Services Guide
This Services Guide contains provisions that define, clarify, and govern the services described in the quote provided to you (the “Quote” or "Statement of Work" or "SOW"). If you do not agree with the terms of this Services Guide, you should not sign the Quote and you must contact us for more information.
This Services Guide is our “owner’s manual” that generally describes all managed services provided or facilitated by Manawa Inc. (“Manawa”). However, only those services specifically described in the Quote will be facilitated and/or provided to you (collectively, the “Services”). Activities or items that are not specifically described in the Quote will be out of scope and will not be included unless otherwise agreed to by us in writing.
This Services Guide contains important provisions pertaining to the auto-renewal of the Services in your Quote, as well as fee increases that may occur from time-to-time unless otherwise explicitly stated in the Quote. Please read this Services Guide carefully and keep a copy for your records.
Auditing Services
We will audit your managed information technology environment (the “Environment”) to determine the readiness for, and compatibility with, ongoing managed services. Our auditing services are comprised of:
- Audit to determine general Environment readiness and functional capability
- Review of hardware and software configurations
- Review of current vendor service / warranty agreements for Environment hardware and software
- Security vulnerability check
- Backup and disaster recovery solution audit
- Speed test and ISP audit
- Office phone vendor service audit
- Asset inventory
- Email and website hosting audit
- IT support process audit
If deficiencies are discovered during the auditing process (such as outdated equipment or unlicensed software), we will bring those issues to your attention and discuss the impact of the deficiencies on our provision of the Services and provide you with options to correct the deficiencies. Please note, unless otherwise expressly agreed by us in writing, auditing services do not include the remediation of any issues, errors, or deficiencies (“Issues”), and we cannot guarantee that all Issues will be detected during the auditing process. Issues that are discovered in the Environment after the auditing process is completed may be addressed in one or more subsequent quotes.
Onboarding Services
If onboarding services are provided under the Quote, then the following services will be provided to you.
- Create and publish a communication plan
- Uninstall any monitoring tools or other software installed by previous IT consultants.
- Compile a full inventory of all protected servers, workstations, and laptops.
- Uninstall any previous virus protection and install our managed antivirus application.
- Install remote support access application on each managed device to enable remote support.
- Configure patch management application and check for missing security updates.
- Uninstall unsafe applications or applications that are no longer necessary.
- Optimize device performance including disk cleanup, antivirus, and malware scans.
- Review firewall configuration and other network infrastructure devices.
- Review status of battery backup protection on all devices.
- Stabilize network and assure that all devices can securely access the file server and network resources.
- Review and document current server configuration and status.
- Determine existing backup strategy and status; prepare backup options for consideration.
- Review password policies and update user and device passwords.
- As applicable, make recommendations for changes that should be considered to the managed environment.
- Create network topology map
The foregoing list is subject to change if we determine, in our discretion, that different or additional onboarding activities are required.
If deficiencies are discovered during the onboarding process, we will bring those issues to your attention and discuss the impact of the deficiencies on our provision of our monthly managed services. Please note, unless otherwise expressly stated in the Quote, onboarding-related services do not include the remediation of any issues, errors, or deficiencies (“Issues”), and we cannot guarantee that all Issues will be detected during the onboarding process.
Ongoing / Recurring Services
Ongoing/recurring services are services that are provided to you on an ongoing basis and, unless otherwise indicated in a Quote, are billed to you monthly. Ongoing services generally begin upon the completion of onboarding services; therefore, any delays or interruptions to the onboarding services may delay the commencement of ongoing/recurring services.
Managed Services
The following Services, if listed in the Quote, will be provided to you, definitions, processes, and outcomes follow.
Core IT Program Inclusions
Business Technology Strategy and Growth:
- KPI Implementation
- Data Discovery & Mapping
- Technology Infrastructure and Expansion Efficiency
- Core Technology Benchmarking
Support
- Unlimited Everyday Support
- After Hours Emergency Support
- Comprehensive Metrics Dashboard
- Optionally available with additional fees: Always Ready Onsite Support
- 3rd Party Technology Vendor Support Coordination
Monitoring & Automation
- 24/7 Monitoring
- Operating System Patch Management
- 3rd Party Patch Management
- Network Monitoring
Cybersecurity & Data Integrity
- High-Level Data Classification
- High-Level Dataflow Diagram
- Administrative Account Password Rotation
- Just-in-time Administrative Accounts to Minimize Attack Opportunities
Reporting & Transparency
- Managed Documentation
- Warranty Reporting
- Client Dashboard
Business Continuity & Recovery
- Backup Management
- Backup Licensing
- Microsoft 365 + Google Workspace Backup
- Easy Password Reset
Catalyst IT Program Inclusions
Business Technology Strategy and Growth:
- KPI Implementation
- Data Discovery & Mapping
- Technology Infrastructure and Expansion Efficiency
- Core Technology Benchmarking
- Comprehensive Technology Benchmarking
- Regular Strategy Meetings
- Strategic Growth Planning
- Annual Business Technology Performance Reviews
- Proactive Technology Risk Mitigation
- Digital Transformation Opportunity Assessment and Recommendations
- Business Continuity and Disaster Recovery Planning
- Regular Technology Budget Forecasting
- Long-Term Support Trend Analysis
- Impact-Driven Technology Roadmaps
Support
- Unlimited Everyday Support
- After Hours Emergency Support
- Comprehensive Metrics Dashboard
- Always Ready Onsite Support
- 3rd Party Technology Vendor Support Coordination
