IT Service Proposal
1 / 16
Cloud Atlas Technologies
IT Service Proposal

Prepared for
Vision Development Group

Prepared by
Mario Szafranski
Company
Cloud Atlas Technologies
Location
Raritan, NJ
About Us
2 / 16
Who We Are

Your Trusted IT Partner in Raritan, NJ

Cloud Atlas Technologies helps businesses secure, support, and scale their technology with confidence. From proactive monitoring and data protection to hands-on support and strategic guidance — our solutions are custom-tailored to your unique needs. As your business evolves, Cloud Atlas is there every step of the way, helping you grow smarter and stay ahead of the technology curve.

🔒
Proactive, Not Reactive
We catch problems before they hit — zero surprises.
💰
Flat-Fee Monthly Rate
One simple rate — no surprises, complete coverage.
🤝
Local & Hands-On
Real people in Raritan, NJ — not a call center.
Google Reviews
⭐⭐⭐⭐⭐
5.0
Verified Client Reviews
🛡️
Prevent Downtime
24/7 monitoring keeps systems running around the clock.
Resolve Issues Fast
We fix problems before you even notice them.
🔗
Business Continuity
When disaster strikes, we keep your business running.
💡
Peace of Mind
Like electricity — always on, always reliable.
Support, Monitoring & Management
3 / 16
Managed Services

Support, Monitoring & Management

🖥️
Help Desk Support
Mon–Fri 9 AM–5 PM via phone, email, or ticket portal. After-hours emergency coverage included.
📡
Proactive Monitoring
24/7 network health, uptime & security visibility. Automated patching and real-time alerts.
🌐
Network Management
Firewalls, switches & access points. Firmware, config updates and hands-on troubleshooting.
Essentials Plan
Core coverage to keep your business running smoothly
🖥️
Proactive Maintenance
Real-time monitoring and system optimization to prevent downtime.
🛡️
Advanced Protection + Backup
Advanced antivirus, internet security, and daily doc backups — 28-day retention.
🤝
Unlimited Remote Support
Mon–Fri, 9 AM–5 PM via phone, email, or ticket portal.
📞
Vendor Coordination
We handle all communication with your third-party technology providers.
Peace of Mind Plan
Complete IT coverage with premium protection
🖥️
Proactive Maintenance
Real-time monitoring and system optimization to prevent downtime.
🛡️
Advanced Protection + Backup
Advanced antivirus, internet security, and daily doc backups — 28-day retention.
🤝
Unlimited Remote & Onsite Support
Mon–Fri, 9 AM–5 PM. Includes unlimited onsite visits at no additional charge.
📞
Vendor Coordination
We handle all communication with your third-party technology providers.
Security Suite
4 / 16
Cybersecurity

Comprehensive Security Suite

Layered protection from endpoint to network, with AI-driven threat detection and automated response — keeping every device safe and compliant.

🦠

Antivirus & Internet Security

Always-on protection against malware, ransomware, and online threats with centralized monitoring and automated remediation across every device.

  • Real-time virus & ransomware detection
  • Endpoint protection — all devices, one platform
  • Web & email threat blocking
🤖

EDR Security

AI-Enhanced Endpoint Detection & Response delivers continuous monitoring and automated response to stop zero-day attacks and insider threats before they spread.

  • AI-driven behavioral analysis
  • Automated threat quarantine & containment
  • Stops ransomware & insider threats
🌐

Domain Management

Complete DNS management, renewals, and protection against spoofing and hijacking — keeping your domain, email, and digital presence secure and always online.

  • DNS hijacking & spoofing protection
  • Automated renewals & monitoring
  • Seamless Microsoft 365 integration
Backup & Recovery
5 / 16
Data Protection

Backup & Disaster Recovery

AES-256 encrypted, geo-redundant cloud backups with rapid bare-metal recovery. Keep your business running no matter what happens.

