Threat protection
  • PC and mobile device management
  • Information protection
  • Advanced compliance
  • Advanced analytics

Office 365 advanced monitoring & management services

  • Impossible login ticketing & alerting
  • Location lockdown
  • Email forwarding alerts
  • Password expiry notifications
  • Block external inbox rules
  • Monitor admin roles
  • Internal spoofing protection
  • Employee login track & trace
  • License reporting

365 cloud backup

  • Full backup included
  • Calendars, tasks, and attachments backup for both Microsoft 365 and Google Workspace
  • Back up Outlook, OneDrive, SharePoint, Contacts, Calendars, Tasks, Groups & Teams (Microsoft 365)
  • Insights email business intelligence
  • Closes common Office 365 data protection gaps
  • Supports compliance efforts

Microsoft Teams phone system

  • Teams phone system
    - Teams phone is a cloud-based phone system that integrates with Microsoft 365 and allows you to make and receive calls from anywhere, on any device. - Offering advanced features such as call routing, auto attendants, voicemail, call recording, and analytics, to help you manage your communications more efficiently and professionally. - Enables you to collaborate with your colleagues and customers more easily, by using chat, video, and screen sharing within the same app. - Helps you save money and simplify your IT management, by eliminating the need for separate phone systems and hardware, and by providing a unified security and compliance framework across Microsoft 365. - Supports a wide range of devices and accessories, such as desk phones, headsets, speakers, and conference phones, to suit your preferences and needs.
  • Unlimited domestic calls to landline and mobile (£6.00)

Security awareness training

  • Automated cyber awareness training
  • Onboarding gap analysis testing
    A security awareness gap analysis review is a process of evaluating the current level of security awareness among employees in an organisation. It identifies the strengths and weaknesses of the existing security awareness program, and the areas where improvement is needed. The purpose of the review is to enhance the security culture and behavior of the employees, and to reduce the risk of human error, negligence, or malicious actions that could compromise the confidentiality, integrity, or availability of the organisation's information assets.
  • Training unique to your employees' security weaknesses
  • Building a culture of security with employee progress reporting
  • A GDPR & Cyber Essentials certification requirement
  • Add your own in-house training assessments

Everything you need to measure & reduce phishing vulnerability

  • Automated phishing simulations
  • Ready-made template library
  • Monitor user risk
  • In-depth reporting
  • Seasonal campaigns
  • Managed phishing campaigns

Policy management – fit for compliance

  • Full library of prewritten polices from a centralised document library
  • Create your own policies
  • Policy version control
  • Automatic policy updates with eSign

Dark web monitoring

  • Detect compromised data
  • Identify what data is exposed
  • Get notified when new breaches are found
  • Encourage secure email and password use

Appropriately supporting staff to ensure they make a positive contribution

  • Client success manager
  • Supportive and active campaigns to encourage participation
  • Direct employee contact

Cyber Essentials certification

  • Identify and address weaknesses in your cybersecurity measures, increasing confidence and trust in your business. Qualify for government contracts and tenders and save on cyber insurance premiums with Cyber Essentials
  • Simply being certified can reduce your cyber risk by up to 98.5%. And, it’s a great way to demonstrate to new customers and partners that you take cybersecurity seriously – helping you grow as well as stay safe.
  • Like CE, Cyber Essentials Plus covers everything your business should do to protect itself from 98.5% of cyberattacks. But, there’s one key difference:
  • Cyber Essentials Plus also includes an independent assessment carried out by one of our licensed auditors. This gives you complete peace of mind that your cybersecurity is up to scratch.

Email signature management

  • Centrally control the look and feel of email signatures
  • Maintain a consistent brand across business emails
  • Email compliance for GDPR
  • Creative departmental marketing