- Ongoing Stakeholder Meetings
- Proactive Client Feedback Analysis & Response
- "Meet your IT" Program for Ongoing Q&A
- Optionally available with additional fees: Bespoke White Glove Onsite Visit
Monitoring & Automation
- 24/7 Monitoring
- Operating System Patch Management
- 3rd Party Patch Management
- Network Monitoring
- Policy Driven Software Deployment
- Advanced Network Monitoring
- Microsoft 365 Configuration Management
Cybersecurity & Data Integrity
- High-Level Data Classification
- High-Level Dataflow Diagram
- Administrative Account Password Rotation
- Just-in-time Administrative Accounts to Minimize Attack Opportunities
Reporting & Transparency
- Managed Documentation
- Warranty Reporting
- Client Dashboard
Business Continuity & Recovery
- Backup Management
- Backup Licensing
- Microsoft 365 + Google Workspace Backup
- Easy Password Reset
Co-Managed IT Program Inclusions
Business Technology Strategy and Growth:
- KPI Implementation
- Data Discovery & Mapping
- Technology Infrastructure and Expansion Efficiency
- Core Technology Benchmarking
- Comprehensive Technology Benchmarking
- Regular Strategy Meetings
- Strategic Growth Planning
- Annual Business Technology Performance Reviews
- Proactive Technology Risk Mitigation
- Digital Transformation Opportunity Assessment and Recommendations
- Business Continuity and Disaster Recovery Planning
- Regular Technology Budget Forecasting
- Long-Term Support Trend Analysis
- Impact-Driven Technology Roadmaps
Support
- Unlimited Everyday Support for Level 2.5+ Escalations
- After Hours Emergency Support
- Comprehensive Metrics Dashboard
- 3rd Party Technology Vendor Support Coordination
- Optionally available with additional fees: Always Ready Onsite Support
- Ongoing Stakeholder Meetings
Monitoring & Automation
- 24/7 Monitoring
- Operating System Patch Management
- 3rd Party Patch Management
- Network Monitoring
- Policy Driven Software Deployment
- Advanced Network Monitoring
- Microsoft 365 Configuration Management
Cybersecurity & Data Integrity
- High-Level Data Classification
- High-Level Dataflow Diagram
- Administrative Account Password Rotation
- Just-in-time Administrative Accounts to Minimize Attack Opportunities
Reporting & Transparency
- Managed Documentation
- Warranty Reporting
- Client Dashboard
Business Continuity & Recovery
- Backup Management
- Backup Licensing
- Microsoft 365 + Google Workspace Backup
- Easy Password Reset
Core Security Program Inclusions
User & Endpoint Protection:
- Computer Encryption
- Endpoint Security Hardening
- Web Browser Security Hardening
- Administrative Access Control
- Unapproved Software Protection
- Local Application Communication Protection
- Endpoint Detection and Response (EDR)
- Core Managed Endpoints Detection and Response (MDR)
Content & Access Control
- Category Driven Malicious Website Protection & Content Filtering
- DNS Protection
Email & Communication Security
- Business Email Compromise Protection
- Business Email Compromise Detection and Response
- Regular Phishing Simulation
Security Awareness & Education
- Security Awareness Training
Catalyst Security Program Inclusions
User & Endpoint Protection:
- Computer Encryption
- Endpoint Security Hardening
- Web Browser Security Hardening
- Administrative Access Control
- Unapproved Software Protection
- Local Application Communication Protection
- Endpoint Detection and Response (EDR)
- Core Managed Endpoint Detection and Response (MDR)
- Catalyst Managed Endpoint Detection and Response (MDR) with Enhanced Threat Analysis
- Network Detection and Response (NDR)
Content & Access Control
- Category Driven Malicious Website Protection & Content Filtering
- DNS Protection
Email & Communication Security
- Business Email Compromise Protection
- Business Email Compromise Detection and Response
- Suspicious Email Analysis Service
- Regular Phishing Simulation
Security Awareness & Education
- Security Awareness Training
Analysis & Mitigation
- IT Asset Device Discovery, Detection, and Auditing
- Network Penetration Testing and Endpoint Continuous Assessment
- Dark Web Identity Monitoring
- Security Information Event Management Platform (SIEM)
- Endpoint Vulnerability Detection (CVSS >= 7.0)
- Endpoint Vulnerability Management (CVSS >= 7.0)
- Endpoint Vulnerability Remediation (CVSS >= 7.0)
Optional Services - Quoted upon Customer Request
- SSO / Enhanced Multi-Factor Authentication
- Security Information Event Platform (SIEM) for Compliance
- SIEM Enhanced Log Retention
- Zero Trust Network Access (to replace VPN)
- Compliance Services (ISO, PCI, CIS, etc.)
- Incident Response Planning & Tabletop Exercises
- On-Call 3rd Party Incident Response Team
Compliance Security Program Inclusions
User & Endpoint Protection:
- Computer Encryption
- Endpoint Security Hardening
- Web Browser Security Hardening
- Administrative Access Control
- Unapproved Software Protection
- Local Application Communication Protection
- Endpoint Detection and Response (EDR)
- Core Managed Endpoint Detection and Response (MDR)
- Catalyst Managed Endpoint Detection and Response (MDR) with Enhanced Threat Analysis
- Network Detection and Response (NDR)
Content & Access Control
- Category Driven Malicious Website Protection & Content Filtering
- DNS Protection
Email & Communication Security
- Business Email Compromise Protection
- Business Email Compromise Detection and Response
- Suspicious Email Analysis Service
- Regular Phishing Simulation
Security Awareness & Education
- Security Awareness Training
Analysis & Mitigation
- IT Asset Device Discovery, Detection, and Auditing
- Network Penetration Testing and Endpoint Continuous Assessment
- Dark Web Identity Monitoring
- Security Information Event Management Platform (SIEM)
- Endpoint Vulnerability Detection (CVSS >= 7.0)
- Endpoint Vulnerability Management (CVSS >= 7.0)
- Endpoint Vulnerability Remediation (CVSS >= 7.0)
- Security Framework Controls Assessment and Reporting (CIS/ISO/etc.)
- Network and User Context Penetration Testing
- Optionally available with additional fees: Network and Endpoint Vulnerability Detection for Compliance
- Optionally available with additional fees: Network and Endpoint Vulnerability Management for Compliance
- Optionally available with additional fees: Network and Endpoint Vulnerability Remediation for Compliance
Optional Services with additional fees - Quoted upon Customer Request
- SSO / Enhanced Multi-Factor Authentication
- Security Information Event Platform (SIEM) for Compliance
- SIEM Enhanced Log Retention
- Zero Trust Network Access (to replace VPN)
- Compliance Services (ISO, PCI, CIS, etc.)
