Email: Info@RemoteChase.com | Phone: 765-609-2567
Pendleton/Anderson Local Tech Deal!
Remote Chase will protect, monitor, and maintain your computers for an affordable price!
For $8/mo per computer, you’ll receive:
*In the rare case of a catastrophic virus, Remote Chase does not offer free data recovery. If remote access has been blocked, your computer will need to be brought to the store for virus removal.
Web Protection: $4/mo
Web protection at the device or network level to thwart drive-by malware, phishing, or other DNS-related attacks.
Web protection helps MSPs gain complete control over web-filtering policies, set website blocklists, and create time and content-based browsing policies from a single, easy-to-use, web based console.
Protect against malware downloads, phishing, adware, botnets, and spam threats
Block inappropriate content for the workplace, or limit access to social media sites during work hours.
Modify blacklist policies to allow users to visit sites outside of business hours.
Define and enforce browsing policies that keep users away from social media, web-based personal email, gaming, or other non work-related sites.
Daily Document Backup: $4/mo
Microsoft Office®, QuickBooks®, and Outlook® .PST files are automatically found and backed up, from the Documents folder or anywhere on the workstation.
Common files backed up include Microsoft Office®, QuickBooks®, and Outlook® .PST files, from the Documents folder or anywhere on the workstation. Open Office™, Visio®, and Mac® file types are also protected.
Backups run automatically twice each day, with automatic 28-day retention providing you with 56 restore points for recovery.
Document backups are stored in our private cloud, and includes unlimited cloud storage space.
Business EDR Antivirus: $6/mo
Compared to regular reactive antivirus programs, our EDR software takes a proactive approach: monitoring your computer constantly and can detect any strange behavior immediately.
We have the ability to tailor protection policies per customer. This means allowing/blocking USB or endpoint traffic and specifying the best automated response.
Enhanced quarantine options that let you disconnect the compromised endpoint from the network before it can spread further damage.
Get advanced threat detection, analyze active threats, and remediate faster.
Automatic rollback that contains and neutralizes attacks by replacing compromised files with the last known healthy version.