Egnyte file sharing and collaboration

  • Desktop & mobile apps
    The Desktop App provides fast real-time access to your files and folders stored in the cloud from your computer. Once connected, all content you can access in the cloud will appear in a network drive in Windows Explorer or volume on Mac Finder. You will be able to view all your files and folders in the cloud without having to sync them to your computer first. Furthermore, you'll also be able to select specific folders to be synchronised for access, even when you are offline. Mobile App - Extend the office through your mobile device and work from anywhere with ease. Collaborate seamlessly with internal and external users and boost your organisation’s productivity. The Egnyte mobile app supports iOS and Android platforms for phones and tablets. Access your data, preview files and folders, upload new content, and collaborate through shared folders and file links when you want, wherever you are.
  • 100GB per user up to 10TB
    Additional storage available upon request
  • File size up to 100GB
  • 1-click co-editing in Microsoft Office & Google Workspace
    Native integrations help you centralise content, battle sprawl and maintain file consistency, giving everyone a unified experience. With a single secure source of truth, users get work done in the right application - like M365, Google Workspace, Slack and many industry-unique apps. For peace of mind it safeguards the flow of content across every app your teams use.
  • File and folder sharing
    If you want to share a file with someone without requiring them to log in, send them a link to a specific file. When your colleague clicks on the link, Egnyte will generate a preview of your file. Your partner can review it there or download the file.
  • File versioning and upload links
    Appending file names with indicators like v 2.1 and 2013 03 23 is an inconvenient way to track the iterations of a file and dramatically increases your storage needs. By contrast, Egnyte automatically creates a new version of a file each time a change is saved for an existing document. Your Administrator has set up version policies to dictate how many versions are collected before the old versions are moved to trash. Read on to learn more about file versions and how to "promote" old versions to replace the existing file. Upload links are a great way for people outside your Egnyte account to upload content to a specific shared folder, without being able to see the contents of that folder. Construction companies may need to securely solicit bids from subcontractors, but don't want them to see their competitors’ pricing or a university professor wants a way for students to upload problem sets without peeking at each other's answers. Upload links can solve both of these dilemmas.
  • File and folder templates
    Many organisations repeatedly use the same structure of files or folders in their processes. Your use cases might be different, but to illustrate, we've given a couple of examples below: Company A has a default presentation template that should be used by all employees to keep the branding and messaging consistent externally. Company B works on several projects. Any project should include the same static list of folders due to public regulations. Our file sharing software improves file sharing processes and allows easier management and access to templates.
  • Video playback
    Video files are an increasingly common file type to upload and share. With web UI preview capabilities, a user can see video previews for all formats, not just for formats natively supported for preview in the user’s web browser.
  • Single-step approval workflow
    Review and approval workflows help you get documents reviewed and approved efficiently. You can also assign documents to people to add content, publish, or validate content.Review and approval workflows help you get documents reviewed and approved efficiently. You can also assign documents to people to add content, publish, or validate content.
  • Granular sub-folder permissions
    When fellow employees and outside business partners collaborate on a project, you may want collaborators to have different levels of control over the files contained in the folder to protect against file deletions and other unauthorised modifications. Gain the ability to assign four different access levels to project folders: Viewer, Editor, Full, and Owner.
  • Smart local file caching & public cloud file caching (PCC)
    Set your file link expiry date before sharing a linked document and set passwords to protect your links and access to documents.
  • Mobile form filling
    Users who work on PDF files now have the tools for fast and easy editing. It reduces the time needed for file preparation as you can do it on the go within one app. It also reduces the costs of annotations. Individuals, teams, and organisations now have a new way of collaboration using their smartphones and tablets. With mobile form filling, you can fill out forms directly on your mobile device, with support for almost all PDF editable fields (input text, signature, dropdown, checkbox, etc.). The filled-out documents can be edited or previewed at any time. Previewing filled-out documents can also be done through the WebUI - the same document can then be viewed and worked on from multiple devices.
  • Smart local file caching & public cloud file caching (PCC)
    Determine the nearest Smart Cache device using network tests for bandwidth and latency and connect to the appropriate device or the cloud. This ensures users can seamlessly access their files in the most optimal way while moving between offices using the Desktop App. Smart Cache devices are effortlessly monitored and managed in the cloud. IT administrators can remotely check device synchronisation status, authorise user or group access, and perform software upgrades for all registered devices. Smart Cache enables file copying over a UNC path from various devices like network scanners, printers, lab instruments, and drones. This feature caters to situations where the host machines cannot have the Desktop App installed and a UNC path is the only available option to upload files from the device. In SMB collaboration mode, Smart Cache allows users to co-edit Revit files with enabled work sharing. This feature is designed specifically for the AEC industry, enabling real-time collaboration among peer designers working on Revit applications. Multi-User Civil 3D Support: In SMB collaboration mode, Smart Cache allows multiple users to work on single Civil 3D files. This feature allows Civil 3D master file to load cross-reference files faster and thus increasing the performance of the application loading time.
  • Mobile PDF annotation
    Annotate and fill out PDF files on mobile devices
  • Project folders
    Project folders can be created to assign a specific folder and its contents to a particular project within your organisation. A project can exist for any purpose regardless of industry, but it is most commonly used in architecture, engineering, and construction. By marking a folder as a project folder, a Project name, Project ID, Project description, Project status (active, closed, etc.) and more can be assigned to the folder for richer life-cycle tracking capabilities.
  • Egnyte Snapshots
    Allows you to restore your data to a previous state, useful for recovery from ransomware attacks. Snapshot backup schedule: 0-7 days: Every 4 hours (6 snapshots available per day) 8-15 days: Every 12 hours (2 snapshots available per day) 16-30 days: Every 24 hours (1 snapshot available per day)