- Incident Response Planning & Tabletop Exercises
- On-Call 3rd Party Incident Response Team
Service Definitions, Platform/Technology, and Processes/Outcomes:
Managed IT Services
Business Technology Strategy and Growth
Item |
Platform / Technology |
Definition / Process / Outcome |
KPI Implementation Core IT, Catalyst IT, Co-Managed IT |
Dashboard/Reporting Platform This system consolidates data from various tools and platforms to present a unified, interactive metrics interface. |
Provides both industry-standard and custom client-specific KPIs related to IT service health, performance, ticketing trends, and infrastructure. The metrics are captured continuously and reviewed quarterly by the Technology Alignment Manager (TAM) during scheduled check-ins. This dashboard empowers clients to make data-informed decisions and tracks improvement over time. |
High-Level Data Discovery & Mapping Core IT, Catalyst IT, Co-Managed IT |
Diagraming Platform A collaborative tool used to visually represent systems, workflows, and data flows. Integrated into onboarding and reviewed regularly, it provides living documentation of how technology supports business operations. |
During the onboarding process for all programs, the Technology Alignment Manager (TAM) conducts structured interviews with key stakeholders to document operational workflows, system interactions, and data classifications (e.g., confidential, regulated, PII, etc.). These interviews culminate in clear, visual data-flow diagrams that map out where critical data resides and how it moves. The diagrams are maintained over time and play a key role in risk analysis, compliance planning, infrastructure modernization, and aligning technology with business priorities. |
Proactive Warranty Management Core IT, Catalyst IT, Co-Managed IT |
Lifecycle Management Platform Centralized system for tracking asset lifecycle data, warranty coverage, and replacement timelines. This platform serves as a shared source of truth for the Technology Alignment Manager (TAM) and vCIO teams. |
The TAM reviews warranty and lifecycle data during regular cadence visits, maintaining an up-to-date list of client assets with visibility into age, coverage status, and upcoming renewals. This asset intelligence is accessible to the vCIO at any time and is directly incorporated into strategic planning deliverables such as budgets, roadmaps, and risk mitigation strategies. If warranty-related issues arise between annual planning cycles, the vCIO surfaces these with business stakeholders proactively to ensure alignment and informed decision-making. This ongoing process ensures hardware reliability and reduces the likelihood of unplanned outages or capital surprises. |
Technology Infrastructure and Expansion Efficiency Core IT, Catalyst IT, Co-Managed IT |
Lifecycle Management Platform + Benchmarking Platform The Lifecycle platform maintains visibility into current infrastructure performance and replacement planning, while the Benchmarking platform compares client environments against best-practice standards and peer baselines. |
Annual high-level vCIO recommendations regarding current infrastructure and projected capacity needs over time. This service ensures that IT infrastructure is well-aligned with long-term business direction by evaluating available capacity, architectural fit, and growth potential. Using data maintained by the TAM and enhanced by benchmarking comparisons, the vCIO provides strategic insights that shape the organization’s infrastructure roadmap and capital planning. This guidance helps avoid unplanned limitations and supports technology decisions that scale with business objectives. |
Core Technology Benchmarking Core IT, Catalyst IT, Co-Managed IT
|
Benchmarking Platform A standards-based evaluation engine that compares client infrastructure, systems, and operations against industry norms and Manawa’s maturity frameworks. Tracks key dimensions of IT health, such as security, performance, and standardization. |
Annually, the Technology Alignment Manager (TAM) conducts a structured technology maturity assessment using the Benchmarking Platform. This assessment evaluates the client’s current IT environment against a comprehensive set of best practices and operational standards. The resulting benchmark score provides a clear view of strengths, risks, and areas for improvement. It also serves as a foundational reference for TAM recommendations and vCIO strategic planning. Benchmark results help prioritize remediation, guide planning, and track improvement over time. |
Comprehensive Technology Benchmarking Catalyst IT, Co-Managed IT |
Benchmarking Platform A maturity assessment and performance comparison platform used to evaluate client environments against industry standards and best-practice frameworks, updated monthly through structured review cycles. |
During regular Technology Alignment Manager (TAM) reviews, Manawa conducts a structured evaluation of the client’s IT environment using both industry standards and Manawa’s internal best practices. This benchmarking process uncovers gaps, risks, and opportunities in the way technology is configured, maintained, and aligned to business objectives. Each issue identified is then tied back to its impact on business processes, allowing clients to understand how specific technology gaps affect security, compliance, operational maturity, and return on investment. These findings support better prioritization, drive continuous improvement, and feed directly into vCIO-led strategic planning and technology roadmapping. |
Regular Strategy Meetings Catalyst IT, Co-Managed IT |
vCIO Platform A structured collaboration platform used to plan, document, and review strategic technology initiatives. Tracks goals, roadmaps, decision logs, and budgeting alignment across business units. |
As part of Catalyst and Co-Managed IT programs, clients participate in regular strategy meetings facilitated by their dedicated vCIO. These meetings are tailored to the size and needs of the organization and are designed to ensure alignment between technology planning and business direction. During each session, the vCIO provides updates on roadmap execution, reviews upcoming initiatives, and addresses critical topics such as risk, compliance, and operational efficiency. The forum also enables realignment based on shifting priorities or business conditions. Meeting outcomes are captured and revisited to ensure accountability and sustained progress on strategic objectives. |
Strategic Growth Planning Catalyst IT, Co-Managed IT |
vCIO Platform Used to model growth scenarios, align infrastructure planning with business expansion, and document the strategic impact of future-state initiatives. |
Strategic Growth Planning supports organizations in preparing their IT environments for scale, innovation, and market evolution. Through regular engagement, the vCIO works with business leaders to anticipate how future growth, restructuring, or expansion will affect technology infrastructure, systems, and support requirements. These discussions identify capacity constraints, investment needs, and potential bottlenecks before they impact the business. Strategic growth plans are incorporated into long-term roadmaps and budgeting cycles, ensuring that technology is positioned as an enabler of expansion rather than a barrier. |
Annual Business Technology Performance Reviews Catalyst IT, Co-Managed IT |
vCIO Platform + Benchmarking Platform Central hub for reviewing performance benchmarks, roadmaps, technology initiatives, risk remediation progress, and business alignment outcomes. |
Once per year, the vCIO facilitates a strategic performance review with business stakeholders to assess how technology has supported the organization’s goals over the past 12 months. This includes a review of roadmap progress, major initiatives, risk posture improvements, benchmark shifts, and budget vs. value delivery. The session provides transparency into what was achieved, what remains outstanding, and where priorities may need to shift. It also serves as a forum to align the coming year’s technology strategy with updated business goals and operational realities, ensuring continued return on investment and strategic alignment. |
Proactive Technology Risk Mitigation Catalyst IT, Co-Managed IT |
vCIO Platform + Benchmarking Platform Risk identification and mitigation insights are driven through ongoing benchmarking, environment reviews, and alignment checklists managed via the TAM’s structured workflow. |
Through regular alignment reviews, the TAM identifies technology risks related to outdated systems, security vulnerabilities, poor configurations, compliance gaps, and operational blind spots. These findings are flagged proactively using benchmarking standards and translated into recommended remediation actions. The vCIO and TAM then prioritize these items based on business impact and compliance needs. This structured process ensures that risks are continuously surfaced and addressed as part of the client’s active technology strategy, reducing the chance of operational disruption or audit failure. |
Digital Transformation Opportunity Assessment and Recommendations Catalyst IT, Co-Managed IT |
vCIO Platform + Benchmarking Platform Used to surface opportunities for automation, system modernization, and process digitization as part of ongoing business alignment work and roadmap planning. |
