Endpoints
Windows, Linux, macOS, iOS, iPadOS laptops, desktops, and mobile devices.
Security, support, and operations built to augment your business—not replace it.
TopRightIT is a US-based IT partner headquartered in Lavon, Texas. Enterprise Support Plus (ESP) and Cyber Secure Plus (CSP) give businesses a simple subscription model for IT operations, security, and projects. For subscription customers in DFW, on-site trip time remains covered when needed.
service model ───────────── ✔ 6 subscription offerings ✔ Projects for deeper initiatives ✔ Structured subscription coverage ✔ On-site trip time included for subscribers ✔ New user onboarding/offboarding covered ✔ Licensing and cost optimization reviews result: Clear scope. Predictable billing. Enterprise-grade support without the chaos.
Supported platforms
ESP and CSP subscriptions apply to the real systems businesses depend on — endpoints, infrastructure, business applications, and cloud platforms.
Windows, Linux, macOS, iOS, iPadOS laptops, desktops, and mobile devices.
Fortinet, SonicWall, Cisco, Juniper, Palo Alto, Ubiquiti, WatchGuard, and Zyxel environments.
Microsoft 365, Google Workspace, EMR, EHR, PM systems, AutoCAD, Bluebeam, and other operational platforms businesses depend on every day.
AWS, Azure and Google Cloud with optimization and automation.
Core services
TopRightIT delivers managed security and IT operations through a billing model that is easier for leadership, finance teams, and operations teams to understand. Clients know what is covered, what assets are supported, and where projects fit in — without feeling like they are decoding years of undocumented IT decisions.
Six subscription options built around endpoint, network, server, and cyber coverage. The model is designed to augment internal staff, simplify billing, and make support easier to consume.
Network refreshes, firewall upgrades, cloud migrations, tenant cleanup, documentation, automation, and structured improvement work. Subscription clients receive 50% off project labor.
Scoped project work is available for deeper initiatives like migrations, modernization, cleanup, documentation, and one-time improvement efforts that sit outside recurring subscription support.
New user onboarding and offboarding are covered under ESP Basic and above. We also support critical business applications like Microsoft 365, Google Workspace, AutoCAD, Bluebeam, and other user-facing platforms.
We help clients get more from Microsoft, Google, Apple, AWS, Azure, and GCP by cleaning up licensing, improving administration, and identifying infrastructure or cost-center optimization opportunities.
We utilize software and security platforms to help protect environments based on operational needs, compliance goals, and regulatory requirements. The focus is on building practical, right-sized security that aligns with your risk profile, supports the way your business actually operates, and helps meet required standards where needed.
Subscription model
The model is intentionally simple and consistent: three Enterprise Support Plus tiers for operational IT coverage and three Cyber Secure Plus tiers as a security add-on path. Every new customer engagement begins with a structured onboarding project before transitioning into recurring support. We do not mix and match tiers inside an environment because consistency is what makes the service cleaner to support, easier to bill, and easier for leadership to understand.
Foundational support for covered assets and users. New user onboarding and offboarding are covered here. Network must be under at least ESP Basic before placing server or cloud assets under ESP Basic.
Expanded operational support for businesses that need broader day-to-day administration, stronger coverage, and more active support across the environment.
Highest-tier operational coverage and the required foundation for Cyber Secure Plus. CSP add-ons are only available when the entire environment is on ESP Pro.
Entry-level cyber coverage add-on for fully standardized ESP Pro environments that want baseline managed security layered into operations.
Mid-tier cyber protection add-on with broader monitoring, stronger controls, and deeper visibility across covered systems.
Highest-tier security add-on for organizations that want mature, layered protection on top of a fully managed ESP Pro environment.
Onboarding project
Strong onboarding is the difference between reactive IT support and a system that actually works long-term. This project standardizes the environment, deploys our toolset, documents what matters, and prepares the customer for clean ongoing support under the subscription.
Every new subscription starts with a structured onboarding designed to set the customer up for long-term success with TopRightIT. It is the foundation for visibility, support quality, security alignment, documentation, and standardized operations.
Typical onboarding runs 4–6 weeks depending on environment size and complexity. Pricing is intentionally simple:
Map the environment and establish the true operational baseline.
Install and configure the TopRightIT operational and security toolset.