Access governance

  • Two factor authentication app
    Make your account even more secure using two-step login verification (TSLV). TSLV requires a third piece of information, in addition to your username and password, to log you in. This includes logging in from the web UI, the mobile app, or the desktop app.
  • Strong password policy enforcement
  • Global file access policies
  • Mobile device control
    The device dashboard shows the full list of devices which have accessed your account. There are two pages: one for personal devices (like smartphones and laptops) and another for storage devices (like Storage Sync and Smart Cache (FKA Turbo). You can remove and remote wipe devices.
  • Desktop device control
  • Sensitive data access monitoring
    Calculates a risk score for each file and each location on a scale of 1 to 9 based on the type of contained sensitive content. Locations with more files containing more sensitive content will have higher risk scores. For example, a folder containing files with highly sensitive information such as employee national insurance numbers will have higher risk scores, while a folder containing just files with telephone numbers will have lower risk scores.
  • Sensitive data location control
    The permissions browser lets you quickly search and find which users and groups have access to which folders. You can also see what permission level they have and who granted the permissions. It makes it easy to see who has access to your sensitive data.
  • Unified folder permissions viewer
    The permissions browser lets you quickly search and find which users and groups have access to which folders. You can also see what permission level they have and who granted the permissions. It makes it easy to see who has access to your sensitive data.
  • Two factor authentication SMS or voice
    Allow SMS or voice call methods for 2FA

Discovery and classification

  • Sensitive content classification
  • Custom classification policies
    Create custom classification policies to classify content by file and path names
  • OCR classification for text in images
    Text is extracted from images, analysed and categorised, helping you to organise your files more efficiently
  • Document type identification
  • Language country support
    Multi-language translation built in

Lifecycle management

  • Trash retention
    Up to 180 days
  • Unified analytics and reporting
  • Custom lifecycle policy creation engine
  • Automated file retention
  • Automated file archiving
  • Automated defensible delete
  • Redundant, obsolete, trivial (ROT) data management

Data controls

  • Encryption in transit (SSL)
    All data transmission, including uploads, downloads, and browsing is encrypted using 256-bit AES protocol
  • Encryption in rest
  • Sensitive content safeguards
  • Secure delivery - specific recipients
    Create links that allow the downloading of encrypted files. A way for link creators to control access to files after they have been downloaded.
  • Secure delivery with encryption
  • Watermarking
    Easily apply watermarks to files viewed through a preview-only file link. Watermarks can be set at any time, regardless of when the file was created.
  • Encryption key management

Threat management

  • Ransomware malware protection
  • Ransomware artifact detection
  • Ransomware alert
  • User individual file recovery
    User individual file recovery protects you from the Crypto virus, a type of ransomware that encrypts files stored on your local or network drive so that they are effectively inaccessible to you. Once your files are encrypted, it then offers to decrypt the data if a ransom is paid. The ransomware can be particularly troublesome once the encrypted data syncs to the cloud and down to other user devices. Our solution monitors content sources and provides early detection of ransomware. In fact, your files can be restored to their original state. While we’ve had 100% success rate in restoring customer’s data to date, the continued evolution of this ransomware is a risk for potential data loss.
  • Antivirus scan on all uploads
    Keeping your data safe and private is of utmost concern to us. We've utilised a range of security and encryption techniques to ensure that your data is secure. We use encryption techniques on all access routes. All data transmission, including uploads, downloads, and browsing is encrypted using 256-bit AES protocol. Passwords stored locally and in the Cloud are always encrypted, and your data at rest is encrypted. Browser access is just as safe as conducting a banking transaction. No data can be hacked or intercepted, owing to the encryption used.
  • Support services file recovery
  • Enhanced malware protection
    Strong malware protection capabilities prevent your domain from becoming a conduit for spreading malware in your organisation. Scan all data uploaded via any channel to your domain for malware. Scans are performed asynchronously after a file is uploaded to your domain. Files identified to contain malware are quarantined and available to your administrator. Any synced copies of the file are also deleted to protect your endpoint, storage sync and smart cache devices.
  • Security issue alerting
  • Unusual user behaviour detection
  • Suspicious login detection

