| 3PT® Essentials | 3PT® Advantage | |
|---|---|---|
| Security | ||
| Managed Anti-Virus Your organisation's computers are protected from viruses and other threats by software that is automatically kept up to date and monitored by our Aabyss IT experts. |
||
| 24/7 Security Operations Centre A Security Operations Centre (SOC) is a digital security control room that never sleeps. |
||
| DNS Protection DNS Protection is a service that helps keep you safe online by blocking access to harmful websites before they can load on your device. |
||
| Microsoft 365 Security Policy Management Microsoft 365 is the modern 'server' and it needs to be monitored, maintained and secured. |
||
| Microsoft and Key 3rd Party Patch Management We keep your software secure by automatically checking for and installing important updates from Microsoft and other trusted providers. |
||
| Microsoft 365 Security Policy This is a great place to add a bit of extra information about the feature. |
||
| Multi-Factor Authentication Multi-factor authentication is a security feature that asks you to prove who you are in more than one way, like entering a password and then a code sent to your phone, before letting you log in. |
||
| Zero-Day Website Protection A digital bodyguard for your website—ready to stop attacks before anyone even knows the threat exists. |
||
| Zero Trust Application Whitelisting A security approach that only allows approved software to run on your systems—everything else is blocked by default. |
||
| Email Anti-Spam Email anti-spam is a service that automatically filters out unwanted or harmful emails, like junk or phishing messages, before they reach your inbox. |
||
| Dark Web Monitoring Dark web monitoring is a service that checks hidden parts of the internet to see if your personal or company information, like passwords or email addresses, has been stolen or leaked. |
||
| Managed Extended Detection & Response Advanced endpoint protection is a service that uses smart tools to watch over and defend your computers and devices from modern threats like viruses, hackers, and suspicious behaviour. |
||
| Email Impersonation Prevention Email Impersonation Prevention is a service that helps stop fake emails that look like they’re from someone you trust, like your boss or a supplier, by checking if the sender is really who they say they are. |
||
| PC Drive Encryption We'll ensure that every computer in your organisation is encrypted, so if it's lost or stolen, your data is secure. |
||
| Self-Service Password Resets We enable your users to securely self-serve on password resets, saving them from having to call us if they forget. |
||
| Storage Audit Your data is one of your most valuable assets - we log file actions so that we can build an audit trail in the event of an incident. |
||
| Elevation Control Take the hassle out of updating custom applications while maintaining security controls while maintaining the least-privilege permissions model |
||
| 3rd Party Patch Management We have a process of keeping all the non-Microsoft (or non-OS) software your business uses—like Chrome, Zoom, Adobe Reader—up to date and secure. |
||
| Backup for Microsoft 365 Products Backup of Exchange Online, SharePoint Online, OneDrive for Business and Teams Data |
||
| Cyber Essentials Plus Compliance Monitoring & Managing Business to Stay Within CE+ Compliance Framework |
||
| Internal Vulnerability Scanning Internal Vulnerability Scanning is a service that checks your company’s internal systems and devices for hidden security weaknesses, helping you fix them before they can be used in a cyber attack. |
||
| External Vulnerability Scanning External Vulnerability Scanning is a service that checks your internet-facing systems—like websites and servers—for weaknesses that hackers could exploit, helping you fix them before they’re used against you. |
||
| Cyber Awareness Training Cyber awareness training is a programme that teaches people how to spot and avoid online threats like scams, phishing, and unsafe websites, helping them stay safe while using the internet. |
||
| Password Management Password management is a service that helps you create, store, and use strong passwords safely, so you don’t have to remember them all yourself. |
||
| Phishing Simulation Phishing Simulation is a cybersecurity training exercise where employees receive fake—but realistic—phishing emails to test how they respond. |
||
| Support | ||
| Remote Helpdesk Remote Helpdesk is a service that lets IT support staff fix problems on your computer from a distance, so you don’t need someone to come to your desk. |
||
| Service Level Agreement We hit 95% of critical issues within 15 minutes, and resolve in 4 hours. |
||
| Centralised Services Centralised Services is a setup where key IT tools and support, like updates, security, and backups, are managed from one place, making everything easier to control and more consistent across the business. |
||
| Desktop Optimisation Desktop Optimisation is a service that improves the speed, performance, and reliability of your computer by keeping it clean, updated, and running smoothly. |
||
| Management & Monitoring Management & Monitoring is a service where IT experts keep an eye on your systems and devices, making sure everything runs smoothly and fixing issues before they cause problems. |
||
| 24/7 Network Operation Center Our team are working around the clock, watching over your server infrastructure and backups to spot and fix problems quickly, keeping everything running smoothly at all times. |
||
| Onsite Support Unlimited support at your office - when we can't resolve issues remotely, we'll come to you at no extra cost. |
||
| Technology Alignment We'll apply and check our best-practice standards for IT system configuration across your business, ensuring you're safe and secure. |
||
3PT® Explained.
Easily create a comparison table to highlight the features included in your different packages.
What is the Aabyss 3PT® Framework?
3PT® is a systematic best-practice approach enabling the identification of IT risk, efficiency and productivity opportunities.
The objective of 3PT® is to give clarity on the most applicable technology, skills and organisation needed to meet your business objectives, in the most effective way possible.
Using 3PT®, we can help you make informed decisions about how to manage your technology, which technology to invest in and the impact on your business.
People + Process + Purpose + Technology = 3PT
More questions?
Do not hesitate to contact us at hello@aabyss.uk