Turn tribal knowledge into usable support documentation and workflows.
Hand off a cleaner, supportable environment into recurring service delivery.
Transparent pricing
TopRightIT is open about pricing because transparency builds trust. Subscription clients get predictable coverage, no trip charges for covered work, included onboarding and offboarding where applicable, 50% off project labor, and a documented support matrix that shows exactly what each tier includes.
Basic: $40 per endpoint
Standard: $50 per endpoint
Pro: $60 per endpoint
Basic: $100 per covered asset
Standard: $125 per covered asset
Pro: $150 per covered asset
Basic: $10 per asset
Standard: $20 per asset
Pro: $30 per asset
Included support by tier
The subscription model is the core of TopRightIT. Instead of vague promises, clients can review what is covered for each asset class and each tier across endpoint, network, server, cyber, and cloud-aligned services.
Endpoint Asset: Desktop, Laptop, VDI, Mobile Device, Workstation
What is included for desktops, laptops, VDI, mobile devices, and workstations under ESP Basic, Standard, and Pro.
| Included item | Basic 40 | Standard 50 | Pro 60 |
|---|---|---|---|
| 24/7/365 Support | ✓ | ✓ | ✓ |
| Hardware Inventory | ✓ | ✓ | ✓ |
| Software Inventory | ✓ | ✓ | ✓ |
| Patch Management (OS) | ✓ | ✓ | ✓ |
| System Maintenance (Defrags, Disk Check, Cleanup) | ✓ | ✓ | ✓ |
| Basic OS Support (Windows, macOS, ChromeOS) | ✓ | ✓ | ✓ |
| Unlimited Live Answer Service Desk | - | ✓ | ✓ |
| Directory Services Management | - | ✓ | ✓ |
| Business Application & Email Support (M365 / Google WS) | - | ✓ | ✓ |
| Security & Distribution Group Management | - | ✓ | ✓ |
| SPAM Filtering - User & System Administration | - | ✓ | ✓ |
| Identity & Access Mgmt / SSO / MFA (Okta, DUO, Microsoft) | - | - | ✓ |
| Endpoint Management Software (Intune, Jamf, Google WS, More+) | - | - | ✓ |
| SaaS Workloads Other (Non-Business Application & Email) | - | - | ✓ |
| Peripherals (Printer, Scanner, Etc.) | - | - | ✓ |
| OS Re-install | - | - | ✓ |
| Factory Reset | - | - | ✓ |
| RMA Management- Owned Asset w/ Active Support | - | - | ✓ |
| Backup Management | - | - | ✓ |
| Included item | Basic 40 | Standard 50 | Pro 60 |
|---|---|---|---|
| Patch Status Summary (Scheduled) | ✓ | ✓ | ✓ |
| Hardware and Software Inventory (Scheduled) | ✓ | ✓ | ✓ |
| Monthly Incident Detail (Scheduled) | - | ✓ | ✓ |
| Performance to SLA -MTTA, MTTR, Etc (Scheduled) | - | ✓ | ✓ |
| Network Assessment (Scheduled - Annual Business Review) | - | - | ✓ |
| Security Assessment (Scheduled - Annual Business Review) | - | - | ✓ |
| Included item | Basic 40 | Standard 50 | Pro 60 |
|---|---|---|---|
| Endpoint Management Agent | ✓ | ✓ | ✓ |
| Remote Access Management | - | ✓ | ✓ |
| Incident Management Platform | - | ✓ | ✓ |
| Endpoint Apple Device Management | - | - | ✓ |
Network Asset: SD-WAN, Router, Firewall, Switch, Wireless, Storage, More+ (OEM Agnostic)
What is included for firewalls, routers, switches, wireless, SD-WAN, and related infrastructure under each ESP tier.