Privacy and compliance

  • HIPAA compliant storage
    Maintain compliance with the strictest standards to ensure privacy and data protection. Gain complete control over where the data resides. This is particularly useful for those in highly-regulated industries (e.g. financial services, healthcare) and regulatory environments, such as the EU. We understand the importance of confidentiality and protection of an individual's protected health information (PHI). Comprehensive data security enables HIPAA compliance for payer, provider, pharmaceutical and biomedical businesses.
  • FINRA compliant storage
    FINRA-compliant online storage solution with complete end-to-end data protection. Enables full compliance under SEC 17a, 31a, 204 recordkeeping regulations for confidential data storage, retention, digitalisation and accessibility.
  • SOC2 compliant storage
    SOC 2 SSAE 18 Type 2 compliant storage ensures that your data is securely managed to protect the interests of your organisation and the privacy of all clients. This is supported by a SOC 2 attestation report issued by an independent auditor whose role is to assess our compliance within selected trust services categories.
  • GDPR EU data residency
  • ISO/IEC 27001 compliant storage
  • Audit reporting
  • Legal hold
    A legal hold retains content related to a legal matter, securing all files created by selected users (referred to as custodians) within the specified date range. Typically, legal holds occur when litigation is pending or anticipated, when your organisation is subject to a government investigation or internal audits, or when any other matter forces your company to hold on to its records.
  • Breach reporting
    When the subject requests a summary of information collected about them, an Admin should submit a Notification SAR. The workflow notifies Administrators about completed requests, which can be inspected and exported. When a subject requests deletion of personal information collected about them, an Admin should submit a Right-to-be-Forgotten SAR. The workflow gives Administrators a one-click deletion option after the request is completed.
  • Audit reporting
  • Legal hold
    A legal hold retains content related to a legal matter, securing all files created by selected users (referred to as custodians) within the specified date range. Typically, legal holds occur when litigation is pending or anticipated, when your organisation is subject to a government investigation or internal audits, or when any other matter forces your company to hold on to its records.
  • Breach reporting
    When the subject requests a summary of information collected about them, an Admin should submit a Notification SAR. The workflow notifies Administrators about completed requests, which can be inspected and exported. When a subject requests deletion of personal information collected about them, an Admin should submit a Right-to-be-Forgotten SAR. The workflow gives Administrators a one-click deletion option after the request is completed.
  • Subject access request workflow
  • Banking and financial compliance patterns
  • Healthcare compliance patterns
  • European compliance patterns

Governed data sources

  • Egnyte cloud
  • Connected desktop folders
  • Windows file server
  • Microsoft 365
  • Google Workshop
  • Box

  • Not for profit

The Essentials

Vendor discounted managed services to empower your frontline workforce to do their best work with essential support, productivity apps and cloud services.

To apply, you need to have a valid UK charity number. We reserve the right to approve or reject your application at our sole discretion.

£37

£33

£29

Microsoft 365 Business Standard

Word logo Excel logo PowerPoint logo Teams logo Outlook logo onedrive logo Publisher logo microsoft access logo

  • Helpdesk support
  • Secure configuration of 365 Business Standard
  • Desktop versions of Office apps
  • OneDrive support
  • Business spam filtering
  • Multi-factor authentication (MFA)
  • 365 cloud data backup
  • Patch management
  • Remote monitoring management (RMM)
  • Endpoint detection and response

This Plan includes


Help desk

  • 120 minutes of helpdesk support per user per annum - pooled
  • Support desk open between 09:00 - 17:00 Mon - Fri
  • Full ticket management

Onsite support

  • Not included

Starters, movers & leavers

  • Installation and deployment of patch management, endpoint detention and response apps
  • Basic inventory management
  • Installation & setup of Microsoft 365
  • Access to OneDrive and SharePoint
  • Hardware procurement and fulfilment
  • Data transfer and email management for leavers