📄

Document Backup

  • Included with Both Support Plans Daily document backup with 28-day retention is built into both our Essentials and Peace of Mind plans.
  • Automated File Detection Scans drives for Word, Excel, PowerPoint, PDFs, QuickBooks, and more.
  • 28-Day Retention Restore any file to any version from the past 28 days — protecting against accidental deletion and ransomware.
  • Encrypted Cloud Storage Secure and compliant with industry standards.
☁️

Full Image / Cloud Backup

  • Optional Add-On Full image backup is available as an upgrade for clients who need comprehensive system protection.
  • 5-Year Retention Retain full system images for up to 5 years — ideal for compliance and long-term data recovery needs.
  • Rapid Bare-Metal Recovery Restore a complete system to new hardware within minutes after catastrophic failure.
  • Entire System Protection Backs up OS, software, configurations, and all files for complete peace of mind.

Microsoft 365 Data Protection

Enterprise-grade email backup for Outlook with up to six daily snapshots, one-click point-in-time restore, and 7-year data retention. No overages.

Network Management
6 / 16
Managed Services

Enterprise Network — Managed & Monitored

We design, deploy, and fully manage your network infrastructure using Ubiquiti UniFi — enterprise-grade hardware with cloud-based centralized management. Every access point, switch, and gateway is monitored 24/7 and configured for peak performance, security, and reliability.

📡

UniFi Access Points

Seamless Wi-Fi 6 coverage across your entire facility — no dead zones, automatic band steering, and per-SSID VLAN segmentation to keep guest and business traffic separated.

🔀

Managed Switching

UniFi switches with full PoE support, port-level visibility, VLAN tagging, and traffic prioritization (QoS) to keep voice, video, and data flowing smoothly.

🛡️

UniFi Gateway & Firewall

Deep packet inspection, IDS/IPS threat detection, site-to-site VPN, and granular firewall rules — protecting your network perimeter around the clock.

☁️

UniFi Cloud Controller

All devices managed from a single pane of glass — remote configuration, firmware updates, real-time alerts, and full network topology visibility from anywhere.

🔍 Proactive Monitoring
24/7 visibility into uptime, bandwidth usage, client counts, and signal strength — issues flagged before users notice them.
🔒 Network Segmentation
Separate VLANs for staff, guests, IoT devices, and VoIP — isolating traffic to limit exposure and contain any breach automatically.
⚡ Remote Management
We push firmware updates, adjust configurations, troubleshoot connectivity, and reboot devices remotely — minimizing the need for on-site visits.
Microsoft 365
7 / 16
Microsoft 365 Project

Modern Productivity, Security & Collaboration

A full migration to Microsoft 365 Business Premium — enhancing productivity, collaboration, and security across your entire organization.

🚀

M365 Business Premium

Enhance productivity, collaboration, and security with Microsoft's most comprehensive platform.

🗂️

SharePoint Setup

Centralized, organized, and secure file access for your entire team.

🎓

Employee Training

Train staff on new tools to ensure smooth adoption and long-term efficiency.

🔐

Modern Security

MFA, device management, and data protection across your Microsoft environment.

Word
Excel
PowerPoint
Outlook
Teams
OneDrive
SharePoint
Exchange
Intune
Defender
Entra ID
Info Protect
Clipchamp
Loop
Microsoft Teams
8 / 16
Microsoft Teams
Unified Communication Hub
MessagingVideo Calls File SharingScheduling
💬
Real-Time Messaging
Instant channels & direct messages
🎥
HD Video Meetings
No software install required
📋
Tasks & Planner
Built-in project tracking
Collaboration

Improve Team Coordination

Keep projects, communications, and workflows on track with secure collaboration and real-time messaging — whether your team is in the office or working remotely.