| Included item | Basic 100 | Standard 125 | Pro 150 |
|---|---|---|---|
| 24/7/365 Support | ✓ | ✓ | ✓ |
| Hardware Inventory | ✓ | ✓ | ✓ |
| Software Inventory | ✓ | ✓ | ✓ |
| Firmware Updates (All) | - | ✓ | ✓ |
| IP Address Management | - | ✓ | ✓ |
| Interface Management | - | ✓ | ✓ |
| Change Management | - | ✓ | ✓ |
| ISP/WAN - Connectivity Management | - | ✓ | ✓ |
| VPN Management (Site-to-Site/SSL/Client) | - | ✓ | ✓ |
| Content Filtering Config & Support | - | ✓ | ✓ |
| VLAN/ACL Management | - | - | ✓ |
| BGP Configuration & Support | - | - | ✓ |
| Multi-Factor Authentication | - | - | ✓ |
| Advanced Diagnostics (Packet Capture/Traffic Analysis) | - | - | ✓ |
| Configuration Versioning | - | - | ✓ |
| Configuration Backups | - | - | ✓ |
| Reimaging of Supported Network Asset | - | - | ✓ |
| UTM: IPS/IDS Config & Support | - | - | ✓ |
| Quarterly External Penetration Testing | - | - | ✓ |
| SD-WAN Orchestration & Support | - | - | ✓ |
| Included item | Basic 100 | Standard 125 | Pro 150 |
|---|---|---|---|
| Patch Status Summary (Scheduled) | ✓ | ✓ | ✓ |
| Hardware and Software Inventory (Scheduled) | ✓ | ✓ | ✓ |
| Monthly Incident Detail (Scheduled) | - | ✓ | ✓ |
| Performance to SLA -MTTA, MTTR, Etc (Scheduled) | - | ✓ | ✓ |
| Network Assessment (Scheduled - Annual Business Review) | - | - | ✓ |
| Security Assessment (Scheduled - Annual Business Review) | - | - | ✓ |
| Included item | Basic 100 | Standard 125 | Pro 150 |
|---|---|---|---|
| Incident Management Platform | ✓ | ✓ | ✓ |
| Project Management Office | ✓ | ✓ | ✓ |
| Network Management System | ✓ | ✓ | ✓ |
| Performance Monitoring System | - | ✓ | ✓ |
| Network Traffic Analysis | - | ✓ | ✓ |
Server Asset: Windows. Linux, Cloud
What is included for physical, virtual, and cloud-hosted servers under each ESP tier.
| Included item | Basic 100 | Standard 125 | Pro 150 |
|---|---|---|---|
| 24/7/365 Support | ✓ | ✓ | ✓ |
| Hardware Inventory | ✓ | ✓ | ✓ |
| Software Inventory | ✓ | ✓ | ✓ |
| Patch Management (OS) | ✓ | ✓ | ✓ |
| System Maintenance (Defrags, Disk Check, Cleanup) | ✓ | ✓ | ✓ |
| Basic OS Support (Windows, Linux) | ✓ | ✓ | ✓ |
| Unlimited Live Answer Service Desk | - | ✓ | ✓ |
| Directory Services Management | - | ✓ | ✓ |
| Mail Server, Domain Controller | - | ✓ | ✓ |
| Security & Distribution Group Management | - | ✓ | ✓ |
| SPAM Filtering - User & System Administration | - | ✓ | ✓ |
| Identity & Access Mgmt / SSO / MFA (Okta, DUO, Microsoft) | - | - | ✓ |
| Endpoint Management Software (Intune, Jamf, Google WS, More+) | - | - | ✓ |
| SaaS Workloads Other (Non-Business Application & Email) | - | - | ✓ |
| Peripherals (Printer, Scanner, Etc.) | - | - | ✓ |
| OS Re-install | - | - | ✓ |
| Factory Reset | - | - | ✓ |
| RMA Management- Owned Asset w/ Active Support | - | - | ✓ |
| Backup Management | - | - | ✓ |
| Included item | Basic 100 | Standard 125 | Pro 150 |
|---|---|---|---|
| Patch Status Summary (Scheduled) | ✓ | ✓ | ✓ |
| Hardware and Software Inventory (Scheduled) | ✓ | ✓ | ✓ |
| Monthly Incident Detail (Scheduled) | - | ✓ | ✓ |
| Performance to SLA -MTTA, MTTR, Etc (Scheduled) | - | ✓ | ✓ |
| Network Assessment (Scheduled - Annual Business Review) | - | - | ✓ |
| Security Assessment (Scheduled - Annual Business Review) | - | - | ✓ |
| Included item | Basic 100 | Standard 125 | Pro 150 |
|---|---|---|---|
| RMM Endpoint Agent Windows | ✓ | ✓ | ✓ |
| Remote Access Management | - | ✓ | ✓ |
| Incident Management Platform | - | ✓ | ✓ |
| Cloud Asset Management Platform | - | - | ✓ |
Endpoints, End Users, Network, SaaS, Cloud, More
What is included across endpoint, email, user, network, SaaS, and cloud security layers for CSP Basic, Standard, and Pro.