Patch management

  • Security patches, bug fixes and feature updates
    Security patches, bug fixes and feature updates are three types of software updates that aim to improve the performance, security and functionality of a software product. Security patches are updates that fix vulnerabilities or flaws in the software that could be exploited by hackers or malicious programs. Bug fixes are updates that resolve errors or glitches in the software that affect its functionality or usability. Feature updates are updates that add new or enhanced features to the software that improve its user experience or capabilities. Whilst these are delivered ad-hoc we make sure that these are rolled out and completed every Wednesday evening, leaving you updated with any compliance.
  • Automated Microsoft patch management

Remote monitoring & management

  • Drag and drop automation
  • Asset discovery and inventory tracking
  • Attended and unattended support
  • Response automation & self-healing
  • Remote policy deployment

Endpoint detection & response

  • Next generation EDR anti-virus software
    EDR is a powerful solution that provides comprehensive visibility, detection, and response capabilities across endpoints, networks, and cloud environments. EDR leverages artificial intelligence and machine learning to automatically identify and stop threats in real time, reducing the workload and complexity of security operations. EDR also enables proactive hunting, forensic analysis, and remediation of incidents, enhancing security posture and resilience.
  • Setup, configuration & support
  • Identifying malicious behaviours

Email protection to secure & scale your business

  • Detect phishing and protect in real time with collective threat intelligence and machine learning
  • Secure inbound and encrypted email with full SPF/DKIM/DMARC support
  • Advanced email protection

Your Microsoft Office 365 plan

  • Microsoft 365 Business Standard - Upgrade to 365 Business Premium for £9.36 or Office 365 E3 for £16.50
  • Desktop versions of Office apps with premium features
  • Word, Excel, PowerPoint, Teams, Outlook, Exchange, OneDrive, SharePoint, Access & Publisher
  • 1TB of cloud storage per user
  • Business-class email
  • Standard security

Office 365 advanced monitoring & management services

  • Impossible login ticketing & alerting
  • Location lockdown
  • Email forwarding alerts
  • Password expiry notifications
  • Block external inbox rules
  • Monitor admin roles
  • Internal spoofing protection

365 cloud backup

  • Full backup
  • Calendars, tasks, and attachments backup for both Microsoft 365 and Google Workspace
  • Insights email business intelligence
  • Closes common Office 365 data protection gaps
  • Supports compliance efforts

Microsoft Teams phone system

  • Available as an add-on (£6.60)
    - Teams phone is a cloud-based phone system that integrates with Microsoft 365 and allows you to make and receive calls from anywhere, on any device. - Offering advanced features such as call routing, auto attendants, voicemail, call recording, and analytics, to help you manage your communications more efficiently and professionally. - Enables you to collaborate with your colleagues and customers more easily, by using chat, video, and screen sharing within the same app. - Helps you save money and simplify your IT management, by eliminating the need for separate phone systems and hardware, and by providing a unified security and compliance framework across Microsoft 365. - Supports a wide range of devices and accessories, such as desk phones, headsets, speakers, and conference phones, to suit your preferences and needs.
  • Unlimited domestic calls to landline and mobile (£6.00)

Security awareness training

  • Not included

Everything you need to measure & reduce phishing vulnerability

  • Not included

Policy management – fit for compliance

  • Not included

Dark web monitoring

  • Not included

Appropriately supporting staff to ensure they make a positive contribution

  • Not included

Cyber Essentials certification

  • Available from £995.00 per year or £95.00 per month. Includes £25,000 cyber insurance cover

Email signature management

  • Not included

Egnyte file sharing and collaboration

  • Not included

Access governance

  • Two factor authentication app
    Make your account even more secure using two-step login verification (TSLV). TSLV requires a third piece of information, in addition to your username and password, to log you in. This includes logging in from the web UI, the mobile app, or the desktop app.
  • Strong password policy enforcement

Discovery and classification

  • Not included

Lifecycle management

  • Not included

Data controls

  • Not included

Threat management

  • Not included

Privacy and compliance

  • Not included

Governed data sources

  • Not included

Most Popular
  • Not for profit

The Premium

More for less, with generous vendor discounting get best-in-class managed IT services, support desk, productivity apps, core security and compliance capabilities.

To apply, you need to have a valid UK charity number. We reserve the right to approve or reject your application at our sole discretion.