  • Centralized Communication Hub Quick, secure messaging and group chats reducing reliance on fragmented text communications and email chains.
  • Integrated with Microsoft 365 Works seamlessly with Outlook, SharePoint, Word, PDF, and Excel — no switching between apps.
  • Connect Remote Teams Secure video meetings for client interactions, check-ins, and cross-location collaboration — no extra software needed.
  • Scheduling & Task Tracking Built-in calendars, shared task lists, and notifications keep teams organized and on deadline.
  • Guest Access & External Collaboration Invite vendors, clients, or partners into secure shared channels without giving them full system access.
🔒
Enterprise-Grade Security
All communications are encrypted end-to-end and governed by Microsoft's compliance framework — your conversations stay private.
SharePoint
9 / 16
SharePoint Online
Company-Wide File Platform
✅ Shared company documents ✅ Department team sites ✅ Granular permissions ✅ Version history & audit logs ✅ Works across all M365 apps ✅ Search across all content ✅ Accessible from any device
Document Management

SharePoint — Your Company’s Shared Filing Cabinet

SharePoint is your organization’s central hub for shared files, internal sites, and company-wide resources — built for team collaboration, not individual storage. Think of it as the shared drive your whole company accesses together.

  • Company Document Hub Policies, procedures, contracts, and shared resources in one organized location accessible by the whole team.
  • Departmental Team Sites HR, Finance, Operations — each department gets its own workspace with files, announcements, and shared tools.
  • Controlled Access Set permissions at the folder or file level so the right people see the right content — and nothing else.
  • Full Version History Every change is tracked. Restore any previous version or see exactly what changed and when.
  • Works Everywhere Access from any browser, desktop app, or mobile device — always in sync, always up to date.
🏢 SharePoint (Shared)
Company-wide documents, team policies, department files — accessible by everyone with the right permissions.
👤 OneDrive (Personal)
Individual file storage that follows each employee — private by default, shareable on demand.
OneDrive
10 / 16
Microsoft OneDrive
Your Personal Cloud Vault
✅ 1 TB personal storage per user ✅ Access from any device ✅ Auto-sync & offline access ✅ Ransomware recovery ✅ Secure personal sharing ✅ Version history — 30 days ✅ PC folder backup built-in
Personal Cloud Storage

OneDrive — Your Personal Files, Everywhere

OneDrive is each employee’s personal cloud storage — private by default, accessible from any device. Where SharePoint is the shared company filing cabinet, OneDrive is each person’s own desk drawer that travels with them.

  • Personal 1 TB Storage Every user gets 1 TB of private storage completely separate from shared team files — your files, your space.
  • Works on Every Device Files sync automatically to PCs, Macs, phones, and tablets. Start a document at the office, finish it anywhere.
  • Offline Access Mark files for offline use and keep working without an internet connection — changes sync automatically when you’re back online.
  • Ransomware Detection & Recovery OneDrive detects attacks automatically and lets you restore all personal files from a clean restore point in one click.
  • PC Folder Backup Automatically back up Desktop, Documents, and Pictures to the cloud — so if a laptop is lost or fails, nothing is lost.
🏠
Remote Work
Access everything from home
🔄
Auto Backup
Desktop & docs protected 24/7
🤝
Easy Sharing
Share with a link, any time
Email Security Suite
11 / 16
Email Security

Complete Email Protection Suite

Modern threats go far beyond spam. Multi-layered protection across filtering, encryption, archiving, and compliance — built into every email your organization sends and receives.

🛡️

Advanced Protection

Real-time, multi-engine scanning blocks phishing, malware, ransomware, and impersonation attacks before they reach the inbox.

🔒

Email Encryption

Policy-based automatic encryption for confidential, financial, legal, or regulated data — no user action required.

📁

Email Archiving

Tamper-proof archiving with automatic retention policies, advanced search, and full regulatory compliance.

📊

Admin Visibility

Full IT administrator control with centralized policy management, reporting, and real-time threat intelligence dashboards.

