Introduction

About Us

No-nonsense Mid-market IT

Midsize professional service firms owe their strength to their flexibility, to their responsiveness, and to empowered employees. We give them IT to match and unmatched expertise in a seamless experience.

Use this page to order our services, our payment portal to manage your "subscriptions", and our onboarding page to manage your users.

For a thorough description of our role at your side, check our blog or ask for a copy of our concise and easy to read IT Flipbook, a resource for those who think about what information technology and IT staff should do for them.

And of course, let's meet.

1 - 4 0 8 - 4 7 9 - 3 1 3 6

Book a free consultation

WHY US

Concierge CIO

Sound Business Model

The difference we make is in the productivity you gain. Your IT infrastructure is the backbone of your organization. It empowers people and runs the apps that run your business. It delivers customer and workplace experiences that define who you are. It must evolve rapidly. Our role at your side is to build and manage this infrastructure, but first and foremost, it is to help you unlock business value, in the C suite and in your teams, with knowledge, hands-on support, and enabling training. [More]

Zero Trust | EDR/MDR | VAD/VDI

Security at the Edge

In today’s business landscape, remote work, mobile technology, cloud computing, and shadow IT have rendered the traditional castle-and-moat approach to cybersecurity ineffective. The network perimeter is no longer a reliable security boundary, and the focus has shifted to securing endpoints and applications. Our technology stack is designed to natively support this contemporary context, providing robust security measures that protect your organization’s data and assets from cyber threats anywhere. [More]

Microsoft 365 | Google Workspace...

Higher Cloud Productivity

Individuals, departments, and organizations have different needs, preferences, and expectations. Managers who value simplicity, flexibility, and teamwork may prefer Google Workspace. Others, who value compatibility, familiarity, and advanced functionalities like Microsoft 365. Some add on Proton because they need the security and privacy it offers. With us, you can mix and match, use multiple cloud productivity suites across the organization with a single domain name. [More]

Software-defined infrastructure

On Premises IT simplified

There is a proper way to host resources on premises: through the use of a Hyperconverged Infrastructure (HCI) virtualization platform. This resilient software-based system combines all the elements of a traditional data center (storage, compute, networking, backups, and management) in a cluster of three or more physical servers. HCI disentangles hardware, software and data, facilitating usage, maintenance and security. New virtual desktops, applications, or file shares can be deployed in hours (within your firewall perimeter, or outside of it with Zero Trust). [More]

Third party risk management

Infrastructure Sovereignty

We shield our clients from the vendor lock-in and security risks inherent to using proprietary or niche solutions (through the use of FOSS). Access to your data and infrastructure by third party entities is limited to service providers you trust (e.g.: LOB's, Microsoft 365, Google Workspace...). Furthermore, The tools we use to manage and monitor your computers and M365 are self-hosted in single-tenant servers (to insulate you from supply chain attack.) [More]

Systematic Redundancy

Business Continuity

We protect our clients' IT infrastructure from downtime and catastrophes through systematic redundancy. Whatever can fail has its failover mechanism: physical and virtual servers (on-prem, off site or in the cloud), firewalls, switches, domain controllers, file shares, backups, applications, personal computers, access to the Internet, VPN, network, cloud storage, and Office Suites. Even we, in out IT role, are always two to support you. [More]

Open Source Technology

FOSS = Optimized Costs

We achieve dramatic savings in maintenance costs through the use of industry-standard, robust, and scalable open-source software for the management of your personal computers, servers, hypervisors, domain controllers, apps, shares, cyber security, and backups. This makes FOSS one of the pillars of our business model. [More]

Predictable Pricing


For the sake of simplicity, accuracy, and transparency, we price our services on a per-user and/or per-device basis. To each device corresponds a service.

The "devices" are personal computers and servers - physical or virtual - and the software they run, as well as firewalls and networking equipment. Mobile phones are supported alongside PC's. Prices decrease with quantity. Unless specified, the cost of your cloud productivity suites and LOBs is not included.