£53

£47

£45

Microsoft 365 Business Standard

Word logo Excel logo PowerPoint logo Teams logo Outlook logo onedrive logo Publisher logo microsoft access logo

Everything in Essentials, plus


  • Egnyte Cloud File Server
  • Unlimited helpdesk support
  • Office 365 'track and trace' centre
  • Microsoft 365 advanced monitoring
  • Security awareness training
  • IT policy management
  • Threat protection simulations
  • Darkweb monitoring
  • Designated account manager
  • Cybersecurity GAP analysis

This Plan includes


Help desk

  • Unlimited helpdesk support
  • Helpdesk open between 08:00 - 18:00 Mon - Fri
  • Full ticket management
  • Client portal access
    Our client portal provides two levels of access for different user roles. All employees can use Level 1, which is a basic but effective tool. You can create and view tickets, as well as chat with our support team directly to solve problems faster. Level 2 is for managers or stakeholders who need more functionality, such as requesting new staff, transfers, or terminations; ordering onsite support or hardware; and accessing documents like Cyber Essentials certificates, PI documents, liability insurance certificates, contracts, Microsoft NCE agreements, and more.
  • Service level agreement

Onsite support

  • Next day onsite support (P1)
    Next day onsite support for tickets escalated from our support team before 13:00 - 50% discount on callout fee - saving you £75.00 on your first onsite hour.

Starters, movers & leavers

  • Installation and deployment of patch management, endpoint detention and response apps
  • Basic inventory management
  • Installation & setup of Microsoft 365
  • Access to OneDrive and SharePoint
  • Hardware procurement and fulfilment
  • Data transfer and email management for leavers
  • Installation of cloud file server
  • Folder permissions and testing
    Folder permissions in Egnyte are a powerful feature that allow us to control who can access, edit, and share your files and folders within your organisation. Our team can set permissions at the folder level, or inherit them from the parent folder. We can also assign different permissions to different groups or users, depending on their roles and needs. Folder permissions help you to protect your data, collaborate efficiently, and comply with security policies.
  • Serial number and warranty management
  • Security awareness gap analysis review
  • Collection and reconditioning of hardware

Patch management

  • Security patches, bug fixes and feature updates
    Security patches, bug fixes and feature updates are three types of software updates that aim to improve the performance, security and functionality of a software product. Security patches are updates that fix vulnerabilities or flaws in the software that could be exploited by hackers or malicious programs. Bug fixes are updates that resolve errors or glitches in the software that affect its functionality or usability. Feature updates are updates that add new or enhanced features to the software that improve its user experience or capabilities. Whilst these are delivered ad-hoc we make sure that these are rolled out and completed every Wednesday evening, leaving you updated with any compliance.
  • Automated Microsoft patch management
  • Test patches before implementation
  • Vulnerability management
  • ITIL compliance

Remote monitoring & management

  • Drag and drop automation
  • Asset discovery and inventory tracking
  • Attended and unattended support
  • Response automation & self-healing
  • Remote policy deployment
  • Remote software deployment

Endpoint detection & response

  • Next generation EDR anti-virus software
    EDR is a powerful solution that provides comprehensive visibility, detection, and response capabilities across endpoints, networks, and cloud environments. EDR leverages artificial intelligence and machine learning to automatically identify and stop threats in real time, reducing the workload and complexity of security operations. EDR also enables proactive hunting, forensic analysis, and remediation of incidents, enhancing security posture and resilience.
  • Setup, configuration & support
  • Identifying malicious behaviors

Email protection to secure & scale your business

  • Detect phishing and protect in real time with collective threat intelligence and machine learing
  • Secure inbound and encrypted email with full SPF/DKIM/DMARC support
  • Advanced email protection

Your Microsoft Office 365 plan

  • Microsoft 365 Business Standard - Upgrade to 365 Business Premium for £9.36 or Office 365 E3 for £16.50
  • Desktop versions of Office apps with premium features
  • Word, Excel, PowerPoint, Teams, Outlook, Exchange, OneDrive, SharePoint, Access & Publisher
  • 1TB of cloud storage per user
  • Business-class email
  • Standard security
  • Attendee registration and reporting tools
  • Manage customer appointments

Office 365 advanced monitoring & management services

  • Impossible login ticketing & alerting
  • Location lockdown
  • Email forwarding alerts
  • Password expiry notifications
  • Block external inbox rules
  • Monitor admin roles
  • Internal spoofing protection
  • Employee login track & trace
  • License reporting

365 cloud backup

  • Full backup
  • Calendars, tasks, and attachments backup for both Microsoft 365 and Google Workspace
  • Insights email business intelligence
  • Closes common Office 365 data protection gaps
  • Supports compliance efforts