Manawa guides clients to identify areas where modern technology can meaningfully transform how they operate, compete, and grow. Through a combination of TAM environment familiarity and vCIO strategic insight, we uncover opportunities to replace outdated systems, automate manual workflows, digitize paper-based processes, and modernize customer or employee experiences. These opportunities are evaluated for impact and feasibility, then integrated into the client’s strategic technology roadmap. This service ensures that innovation becomes a regular part of business discussions, not just a reactive response to legacy constraints. |
Business Continuity and Disaster Recovery Planning Catalyst IT, Co-Managed IT |
Documentation + vCIO + Benchmarking Platforms Supports business continuity and recovery planning with environment documentation, RTO/RPO target validation, failover strategy mapping, and plan testing coordination. |
The vCIO and TAM work collaboratively with client stakeholders to assess business continuity requirements and document disaster recovery strategies. This includes validating recovery objectives (RTO/RPO), reviewing existing backup and failover mechanisms, identifying critical systems and processes, and highlighting areas of risk or single points of failure. Recommendations are prioritized based on business impact and integrated into the broader IT strategy. This service ensures that continuity and recovery planning are not one-time exercises but continuously reviewed and updated as environments and risks evolve. |
Regular Technology Budget Forecasting Catalyst IT, Co-Managed IT |
vCIO Platform Tracks upcoming renewals, infrastructure replacement schedules, and strategic project timelines to build forward-looking, predictable IT budgets. |
Through ongoing collaboration with business leadership, the vCIO prepares and maintains a rolling technology budget that reflects both operational needs and strategic growth plans. Budget forecasting includes planning for licensing renewals, hardware replacements, compliance initiatives, platform and environment transitions, and project investments. The TAM supports this process by maintaining up-to-date asset and risk data, which informs spending priorities. This service helps eliminate budget surprises, aligns technology planning with financial calendars, and improves long-term investment visibility. |
Long-Term Support Trend Analysis Catalyst IT, Co-Managed IT |
Professional Services Automation (PSA) + Dashboard Platforms Draws from historical support data including ticket volume, categories, root causes, and escalation trends to inform long-term planning and reduce technical friction. |
The TAM, in collaboration with the vCIO, conducts structured reviews of support activity to uncover recurring issues, inefficiencies, and opportunities for systemic improvement. By analyzing long-term ticket trends, Manawa identifies the root causes of support demand and translates those insights into strategic recommendations for remediation. This may include targeted user training, policy adjustments, automation, infrastructure upgrades, or platform changes. The ultimate goal is to reduce the number of tickets generated over time, because the best ticket is no ticket at all. This principle underpins Manawa’s service strategy, with a continuous focus on creating more stable, efficient, and self-sufficient IT environments. |
Impact-Driven Technology Roadmaps Catalyst IT, Co-Managed IT |
vCIO Platform Combines strategic recommendations from the vCIO with continuous alignment data from TAM reviews to maintain a dynamic, prioritized roadmap of initiatives. |
Manawa delivers and maintains a strategic roadmap that connects technology decisions directly to business impact. The roadmap includes prioritized initiatives based on benchmarking scores, risk mitigation needs, compliance requirements, support data trends, and growth planning. Each item is clearly linked to its operational or strategic benefit, whether it reduces risk, improves user experience, lowers support demand, or enables business expansion. This outcome-driven approach helps clients understand not just what to do next, but why. The roadmap is updated regularly in collaboration with the client to reflect shifting priorities and ensure accountability across all stakeholders. |
Support
Item |
Platform / Technology |
Definition / Process / Outcome |
Unlimited Everyday Support Core IT, Catalyst IT Co-Managed IT L2.5+ Escalations Only |
Professional Services Automation (Service Desk) + Support Portal Platforms A centralized, multi-channel system for ticket submission, tracking, technician dispatch, and user communication across phone, email, portal and web. |
Provides end users with access to Manawa’s service desk for daily IT needs including password resets, application issues, printing errors, workstation problems, and more. Support is delivered by service desk technicians through multiple channels to ensure quick resolution and minimal disruption. Unlimited support means users can contact the service desk as often as needed without additional charges. This service is included in Catalyst IT but not in Co-Managed IT, where L1 and L2 frontline support responsibilities are retained by the client and Manawa is available to escalate issues for L2.5 and above. |
After Hours Emergency Support Core IT, Catalyst IT, Co-Managed IT |
Professional Services Automation Platform + Alerting/Paging Platform Integrates service desk, mobile dispatch, and alerting tools to route urgent after-hours support requests to the designated on-call technician team. |
This service provides clients with access to Manawa’s support team outside regular business hours in the event of business-critical outages or emergencies. Whether it’s a server down, VPN failure, or network outage, the after-hours emergency support process ensures clients can reach a technician who will triage and begin resolution immediately. This service is intended for high-impact issues that cannot be deferred and is available to clients in the Catalyst and Co-Managed programs. All support activities are documented and followed up by the TAM or vCIO as needed during business hours. |
Comprehensive Metrics Dashboard Core IT, Catalyst IT, Co-Managed IT |
Dashboard/Reporting Platform This system consolidates data from various tools and platforms to present a unified, interactive metrics interface. |
Provides both industry-standard and client-specific KPIs related to service delivery, support activity, and infrastructure health. The dashboard enables ongoing visibility into service levels, identifies emerging issues early, and supports evidence-based decision-making. Data from the dashboard is also used by the TAM and vCIO to service trends, inform roadmaps, performance reviews, and budgeting discussions. |
Always Ready Onsite Support Catalyst IT Optional Paid Offering for Core IT and Co-Managed IT
|
Professional Services Automation Platform + Dispatch Optimization Platform Coordinates scheduling, routing, and documentation for technician site visits, integrated with Manawa’s central service desk and client environment records. |
When a technical issue cannot be resolved remotely, Manawa provides onsite support through scheduled or emergency technician visits. This may include hardware replacements, network troubleshooting, cabling issues, or physical diagnostics. Our onsite response model is designed for speed, consistency, and alignment with our standards-based processes. Field visits are coordinated through our dispatch platform and documented in the client’s support history. Onsite support is included in Catalyst and Co-Managed IT programs and is executed by skilled Manawa technicians who are familiar with the client’s environment and standards. |
3rd Party Technology Vendor Support Coordination Core IT, Catalyst IT, Co-Managed IT
|
Professional Services Automation Platform + Documentation Platform Centralized tools used to manage vendor contact records, escalation processes, and known support dependencies to ensure timely and effective coordination. |
Manawa acts on behalf of the client to initiate and manage support requests with third-party technology vendors such as ISPs, software providers, cloud platforms, hardware OEMs, etc. Our team gathers necessary information, engages the vendor, tracks issue resolution, and escalates when appropriate. We maintain documentation on vendor processes, support tiers, and contacts to streamline communication and eliminate delays. This service reduces the operational burden on internal teams and helps resolve cross-platform issues more quickly by ensuring Manawa remains the central point of coordination. |
Ongoing Stakeholder Meetings Catalyst IT, Co-Managed IT |
Professional Services Automation + vCIO + Customer Success Platforms Used to schedule, document, and follow through on stakeholder discussions, ensuring alignment across operational service delivery and strategic technology goals. |