IT service consumption varies significantly across organizations. Our plans are all inclusive. Use discount codes to adjust our feature sets to your needs and budget. Read and follow our terms to avoid overages and determine what constitute managed services (plans) and project services.

Check our service catalog for more details and options. Use our payment portal to manage your "subscriptions", and our onboarding page to manage your users.

Single-Cloud

Microsoft 365

Compatibility, familiarity,

and advanced functionalities.

  • Windows or MacOS
  • Microsoft 365 Business Premium Onboarding
  • Google Workspace Standard Onboarding
  • Initial Migration to Cloud (mail, docs, cal)
  • Bitdefender GravityZone Endpoint Security
  • or Microsoft Defender for Endpoint
  • Endpoint Detection and Response (EDR)
  • Managed Detection and Response (MDR)
  • 24/7 SOC Monitoring & Breach Remediation
  • Compliance Enforcement (GLBA, HIPAA...)
  • Onsite and remote Support
  • Proactive General Monitoring
  • On-premises Data Backup & Recovery*
  • Multi-Cloud Data Backup & Recovery
  • Bi-weekly OS and Apps Patching
  • Vulnerability Scanning & Zero Day Remediations
  • Hardware Management
  • Software Management
  • Internal Software Repository*
  • Mobile Device Management (Intune)
  • Mobile Device Management (Google MDM)
  • Network Print
  • Cloud / Universal Print
  • Microsoft Teams Voice VoIP
  • Google Voice VoIP
  • Remote Work via VPN*
  • Remote Work via Zero Trust
  • DNS-Layer Security
  • Email Security (SPF, DKIM, DMARC...)
  • Domain Impersonation Protection
  • Endpoint Encryption
  • Outlook Purview Mail Encryption
  • Team Password Management
  • Managed Multi-factor Authentication
  • Managed Single-Sign-On
  • Device High Availability
  • IT Consulting
  • Network/Hardware Stateful Firewall*
  • Snort Network Intrusion Detection & Prevention*
  • Ad, Tracker, IP, & Country Blocking*
  • Arpwatch*
  • Network Monitoring & Maintenance*
  • Dark Web Monitoring
  • Security Awareness Trainings
  • $180

    per user/device/month

Single-Cloud

Google Workspace

Simplicity, flexibility,

and teamwork on light platforms.

  • MacOS, ChromeOS, or Linux
  • Microsoft 365 Business Premium Onboarding
  • Google Workspace Standard Onboarding
  • Initial Migration to Cloud (mail, docs, cal)
  • Bitdefender GravityZone Endpoint Security
  • or Microsoft Defender for Endpoint
  • Endpoint Detection and Response (EDR)
  • Managed Detection and Response (MDR)
  • 24/7 SOC Monitoring & Breach Remediation
  • Compliance Enforcement (GLBA, HIPAA...)
  • Onsite and remote Support
  • Proactive General Monitoring
  • On-premises Data Backup & Recovery*
  • Multi-Cloud Data Backup & Recovery
  • Bi-weekly OS and Apps Patching
  • Vulnerability Scanning & Zero Day Remediations
  • Hardware Management
  • Software Management
  • Internal Software Repository*
  • Mobile Device Management (Intune)
  • Mobile Device Management (Google MDM)
  • Network Print
  • Cloud / Universal Print
  • Microsoft Teams Voice VoIP
  • Google Voice VoIP
  • Remote Work via VPN*
  • Remote Work via Zero Trust
  • DNS-Layer Security
  • Email Security (SPF, DKIM, DMARC...)
  • Domain Impersonation Protection
  • Endpoint Encryption
  • Outlook Purview Mail Encryption
  • Team Password Management
  • Managed Multi-factor Authentication
  • Managed Single-Sign-On
  • Device High Availability
  • IT Consulting
  • Network/Hardware Stateful Firewall*
  • Snort Network Intrusion Detection & Prevention*
  • Ad, Tracker, IP, & Country Blocking*
  • Arpwatch*
  • Network Monitoring & Maintenance*
  • Dark Web Monitoring
  • Security Awareness Trainings
  • $160