✅ Anti-Phishing
Protection against targeted attacks and social engineering.
✅ Malware Blocking
Multi-layered protection against known and unknown email-borne threats.
✅ Admin Control
Centralized visibility with flexible, granular policy management.
Signature Management
12 / 16
Email Signature Management

Professional Signatures — Centrally Controlled

🎨
Brand Consistency
One place controls logos, fonts & layouts across every device.
⚙️
Auto Deployment
Applied server-side — no employee action required. Ever.
🔄
Live Directory Sync
Auto-pulls name, title & phone from Microsoft 365.
⚖️
Legal Disclaimers
HIPAA & legal notices appended automatically by department.
📣
Marketing Banners
Time-limited promos across all employee emails.
How It Looks in an Email
From: Sarah Mitchell <sarah.mitchell@apexbuildgroup.com>
Subject: Project Meridian — Revised Timeline & Budget

Hi Marcus, please find the revised timeline attached. Let's connect Thursday to confirm final sign-off.

Best,

Sarah Mitchell
Senior Project Manager · Apex Build Group
📞 (212) 555-0847 ✉ sarah.mitchell@apexbuildgroup.com 🌐 apexbuildgroup.com
f
in
𝕏
Building Tomorrow's Skyline — Today APEX BUILD GROUP
Access & Identity
13 / 16
Zero Trust Security

Conditional Access & Identity Management

An intelligent security layer controlling how, when, and where users access company data — ensuring only trusted users and devices connect to your Microsoft 365 environment.

  • User Identity Verification Every sign-in is verified through Microsoft Entra ID and Multi-Factor Authentication — no exceptions.
  • Location Awareness Access rules respond to where a user is connecting from — blocking unfamiliar locations or untrusted networks automatically.
  • Device Compliance Only devices that meet your security standards can connect — unmanaged or non-compliant devices are blocked at the door.
  • Adaptive Policies Security rules apply dynamically based on real-time risk signals — a clean sign-in gets through; a suspicious one gets challenged.
  • Single Sign-On One secure login gives employees access to all their apps — no password fatigue, no reuse risk.
Access Verification Flow
User IdentityMFA via Entra ID
Location PolicyTrusted network
Device ComplianceIntune verified
🔓 Access Granted
⚡ Zero Trust Principle
Never trust, always verify — every access request is authenticated regardless of location or network.
Password Management
14 / 16
Password Management
Centralized & Encrypted Vault
✅ AES-256 end-to-end encryption ✅ Secure team credential sharing ✅ MFA enforcement per user ✅ Admin dashboard & audit logs ✅ Works on all devices & browsers
Credential Security

Password Management — One Vault, Full Control

Weak or reused passwords are one of the leading causes of business breaches. We deploy and manage a centralized password vault for your entire organization — giving employees a secure, effortless way to store credentials while giving IT full visibility and control.

  • AES-256 Encrypted Vault Every credential is encrypted end-to-end before it ever leaves a device — no one, including us, can see stored passwords.
  • Secure Team Sharing Share credentials across teams or departments without anyone needing to see the actual password — access is granted, not exposed.
  • MFA & Policy Enforcement Require multi-factor authentication on vault access and enforce password strength policies organization-wide from the admin dashboard.
  • Breach Monitoring Automatically flags any stored credentials that appear in known data breach databases — proactive protection before damage is done.
  • Works Everywhere Browser extensions, desktop apps, and mobile — employees have secure access to their vault on any device they work from.
Confidentiality
15 / 16

🔒 Proprietary Notice & Mutual Non-Disclosure

Information contained in this document is provided under an exclusive, perpetual non-disclosure agreement and cannot be copied, transmitted, excerpted, or otherwise communicated to anyone without the prior written consent of Cloud Atlas Technologies. Cloud Atlas Technologies agrees to keep all customer data included in this report confidential. This package contains proprietary and trade secret information intended solely for evaluating a potential business relationship with Cloud Atlas Technologies.

Thank You
16 / 16
Cloud Atlas Technologies

Thank You,
Vision Development Group

We look forward to helping your team stay secure,
supported, and ahead of the technology curve.

Contact
Mario Szafranski
Website
cloudatlastechnologies.com
Google Rating
⭐ 5.0 / 5.0
1 / 16
← → Arrow keys to navigate  ·  F for fullscreen  ·  ESC to exit