Ongoing stakeholder meetings are a structured opportunity to maintain strong communication and alignment between Manawa and client leadership. These meetings may be led by either the Customer Success Manager (CSM) or the vCIO, depending on the topic and strategic depth. The CSM plays a key role in ensuring a smooth, friction-free client experience by addressing operational concerns, coordinating follow-ups, and stepping in onsite when needed to keep everything running smoothly. The vCIO facilitates higher-level discussions around long-term planning, risk, compliance, and strategic technology direction. Together, these roles ensure that clients benefit from both hands-on support and executive-level insight, all grounded in a consistent and responsive service relationship. |
Proactive Client Feedback Analysis & Response Catalyst IT, Co-Managed IT |
Customer Satisfaction + Professional Services Automation Platforms Collects and analyzes post-ticket surveys, stakeholder input, and sentiment indicators across client touchpoints, coordinated by the CSM and service leadership. |
Manawa actively gathers feedback from service desk interactions, strategic meetings, and client check-ins to better understand how clients perceive their technology experience. This feedback is reviewed by the Customer Success Manager (CSM) and key service leaders to detect patterns, anticipate dissatisfaction, and uncover opportunities to improve. When concerns or recurring themes emerge, Manawa takes prompt and targeted action, whether through coaching, process refinement, or service delivery updates. This ensures clients feel heard and see tangible outcomes from their input, reinforcing our commitment to delivering a consistently excellent and evolving experience. |
"Meet Your IT" Program for Ongoing Q&A Catalyst IT |
Virtual Collaboration Tools + CSM Facilitation Typically delivered over Microsoft Teams, Zoom, or occasionally in-person when a scheduled onsite day is available. |
The “Meet Your IT” program offers regularly scheduled office hours where users can drop in to speak directly with their Customer Success Manager (CSM). These sessions are casual and open-format, giving users the chance to ask questions, raise concerns, or gain clarity on IT tools and policies without submitting a ticket or scheduling a formal meeting. This initiative improves accessibility, fosters transparency, and helps clients feel supported and confident in how they use their technology. It’s one more way Manawa ensures a human, approachable IT experience within the Catalyst program. |
Bespoke White Glove Onsite Visits Optional paid service with Catalyst IT |
Professional Services Automation Platform + Dispatch Optimization Platform Managed by the Customer Success Manager and supported by Manawa’s dispatch and technician scheduling system. |
Bespoke White Glove Onsite Visits provide a higher-touch, hands-on support experience for organizations that prefer a physical IT presence, even when remote resolution would suffice. This service is designed to reduce the involvement required from end users and offer a more concierge-like experience. Whether supporting executive teams, onboarding new staff, or simply creating a more human IT presence, these visits allow users to offload the troubleshooting process entirely. Coordinated by the CSM, White Glove Visits reinforce Manawa’s commitment to delivering not just solutions, but standout service interactions that reflect the culture and expectations of each client. |
Monitoring & Automation
Item |
Platform / Technology |
Definition / Process / Outcome |
24/7 Monitoring Core IT, Catalyst IT, Co-Managed IT |
Remote Monitoring & Management (RMM) Platforms Continuously monitors servers, workstations, and network devices for signs of failure, performance degradation, or critical health events. Supports alerting, escalation, and remediation workflows. |
Manawa provides continuous, round-the-clock monitoring of client environments using our RMM platforms. This includes system availability, performance thresholds, patch status, backup success, and critical event detection across supported endpoints and infrastructure. When issues are detected, alerts are generated and routed for investigation or escalation according to the program. This proactive monitoring ensures risks are identified early, before they escalate into business-impacting problems, and enables faster resolution with minimal disruption to operations. |
Operating System Patch Management Core IT, Catalyst IT, Co-Managed IT |
Remote Monitoring & Management (RMM) + Mobile Device Management (MDM) Platforms Automates operating system patching across supported endpoints, with logging, compliance visibility, failure handling, and rollback capability. |
Manawa manages the patching of supported operating systems across workstations and servers to ensure devices remain secure and up to date. Patches are tested, approved, and deployed according to defined schedules and policies. This includes security updates, feature improvements, and stability enhancements. Failed patches are monitored and addressed to prevent exposure or performance degradation. This service supports compliance efforts and minimizes vulnerabilities by reducing the window between patch release and deployment. Reporting and auditing features are available to confirm patch status and coverage across the environment. |
Third Party Application Patch Management Core IT, Catalyst IT, Co-Managed IT |
Application Management Platform Designed to deploy, update, and manage hundreds of third-party applications via a curated software catalog and ephemeral agent, separate from the RMM. |
Manawa uses an application management platform to automate the deployment and maintenance of common third-party applications like Chrome, Zoom, Adobe, QuickBooks, and more. This platform provides a curated repository of over 1,200 titles, enabling reliable, customized rollouts without manual scripting . It uses ephemeral agents to run tasks and updates without installing permanent software, simplifying compliance and avoiding software bloat. Scheduled deployments and updates reduce security risks and configuration drift, while detailed logs support auditing and reporting. By separating third-party patching from core OS patching, this approach optimizes performance, security, and flexibility across all service tiers. |
Network Monitoring Core IT, Catalyst IT, Co-Managed IT
|
Network Monitoring, Management & Alerting Tools Actively monitors network devices for uptime, and errors. Includes SNMP monitoring, device inventory tracking, configuration backups and alerting thresholds. |
Manawa monitors the health and performance of critical network infrastructure, including switches, firewalls, access points, and internet circuits. Through SNMP-based monitoring and device management tools, we track uptime, performance metrics, error conditions, and configuration changes. Device inventory and backup routines ensure recoverability and audit readiness. When issues are detected—such as device outages, port errors, or configuration drift—alerts are triggered and acted on by the support team. This monitoring enables fast issue identification and resolution, supporting network stability, resilience, and proactive risk mitigation across all service tiers. |
Policy Driven Software Deployment Catalyst IT, Co-Managed IT
|
Application Management Platform Automates software deployment based on policy-defined configurations, ensuring approved tools are installed and maintained on the right devices. |
Manawa uses an application management platform to maintain standardized software across supported devices based on predefined policies. These policies define which applications should be present on each type of system. This platform checks for compliance on an ongoing basis and automatically installs, updates, or corrects software when deviations are found. This approach improves endpoint consistency, reduces configuration drift, and supports both security and compliance initiatives by keeping unauthorized or unapproved software out of the environment. |
Advanced Network Monitoring Catalyst IT, Co-Managed IT |
Network Monitoring, Management & Alerting Tools Extending the features of the Network Monitoring item, this enables advanced flow-based visibility, including interface traffic analysis, latency metrics, congestion detection, and long-term trend reporting. |
Advanced Network Monitoring extends the standard monitoring package by incorporating real-time and historical performance analytics. This service provides deeper insights into network health by capturing metrics like bandwidth usage, latency, jitter, and interface saturation. It also includes traffic flow visibility to help identify which users, applications, or devices are consuming resources. These insights help Manawa quickly diagnose bottlenecks, validate user experience concerns, and support capacity planning with data-backed recommendations. This service is included in Catalyst and Co-Managed programs for clients who require enhanced oversight of complex or high-demand network environments. |
Microsoft 365 Configuration Management Catalyst IT, Co-Managed IT |
Cloud Configuration Auditing and Policy Enforcement Tools Continuously monitors Microsoft 365 settings for deviation from approved baselines, flags misconfigurations, and enforces remediation policies where applicable. |