    per user/device/month

Standalone Security Bundle

  • Bitdefender GravityZone Endpoint Security
  • or Microsoft Defender for Endpoint*
  • Endpoint Detection and Response (EDR)
  • 24/7 Managed Detection and Response (MDR)
  • Email Security (DMARC, SPF, DKIM...)
  • Outlook Purview mail encryption*
  • DNS-Layer Security
  • Password Management
  • Managed SSO
  • Managed MFA*
  • Endpoint Encryption*
  • Security Awareness Trainings
  • Dark Web Monitoring
  • Vulnerability Scanning & zero day remediation
  • OS and apps patching
  • $100

    per endpoint/month

Networking

  • Hardware or Appliance(s) Selection, & Setup
  • Stateful Firewalls Installation & Management
  • Multi-WAN Aggregation
  • Snort Intrusion Detection & Prevention*
  • Arpwatch
  • WiFi Setup and Management
  • DHCPv4 & DHCPv6
  • DNS Resolver
  • Virtual LAN's (VLANs)
  • Virtual Private Networks (VPNs)
  • Dynamic DNS
  • Ingress & Egress Rules Management
  • High Availability or Live Backup
  • Local and Remote Backups
  • One or two nodes per LAN
  • $120

    per node/month + setup fee

About You

Team

Team

"Paul is a software engineer and a junior partner of the firm. He developed our desktop utility apps using Flutter, Dart, Python, AWS, and VS code. He has also built successful phone apps, games, and music making software. Paul spearheads open source projects and designs web based applications running on Linux servers that he also sets up and manages."

"Matt is an expert in hyperconverged infrastructure, storage, networking, system administration, and cloud technologies. He specializes in KVM virtualization and assists us as a consultant for complex HCI environments. He has deep knowledge of PVE, ZFS, CEPH, SAN, NAS, NFS, TCP/IP, VLAN, VPN, DHCP, DNS, and firewall technologies. He is passionate, innovative, and reliable. "

"Julie is a certified Google Workspace administrator who has over five years of experience in managing and optimizing Google’s cloud-based productivity and collaboration tools. She is proficient in using Google Workspace services and tools, such as Gmail, Drive, Docs, Calendar, Meet, Admin Console, Identity, Vault, and Marketplace. She is also skilled in using tools and APIs to automate workflows."

"Chris is a network engineer who assists us as a consultant for complex network setups. He is proficient in using various network technologies and tools such as switches, routers, firewalls (pfSense, OPNsense), servers, wireless networking, Software Defined Networking, VLANs, scripting and programming languages, and cloud technologies. He is also adept at using network monitoring, testing, modeling, and simulation tools and methods to analyze, optimize, and secure network performance and functionality. "

"Nathaniel is a professional and experienced integrated cabling system specialist who helps us build, troubleshoot, and maintain our clients’ Ethernet cabling infrastructure. He is proficient in installing, testing, and repairing twisted pair, coaxial, and fiber optic cable connections. Nathaniel has a knack for locating cabling issues hidden to the naked eye."

Paul Elliot F. Software Engineer
Matthew K. HCI Administrator
Julie L. Google Workspace Administrator
Chris K. Network Administrator
Nathaniel F. Network Engineer

Contact

Contact

Address
1301 S. Bowen Road, Suite 435, Arlington TX 76013
Phone
00 1 408-479-3136
Mail
info (at) conciergeCIO (dot) com
Web
www.conciergecio.com

Send us a Message

Use this contact form to introduce yourself and let us know when and how to contact you. You can also use this form to ask for a free copy of our book. This book is one of the most concise IT Plans you will ever read. Thank you.

  • Please use a REAL email address so that we can get back to you.