Microsoft Teams phone system

  • Available as an add-on (£6.60)
    - Teams phone is a cloud-based phone system that integrates with Microsoft 365 and allows you to make and receive calls from anywhere, on any device. - Offering advanced features such as call routing, auto attendants, voicemail, call recording, and analytics, to help you manage your communications more efficiently and professionally. - Enables you to collaborate with your colleagues and customers more easily, by using chat, video, and screen sharing within the same app. - Helps you save money and simplify your IT management, by eliminating the need for separate phone systems and hardware, and by providing a unified security and compliance framework across Microsoft 365. - Supports a wide range of devices and accessories, such as desk phones, headsets, speakers, and conference phones, to suit your preferences and needs.
  • Unlimited domestic calls to landline and mobile (£6.00)

Security awareness training

  • Automated cyber awareness training
  • Onboarding gap analysis testing
    A security awareness gap analysis review is a process of evaluating the current level of security awareness among employees in an organisation. It identifies the strengths and weaknesses of the existing security awareness program, and the areas where improvement is needed. The purpose of the review is to enhance the security culture and behavior of the employees, and to reduce the risk of human error, negligence, or malicious actions that could compromise the confidentiality, integrity, or availability of the organisation's information assets.
  • Training unique to your employees' security weaknesses
  • Building a culture of security with employee progress reporting
  • A GDPR & Cyber Essentials certification requirement

Everything you need to measure & reduce phishing vulnerability

  • Automated phishing simulations
  • Ready-made template library
  • Monitor user risk
  • In-depth reporting
  • Weekly summary reports

Policy management – fit for compliance

  • Available as an add-on (£2.00)
  • Centralised document library
  • Choose up to 3 pre-written IT polices from a centralised document library
    The security of your systems depends on the safe behavior of your staff. You need to establish and communicate clear guidelines for preventing or reducing security incidents. This is not only a legal requirement, but also a way to protect your business, your staff and your clients. You should also have a cybersecurity staff handbook that explains the rules and expectations for your staff, and have them sign it as part of their training.
  • Create your own policies
  • Policy version control
  • Automatic policy updates with eSign

Dark web monitoring

  • Detection of compromised data
  • Identify what data is exposed
  • Get notified when new breaches are found
  • Encourage secure email and password use

Appropriately supporting staff to ensure they make a positive contribution

  • Not included

Cyber Essentials certification

  • Available from £995.00 per year or £95.00 per month. Includes £25,000 cyber insurance cover

Email signature management

  • Not included

Egnyte file sharing and collaboration

  • Egnyte Cloud File Server (CFS)
    Egnyte's entry level cloud server offering
  • Desktop & mobile apps
    The Desktop App provides fast real-time access to your files and folders stored in the cloud from your computer. Once connected, all content you can access in the cloud will appear in a network drive in Windows Explorer or volume on Mac Finder. You will be able to view all your files and folders in the cloud without having to sync them to your computer first. Furthermore, you'll also be able to select specific folders to be synchronised for access, even when you are offline. Mobile App - Extend the office through your mobile device and work from anywhere with ease. Collaborate seamlessly with internal and external users and boost your organisation’s productivity. The Egnyte mobile app supports iOS and Android platforms for phones and tablets. Access your data, preview files and folders, upload new content, and collaborate through shared folders and file links when you want, wherever you are.
  • 200GB per user up to 10TB
    Additional storage available upon request
  • File size up to 50GB
  • 1-click co-editing in Microsoft Office & Google Workspace
    Native integrations help you centralise content, battle sprawl and maintain file consistency, giving everyone a unified experience. With a single secure source of truth, users get work done in the right application - like M365, Google Workspace, Slack and many industry-unique apps. For peace of mind it safeguards the flow of content across every app your teams use.
  • File and folder sharing
    If you want to share a file with someone without requiring them to log in, send them a link to a specific file. When your colleague clicks on the link, Egnyte will generate a preview of your file. Your partner can review it there or download the file.
  • File versioning and upload links
    Appending file names with indicators like v 2.1 and 2013 03 23 is an inconvenient way to track the iterations of a file and dramatically increases your storage needs. By contrast, Egnyte automatically creates a new version of a file each time a change is saved for an existing document. Your Administrator has set up version policies to dictate how many versions are collected before the old versions are moved to trash. Read on to learn more about file versions and how to "promote" old versions to replace the existing file. Upload links are a great way for people outside your Egnyte account to upload content to a specific shared folder, without being able to see the contents of that folder. Construction companies may need to securely solicit bids from subcontractors, but don't want them to see their competitors’ pricing or a university professor wants a way for students to upload problem sets without peeking at each other's answers. Upload links can solve both of these dilemmas.
  • File and folder templates
    Many organisations repeatedly use the same structure of files or folders in their processes. Your use cases might be different, but to illustrate, we've given a couple of examples below: Company A has a default presentation template that should be used by all employees to keep the branding and messaging consistent externally. Company B works on several projects. Any project should include the same static list of folders due to public regulations. Our file sharing software improves file sharing processes and allows easier management and access to templates.
  • Video playback
    Video files are an increasingly common file type to upload and share. With web UI preview capabilities, a user can see video previews for all formats, not just for formats natively supported for preview in the user’s web browser.
  • Single-step approval workflow
    Review and approval workflows help you get documents reviewed and approved efficiently. You can also assign documents to people to add content, publish, or validate content.
  • Granular sub-folder permissions
    When fellow employees and outside business partners collaborate on a project, you may want collaborators to have different levels of control over the files contained in the folder to protect against file deletions and other unauthorised modifications. Gain the ability to assign four different access levels to project folders: Viewer, Editor, Full, and Owner.
  • File link expiry & password-protected links
    Set your file link expiry date before sharing a linked document and set passwords to protect your links and access to documents.
  • Egnyte Snapshots available as an add-on (£6.60)
    Allows you to restore your data to a previous state, useful for recovery from ransomware attacks. Snapshot backup schedule: 0-7 days: Every 4 hours (6 snapshots available per day) 8-15 days: Every 12 hours (2 snapshots available per day) 16-30 days: Every 24 hours (1 snapshot available per day)