Manawa actively manages and audits the configuration of Microsoft 365 environments to ensure they remain secure, compliant, and aligned with organizational standards. This includes oversight of key settings across Exchange, SharePoint, OneDrive, Teams, and Entra. The service identifies and responds to deviations such as disabled MFA, excessive permissions, external sharing risks, or legacy authentication settings. Configuration data is monitored continuously, and any misalignments are prioritized for remediation. This helps reduce security risk, enforce policy consistency, and maintain a reliable, well-governed Microsoft 365 environment. |
Cybersecurity & Data Integrity
Item |
Platform / Technology |
Definition / Process / Outcome |
High-Level Data Classification Core IT, Catalyst IT, Co-Managed IT |
Documentation Platform + Diagramming Platform High level recording, organizing, and visually mapped business-critical data classifications as gathered through interviews and analysis. |
High-Level Data Classification is conducted through a structured interview process led by the Technology Alignment Manager (TAM). During onboarding and periodic reviews, the TAM works with stakeholders to identify types of data in use across the organization, determine where that data resides, and understand how it flows between users, systems, and external parties. This information is then documented and visually mapped in Manawa’s documentation and diagramming platforms as a high level data classification document. Classifications may include categories such as regulated, confidential, operational, and public data. This process provides the necessary context for building secure, compliant, and efficient IT environments. |
High-Level Dataflow Diagram Core IT, Catalyst IT, Co-Managed IT |
Diagramming Platform High level visually mapping of the flow of data between users, systems, applications, and external parties, based on structured discovery conducted by the TAM. |
The High-Level Dataflow Diagram is developed as part of Manawa’s onboarding and documentation process and maintained throughout the client relationship.. The Technology Alignment Manager (TAM) collaborates with key client stakeholders to map how data moves across business functions, departments, and systems. This is a high level document that includes identifying key sources and destinations of data, transmission paths, storage locations, and third-party access points. The diagram provides a high level picture of how information flows through the organization and highlights areas that may require stronger controls, segmentation, or oversight. This deliverable supports cybersecurity, compliance, and operational planning efforts by making the organization’s data architecture easier to understand and manage. |
Administrative Account Password Rotation Core IT, Catalyst IT, Co-Managed IT |
Privileged Access Management Automation Platform Automates the rotation, storage, and auditing of privileged administrative account passwords in accordance with security best practices. |
Manawa implements automated password rotation for administrative accounts to reduce the risk of credential compromise. This service ensures that privileged accounts across workstations, servers, and directory environments have strong, unique passwords that are changed regularly and stored securely. Automation eliminates reliance on manual processes and helps maintain compliance with security standards by ensuring credentials are updated on a defined schedule. It also supports audit readiness by maintaining logs of password changes and access events. This service strengthens endpoint and identity security across all managed environments. |
Just-in-time Administrative Accounts to Minimize Attack Opportunities Core IT, Catalyst IT, Co-Managed IT
|
Privileged Access Management Automation Platform On-demand provisioning and deactivation of administrative accounts to ensure elevated access is granted only during approved activities, then automatically removed. |
This service enhances identity security by ensuring administrative access is only available when explicitly required. Instead of leaving privileged accounts continuously active, Manawa uses automated workflows to provision temporary admin access for technicians or approved processes. Once the task is completed, access is revoked and the account is deactivated or deleted. This approach significantly reduces the attack surface for threat actors who target standing administrative credentials. It also supports auditability and compliance by providing visibility into who had access, when, and for what purpose. |
Reporting & Transparency
Item |
Platform / Technology |
Definition / Process / Outcome |
Managed Documentation Core IT, Catalyst IT, Co-Managed IT |
Documentation Platform Centralized system for capturing and organizing infrastructure details, system configurations, credentials, policies, procedures, and IT standards. |
Manawa maintains comprehensive documentation for each client, covering all critical components of their IT environment. This includes network topology, system configurations, vendor contacts, login credentials, backup procedures, licensing, support history, and more. Documentation is actively maintained by the Technology Alignment Manager (TAM) as part of regular engagement cycles and is kept current to reflect infrastructure changes, vendor transitions, or policy updates. Clients benefit from having immediate access to up-to-date records, which support faster resolution, easier onboarding, business continuity, and stronger alignment between IT and operations. |
Warranty Reporting Core IT, Catalyst IT, Co-Managed IT |
Lifecycle Management Platform Tracks warranty status, expiration dates, and service coverage for devices under management. Alerts TAMs to upcoming expirations and enables proactive replacement planning. |
Manawa provides regular warranty reporting that identifies the current status of all managed hardware assets, including workstations, servers, firewalls, and network devices. These reports highlight devices nearing or past warranty expiration so clients can plan for renewal or replacement before issues occur. The reporting supports asset lifecycle decisions, reduces the risk of downtime due to unsupported hardware failures, and aligns with budgeting cycles. Warranty reporting is reviewed during TAM visits and can be surfaced to vCIOs as part of broader roadmap or capital planning discussions. |
Client Dashboard Core IT, Catalyst IT, Co-Managed IT |
Dashboard/Reporting Platform Displays visual reports and key performance indicators such as support trends, asset status, compliance benchmarks, risk scores, and lifecycle timelines. |
Manawa provides each client with access to a live dashboard tailored to their specific needs and strategic priorities. The dashboard displays curated insights including ticketing trends, service levels, endpoint health, risk indicators, warranty exposure, and benchmarking scores. Where applicable, custom gauges and visualizations are configured to match the client’s industry, compliance requirements, or executive reporting preferences. This centralized view increases transparency, supports informed decision-making, and reinforces the ongoing value of Manawa’s managed services. |
Business Continuity & Recovery
Item |
Platform / Technology |
Definition / Process / Outcome |
Backup Management Core IT, Catalyst IT, Co-Managed IT |
Backup Monitoring and Alerting Platform Consolidates backup job monitoring across multiple systems and providers. Tracks backup success rates, exceptions, and failures and initiates follow-up for remediation. |
Manawa provides ongoing management of client backup environments, including monitoring, alerting, and escalation for failed or incomplete backup jobs. All backup systems are integrated into a central monitoring platform that aggregates job status and alerts Manawa’s team to any deviations from expected behavior. This includes missed backups, failure trends, job duration anomalies, and threshold violations. Backup issues are reviewed and addressed proactively to ensure that data protection remains reliable and recoverable. This service plays a critical role in business continuity planning and is regularly reviewed during TAM or vCIO sessions to validate that recovery goals are being met. |
Backup Licensing Core IT, Catalyst IT, Co-Managed IT |
On-site/Off-site Backup Software Platform Supports image-based backups for Windows, Linux, and Mac devices using cloud-only or hybrid models. Includes ability to backup and restore on on-premise appliances with recovery and failover capabilities. On-premise appliances sold/quoted separately based on customer need. |
Manawa provides and manages licensing for cloud-based and on-premise backup platforms depending on the client’s infrastructure and continuity requirements. Clients may opt for a direct-to-cloud backup model or use a customer-owned Business Continuity and Disaster Recovery (BCDR) appliance. On-premise appliances allow for local image-based backups, fast recovery of failed systems, and off-site replication to the cloud for disaster recovery. Each solution includes support for a wide range of workloads and offers clients at least one month of disaster recovery runtime annually. This licensing service ensures clients are covered with the right tools for backup, restore, and failover aligned with their business continuity objectives. 2TB of remote storage is included with the IT Services Program, additional 1TB blocks are billed at $25/TB/month. |
Microsoft 365 + Google Workspace Backup Core IT, Catalyst IT, Co-Managed IT |