| Included item | Basic 10 | Standard 20 | Pro 30 |
|---|---|---|---|
| Managed Endpoint Protection | ✓ | ✓ | ✓ |
| Managed Email Security | ✓ | ✓ | ✓ |
| Threat Detection & Automated Response | ✓ | ✓ | ✓ |
| Advanced EDR Coverage | - | ✓ | ✓ |
| Security Awareness Training | - | ✓ | ✓ |
| Content and Web Filtering | - | ✓ | ✓ |
| Unified Security Management Platform | - | - | ✓ |
| Included item | Basic 10 | Standard 20 | Pro 30 |
|---|---|---|---|
| Desktop/Workstation (Endpoint) | ✓ | ✓ | ✓ |
| Server (Endpoint) | ✓ | ✓ | ✓ |
| ✓ | ✓ | ✓ | |
| End Users / Social | - | ✓ | ✓ |
| Network (FW, SDWAN, RTR, SW, WAP, STO) | - | - | ✓ |
| SaaS (EDR, MS365, Google, More+) | - | - | ✓ |
| Cloud (AWS, Azure, GCP) | - | - | ✓ |
| Included item | Basic 10 | Standard 20 | Pro 30 |
|---|---|---|---|
| Alerting & Notification | ✓ | ✓ | ✓ |
| Static & Behavioral AI and Fileless File-based Attack Detection & Prevention | ✓ | ✓ | ✓ |
| Autonomous Threat; Remediation; Rollback Response | ✓ | ✓ | ✓ |
| Automated Host Isolation | ✓ | ✓ | ✓ |
| Incident Analysis | ✓ | ✓ | ✓ |
| Agent Anti-Tamper | ✓ | ✓ | ✓ |
| App Inventory | ✓ | ✓ | ✓ |
| Rogue Device Discovery | ✓ | ✓ | ✓ |
| Managed Antivirus | ✓ | ✓ | ✓ |
| Automated Email Encryption | ✓ | ✓ | ✓ |
| Data Loss Preventioon (DLP) & Content Filtereing | - | ✓ | ✓ |
| Social Media Account Protection | - | ✓ | ✓ |
| Persistent Footholds | - | ✓ | ✓ |
| Ransomware Canaries | - | ✓ | ✓ |
| External Recon to Monitor Open Ports | - | ✓ | ✓ |
| Process Insights (Identify Malicious Processes) | - | ✓ | ✓ |
| AI Powered DNS Security & Content Filtering | - | ✓ | ✓ |
| Security Awareness Training | - | ✓ | ✓ |
| Phishing Campaign | - | ✓ | ✓ |
| Social Engineering | - | ✓ | ✓ |
| Asset Discovery | - | - | ✓ |
| Vulnerability Assessment | - | - | ✓ |
| Intrusion Detection | - | - | ✓ |
| Behavioral Monitoring | - | - | ✓ |
| Log Management (EDR, MS365, G-Suite, Servers, Other SaaS Integrations Available) | - | - | ✓ |
Map common AWS, Azure, and Google Cloud services to the TopRightIT support model so clients can quickly understand where an asset falls.
This matrix clarifies whether an asset is generally treated as ESP Server, ESP Storage, ESP Firewall, or ESP SaaS coverage.