Access governance

  • Two factor authentication app
    Make your account even more secure using two-step login verification (TSLV). TSLV requires a third piece of information, in addition to your username and password, to log you in. This includes logging in from the web UI, the mobile app, or the desktop app.
  • Strong password policy enforcement
  • Global file access policies

Discovery and classification

  • Not included

Lifecycle management

  • Trash retention
    Up to 180 days

Data controls

  • Encryption in transit (SSL)
    All data transmission, including uploads, downloads, and browsing is encrypted using 256-bit AES protocol
  • Encryption in rest

Threat management

  • Not included

Privacy and compliance

  • Not included

Governed data sources

  • Not included

The Secure


£13

Paid monthly

The Essentials


£49

Paid monthly

The Premium


£69

Paid monthly

Frequently asked questions.

The price you pay each month includes everything from initial onboarding, monthly license fees, account management & great IT support. All for one fixed price.
Yes you can. We will manage all your subscriptions such as Office 365 and Security applications.
Support is available by phone, through remote control and in person at your site.
You can call, email, or use our webchat service to contact the helpdesk.
We assign each client to a team of 5 IT support agents and an account manager. That way you’ll speak to the same IT support experts every time and enjoy excellent continuity.
No. We offer monthly, annual and bi-annual subscriptions which automatically renew at the end of their billing period unless otherwise instructed. Should you wish to cancel, you need to provide written notice at least 3 months prior to the renewal date.
Yes, you can. The longer the billing period, the better the price per month. But shorter billing periods offer more flexibility. A mixture of plans can help you achieve lower prices for low-turnover roles, and mean you’ll never have to overpay for licenses due to changes in workforce numbers in higher-turnover roles.
Downtime is minimal. As most services are cloud-based, user interruption is typically limited to 30 minutes per employee. Onboarding will be completed by one of our dedicated onboarding consultants, who will walk you through the process and inform you of what to expect at each step.
Yes, we can supply laptops, desktops, printers, firewalls, switches, and much more. We may also be able to find lower prices for the same quality hardware. In addition, we can arrange for the setup, including delivery and installation for starters, leavers, and upgrades for any hardware we supply.
IT Support can be complicated, it might be easier to speak to our experts who can explain and answer questions. Book your no obligation Teams meeting here and we’ll prepare the perfect proposal for your consideration.
Yes! We will complete a full site survey and if there’s something specialised that you need but we don’t support directly, we will recommend a trusted expert and work with them, making sure your needs are met and aiming to exceed expectations.

Get in Touch

Give us
a call

Give us a call and speak with an expert

Phone

Book FREE
consultation

A no obligation 15 minute call to discuss your needs

Book now

Send us
an email

We aim to reply to all enquiries within 48 hours

Email
Steve B smiling in suit
Starter Plans Advanced Plans Not for profit
See Our Plans
X