Cloud Collaboration Suite Backup Platform Delivers automated, secure backups for Exchange, OneDrive, SharePoint, Teams, Gmail, Google Drive, Calendar, and more. |
Manawa protects client data stored in Microsoft 365 and Google Workspace by backing up key services across email, cloud storage, collaboration tools, and calendars. This service includes daily, automated backups of Exchange Online, SharePoint, OneDrive, Teams, Gmail, Google Drive, and Google Calendar, with flexible restore capabilities at the file, mailbox, or account level. It helps safeguard against data loss due to accidental deletion, malicious activity, license expiration, or retention policy gaps. The platform ensures that business-critical cloud data remains recoverable, audit-ready, and compliant with organizational continuity requirements. |
Easy Password Reset Core IT, Catalyst IT, Co-Managed IT |
User Self Service Password Reset and End User Verification Platform Allows end users to reset passwords from a mobile app with built-in 2FA and enables secure identity verification when contacting support. |
This service enables end users to reset their organizational passwords securely using a mobile app linked to their identity and protected by two-factor authentication (2FA). The app empowers users to handle password issues independently, reducing downtime and service desk volume. In addition, when users contact Manawa’s support team, the same app provides a fast and secure way to verify their identity before proceeding with assistance. This dual function enhances both user experience and security posture by making password management easier and identity validation more reliable. |
Cybersecurity Services
User & Endpoint Protection
Item |
Platform / Technology |
Definition / Process / Outcome |
Computer Encryption Core Security, Catalyst Security, Compliance Security |
RMM + MDM Platforms Leverages endpoint management tools to enforce, monitor, and report on built-in encryption technologies like BitLocker (Windows) and FileVault (macOS). |
Manawa enforces full disk encryption across supported endpoints using the operating system’s built-in technologies. This includes BitLocker for Windows and FileVault for macOS. Encryption is enabled, monitored, and managed through Manawa’s remote monitoring and mobile device management platforms to ensure compliance and recoverability. Encryption keys are securely escrowed or backed up where supported, and any devices found to be noncompliant are flagged for remediation. This service ensures sensitive data remains protected in the event of device loss or theft and is a foundational element of the client’s cybersecurity posture. |
Endpoint Security Hardening Core Security, Catalyst Security, Compliance Security
|
Endpoint Configuration Hardening and Drift Remediation Automates the application and enforcement of secure configuration baselines (e.g., CIS Benchmarks) across workstations and servers, regardless of domain connectivity. |
Manawa hardens endpoint systems by applying and maintaining secure configuration baselines aligned to best practices such as CIS Benchmarks. The service evaluates settings related to local accounts, browser behaviour, USB access, and system policies to reduce risk from misconfigurations. It continuously monitors for drift, remediates non-compliant changes, and helps ensure that devices remain aligned with compliance and security standards over time. This approach reduces the likelihood of compromise by limiting exploitable weaknesses in endpoint configurations. |
Web Browser Security Hardening Core Security, Catalyst Security, Compliance Security
|
Browser Configuration Hardening and Drift Remediation Evaluates and maintains secure settings across browser platforms, monitoring for deviations and enforcing policies aligned to standards. |
Manawa hardens endpoint browsers by applying and maintaining secure configuration baselines aligned to best practices. The service evaluates settings related to browsers and system policies to reduce risk from misconfigurations. It continuously monitors for drift, remediates non-compliant changes, and helps ensure that browsers remain aligned with compliance and security standards over time. This approach reduces the likelihood of compromise by limiting exploitable weaknesses in browser configurations. |
Administrative Access Control Core Security, Catalyst Security, Compliance Security |
Privileged Access Management Platform Provides secure, on-demand administrative access for approved tasks while keeping user accounts in a non-admin state by default. |
Manawa limits standing administrative rights on endpoints by default, reducing risk from malware, accidental changes, and privilege abuse. When administrative access is needed for approved actions, a secure elevation workflow is used to temporarily grant the necessary permissions. This ensures that elevated privileges are only available for the duration of a task and are automatically revoked when no longer required. All access events are logged for visibility and accountability. This service supports compliance, minimizes attack surfaces, and reinforces strong endpoint security policies across the organization. |
Unapproved Software Protection Core Security, Catalyst Security, Compliance Security
|
Zero Trust Application Control Platform Manages application-level trust policies that allow only pre-approved software to run on protected endpoints, with logging and policy change workflows. |
Manawa protects client environments from the risks associated with unapproved or malicious software by enforcing a zero trust approach to application execution. Only known and explicitly approved applications are permitted to run. Any attempt to launch unauthorized software is automatically blocked, with notifications and audit trails generated for review. This service prevents shadow IT, reduces the risk of ransomware and unwanted software installations, and strengthens overall endpoint compliance. Policy changes are reviewed and applied in coordination with the client to ensure flexibility without compromising control. |
Local Application Communication Protection Core Security, Catalyst Security, Compliance Security
|
Zero Trust Application Behavior Control and Segmentation Platform Restricts lateral application behavior by defining rules for how trusted programs can interact with files, other processes, registry keys, and external connections. |
Manawa enforces application-level boundaries to protect against misuse of legitimate software. This service ensures that even approved applications cannot interact with unrelated or sensitive system components unless explicitly allowed. For example, Microsoft Word cannot initiate PowerShell, or a web browser cannot access local system tools. These restrictions prevent common attack techniques like DLL injection, process hijacking, and command chaining. By containing application behavior at a granular level, this protection significantly reduces the impact of malware, user error, or internal misuse, supporting a zero trust security model across all endpoints. |
Endpoint Detection Response (EDR) Core Security, Catalyst Security, Compliance Security
|
Endpoint Detection and Response Agent A security-focused agent installed on endpoints to monitor activity, detect threats, and collect forensic data for real-time and retrospective analysis. |
This service provides advanced endpoint visibility and control through the deployment of an Endpoint Detection and Response (EDR) agent. The agent continuously monitors process behavior, network connections, file changes, and user actions across devices. Its role is to detect and isolate suspicious activity such as ransomware, lateral movement, or command-and-control behavior before it escalates. The data collected by the EDR agent powers threat detection, containment, and investigation workflows, and serves as the foundation for Manawa’s managed detection and response (MDR) tiers. While MDR services add human analysis and active response, this EDR layer ensures that every protected endpoint is being watched, logged, and protected at the process level at all times. |
Core Managed Detection and Response (MDR) Core Security, Catalyst Security, Compliance Security
|
Managed Detection and Response (MDR) Platform – Endpoint and Cloud Monitoring Combines EDR agent telemetry with cloud platform visibility, reviewed continuously by a 24/7 SOC for threat detection and guided response. |
Core MDR includes endpoint and cloud monitoring, forming the foundation of Manawa’s managed detection and response service. Using a lightweight EDR agent and cloud telemetry, the service collects security signals from devices and collaboration platforms like Microsoft 365. A dedicated 24/7 security operations center (SOC) reviews, investigates, and responds to alerts in real time. Confirmed threats are escalated to Manawa for action or containment as needed. This level of MDR significantly reduces threat dwell time and enables rapid response to malware, ransomware, and other high-confidence endpoint and cloud-based attacks. Core MDR is included in all Manawa service tiers. |
Catalyst Managed Detection and Response (MDR) with Enhanced Threat Analysis Catalyst Security, Compliance Security
|