| Service type | AWS | Azure | GCP |
|---|
| Service type | AWS | Azure | GCP |
|---|---|---|---|
| Virtual Servers | EC2 | Virtual Machine | Compute Engine |
| PaaS; deploying apps | Elastic Beanstalk | Cloud Services | App Engine |
| Management for Docker/K8S Containers | ECS, EKS | Azure Container Service | Kubernetes Engine, Container Engine |
| Serverless | Lambda | Azure Functions | GCP Functions |
| Autoscaling Instances | Auto Scaling | Azure Autoscale | Autoscaling |
| Service type | AWS | Azure | GCP |
|---|---|---|---|
| Object Storage | S3 | Storage (Block Blob) | Google Cloud Storage |
| Block Storage | Elastic Block Store (EBS) | Azure Blog Storage, Azure Disk Storage | Google Persistent Disk |
| Archive Storage | Glacier | Azure Archive Storage, Azure Cool Blog Storage | Google Cloud Storage Nearline and Coldline |
| File Storage | Elastic File System, FSx | Azure Files | Google Cloud Filestore |
| Bulk Data Transport | AWS Import/Export, Snowball, Snowmobile | Azure Import/Export Service, Azure Data Box | Storage Transfer Service |
| Backup | Cold Archive Storage, Storage Gateway, AWS Backup | Azure Backup, Azure Site Recovery | Coldline |
| Service type | AWS | Azure | GCP |
|---|---|---|---|
| Managed Relational Database as a service | RDS | SQL Database, Database for MySQL, Database for PostgreSQL | Cloud Spanner, Cloud SQL |
| NoSQL | DynamoDB, DocumentDB | Azure Cosmos DB | Google Cloud Bigtable, Google Cloud Datastore |
| Data Warehouse | Redshift | SQL Data Warehouse | Google Cloud BigQuery |
| Database Migration | AWS Database Migration Service | Azure Database Migration Services | N/A |
| Data Pipelines | AWS Data Pipeline | Azure Data Factory | Google Cloud Dataflow |
| Service type | AWS | Azure | GCP |
|---|---|---|---|
| Authentication and Authorization | Identity Access Management (IAM) | Azure Active Directory | Google Cloud IAM |
| Directory Services | AWS Directory Services | Azure Active Directory | N/A |
| Web Firewall | AWS Web Application Firewall | Azure Application Gateway, Azure Firewall | - |
| Security Assessment | Amazon Inspector | Azure Security Center | Cloud Security Command Center |
| Threat Detection and Monitoring | Amazon GuardDuty | Azure Security and Compliance | Cloud Armor |
| Service type | AWS | Azure | GCP |
|---|---|---|---|
| Global Content Delivery Network (CDN) | Amazon CloudFront | Azure CDN | Google CDN |
| Direct Connection | AWS Direct Connect | Azure ExpressRoute | Google Cloud Interconnect |
| DNS | Route 53 | Azure DNS, Traffic Manager | Google Cloud DNS |
| Load Balancing | Elastic/Application/Network Load Blancers | Azure Load Balancer, Application Gateway | Cloud Load Balancer |
| Virtual Private Cloud Network | Virtual Private Cloud (VPC) | Virtual Network | Google VPC |
Why choose us
TopRightIT works best for organizations that want accountable support, cleaner administration, and a partner that can plug into existing operations without adding confusion.
Coverage areas
TopRightIT is built for real business operations. That means covering the platforms users rely on every day, the systems administrators have to manage, and the cloud or on-prem assets leadership needs clearly mapped into the right support tier.
Microsoft 365, Google Workspace, Apple Business Manager, identity, licensing, tenant cleanup, and admin optimization.
EMR, EHR, PM systems, AutoCAD, Bluebeam, and other critical operational applications that must be provisioned correctly so users can work efficiently.
AWS, Azure, GCP, Terraform, and Ansible with a strong focus on configuration quality, visibility, cost optimization, and clear alignment of compute, storage, security, and SaaS-style cloud services.
Dell, HP, Lenovo, Cisco, Fortinet, Juniper, Palo Alto, SonicWall, and Ubiquiti environments across network, firewall, storage, and endpoint operations.
How we work
We are open about pricing, open about scope, and focused on building clients for life. The service model is designed to reduce friction, reduce uncertainty, and make IT support feel more like staff augmentation than outsourced guesswork.
The subscription structure helps leadership understand the administrative and technical components behind support without constantly tracking individual tasks and labor entries.
Talk through pricing and fit →TopRightIT uses software, platforms, and layered controls to support secure operations in a way that fits each environment. Security recommendations are shaped around business risk, operational realities, compliance expectations, and any regulatory requirements that apply.
See how subscriptions are structured →We optimize and automate wherever it makes sense so environments become easier to support, easier to understand, and easier to scale over time.
Explore supported platforms →Let’s make IT easier to buy and easier to run
Whether you need a subscription or a scoped project tied to a cleaner long-term support model, TopRightIT can help you build a more supportable environment with stronger visibility and less billing confusion.