Transparent, Contractless Pricing
Explore Pricing Options That Scale With You.
Sign up for a FREE service. Credit card not required
SILVER | GOLD | PLATINUM | ||
---|---|---|---|---|
Services | ||||
24 X 7 Monitoring | Basic | Advanced | Advanced Custom | |
24 X 7 Support via Phone Chat and Email | ||||
Remote Management and Troubleshooting |
Server Uptime | ||||
---|---|---|---|---|
Vcpu Usage | ||||
Ram Usage | ||||
Disk Space | ||||
Read I/O Monitoring | ||||
Critical OS Related Services Monitoring | ||||
Custom Monitoring at Application Level | ||||
Azure Related Events Such As Service Or Region Failures |
Platform level support | ||||
---|---|---|---|---|
Onboarding | ||||
Azure resource management | ||||
Moving from one service tier to another | ||||
Initiating actions from pre-defined templates | ||||
Create runbooks in Azure | ||||
Configure webhooks | ||||
VM level support | ||||
Azure snapshot creation/restore | ||||
Managed OS upgrades and patching | ||||
Managed antivirus | ||||
Managed backup | ||||
Remote support and troubleshooting | ||||
Server deployments | Limited | |||
Hardware configuration changes | ||||
OS level configuration changes | ||||
Custom deployment activities | ||||
Review server logs | ||||
Review application error logs | ||||
Real time health reports and custom dashboards | ||||
Health checks |
Administration of Azure IAM | ||||
---|---|---|---|---|
Configuration and management of Azure Key Vault | ||||
Setup of Multi factor Authentication for cloud accounts | ||||
RBAC and subscription management | ||||
Single Sign-on | ||||
Azure Active Directory support |
Cloud cost budgeting, alerting and forecasting | ||||
---|---|---|---|---|
Recommendations for cost optimization | ||||
Resource right-sizing based on utilization | ||||
Reserved instance recommendations |
Provide recommendations for high availability | ||||
---|---|---|---|---|
Implement Azure platform specific HA solutions | ||||
Provide architectural guidance for Azure DR | ||||
Fully managed ASR based Azure DR |
Provide recommendations for network security | ||||
---|---|---|---|---|
Create NSG |