Advanced MDR Platform - Full-Spectrum Detection and Threat Hunting Adds enhanced threat hunting by SOC analysts to uncover subtle or coordinated attack patterns. |
Catalyst MDR builds on the Core MDR foundation by introducing advanced threat hunting. Enhanced threat hunting allows SOC analysts to proactively investigate less obvious behavioral patterns or low-level signals that may suggest emerging threats. This service delivers broader detection coverage and deeper analysis, and is available exclusively in the Catalyst and Co-Managed IT programs. |
Network Detection and Response (NDR) Catalyst Security, Compliance Security
|
Dedicated Network Monitoring Appliance Captures and analyzes internet-bound traffic in the client’s environment. Extends visibility beyond endpoints to cover devices that cannot run EDR agents. Integrates with the MDR platform to enhance detection of lateral movement, beaconing, and other evasive behaviors. |
Network Detection and Response (NDR) uses a dedicated monitoring appliance deployed at the network edge to inspect traffic destined for the internet. It identifies signs of command-and-control communication, data exfiltration, unauthorized access attempts, and protocol misuse. Unlike endpoint protection tools, which monitor activities on the device, this appliance offers visibility into network-connected systems that cannot run an agent, including switches, printers, firewalls, access points, cameras, VoIP phones, and industrial control systems like PLCs. This additional telemetry is fed into Manawa’s Catalyst MDR service and reviewed by the 24/7 SOC, providing broader situational awareness and helping to detect threats that may originate from or target these unmanaged assets. |
Content & Access Control
Item |
Platform / Technology |
Definition / Process / Outcome |
Category Driven Malicious Website Protection & Content Filtering Core Security, Catalyst Security, Compliance Security |
DNS-Based Web Filtering with Endpoint Agent Enforcement Combines DNS-layer protection with endpoint agents to block access to malicious domains and enforce content access policies whether users are on or off the network. |
Manawa uses DNS-layer security and content filtering to protect users from malicious websites and enforce acceptable use policies. The solution categorizes and filters outbound DNS requests, preventing access to phishing sites, malware domains, and restricted categories such as adult content or streaming media. Endpoint agents are installed on user devices to ensure that protection remains active and policies are enforced even when the user is off the corporate network. This dual-layer approach enhances security, ensures compliance, and reduces the likelihood of user-initiated compromise through unsafe browsing activity. |
DNS Protection Core Security, Catalyst Security, Compliance Security
|
DNS-Based Threat Protection Platform (Backed by Real-Time Intelligence) Uses the same DNS-layer platform that powers content filtering, but with distinct threat-focused configurations to identify and block malicious destinations based on global threat feeds and behavioral analysis. |
Manawa uses a DNS-layer protection platform to prevent client devices from connecting to domains known to be associated with cyber threats. This includes phishing sites, ransomware delivery networks, botnet command-and-control servers, and other high-risk infrastructure. The system is powered by real-time threat intelligence and operates before the endpoint initiates a connection, making it highly effective for early-stage threat prevention. While the same platform also supports content filtering, this DNS Protection service focuses specifically on security — minimizing the risk of infection, credential theft, and unauthorized data transfer through malicious domains. DNS protection policies are enforced both on-network and remotely through device-based agents. |
Email & Communications Security
Item |
Platform / Technology |
Definition / Process / Outcome |
Business Email Compromise Protection Core Security, Catalyst Security, Compliance Security |
AI-Powered Zero Trust Email Security Applies adaptive filtering and verification on both incoming and outgoing mail using machine learning, sender reputation, and display-name analysis. |
Manawa protects clients from business email compromise (BEC) by employing a zero-trust filtering approach across inbound and outbound emails. The system builds a trust profile for each user based on communication patterns, categorizing messages from unverified senders as potentially risky. Machine learning evaluates factors such as sender domain reputation, header anomalies, display name mismatches, AI-identified phishing signals, and message context. A visible heads-up display highlights potential red flags, like impersonation or spoofing, so users can make informed decisions. Messages can be explicitly trusted or silenced, refining the model over time. This proactive, user-guided model stops fraudulent emails before they reach the inbox, supports outgoing mail integrity, and fosters safer communication. |
Business Email Compromise Detection and Response Core Security, Catalyst Security, Compliance Security
|
Cloud-Based Threat Monitoring and Managed Incident Response Continuously analyzes telemetry from Microsoft 365 and Google Workspace to detect suspicious activity such as unauthorized access, forwarding rule abuse, and account compromise, with active SOC involvement in response. |
Manawa leverages a managed detection and response (MDR) platform to monitor for signs of business email compromise within Microsoft 365 and Google Workspace environments. The system inspects logins, permissions, user behavior, mail flow patterns, and security configurations to identify account takeovers, internal impersonation, and data exfiltration attempts. When suspicious activity is detected, the 24/7 security operations center (SOC) investigates the event and initiates a coordinated response, which may include session invalidation, permission revocation, or guidance on user communications. This service ensures rapid detection and professional handling of high-impact compromise attempts across modern cloud email systems. |
Suspicious Email Analysis Service Catalyst Security, Compliance Security
|
On‑Demand Email Threat Analysis by 24/7 SOC Enables end users to forward suspicious emails to a dedicated SOC for in-depth risk evaluation and tailored guidance. |
Manawa enables users to submit suspicious or potentially malicious emails for professional review by a 24/7 security operations center (SOC). When a message appears abnormal or deceptive, such as impersonation attempts, spoofed senders, or unclear links, users can escalate it with a simple forward or submission. The SOC analyzes the content, headers, embedded links, and behavioral context, then returns an assessment and guidance on whether to trust, block, or further investigate the message. This service empowers end users to make confident, informed decisions and minimizes the risk of falling victim to sophisticated phishing or business email compromise attempts. |
Regular Phishing Simulation Core Security, Catalyst Security, Compliance Security |
Simulated Phishing Campaign and Awareness Training Platform Automates the delivery of realistic phishing emails and tracks user behavior to assess susceptibility and provide targeted learning opportunities. |
Manawa conducts ongoing phishing simulation campaigns to test end user awareness and readiness against social engineering attacks. These simulations mimic real-world phishing techniques and are customized to include company-relevant scenarios such as credential harvesting, spoofed invoices, and executive impersonation. The results are tracked to identify high-risk users and behaviors. Based on outcomes, targeted follow-up training may be delivered to reinforce key concepts. This service strengthens the human layer of cybersecurity, reduces click-through rates over time, and fosters a security-aware culture within the organization. |
Security Awareness & Education
Item |
Platform / Technology |
Definition / Process / Outcome |
Security Awareness Training Core Security, Catalyst Security, Compliance Security |
Online Security Awareness Training Platform Delivers structured training modules on phishing, password hygiene, data protection, and safe browsing, with completion tracking and user-level reporting. |
Manawa delivers a structured cybersecurity education program to help employees recognize and respond to digital threats. Topics include phishing awareness, password best practices, social engineering, data handling, and secure internet use. Courses are provided through an online platform, and training frequency can be tailored to organizational needs. Progress and participation are tracked to ensure compliance and accountability. This training helps reduce human risk, improve policy adherence, and foster a proactive security culture across the workforce. |
Analysis & Mitigation
Item |
Platform / Technology |
Definition / Process / Outcome |
IT Asset Device Discovery, Detection, & Auditing Catalyst Security, Compliance Security |
Automated Asset Discovery and Inventory Management Continuously scans the environment to detect connected devices, updates inventory records, and logs changes to asset configurations or network presence. |
Manawa continuously monitors and catalogs client IT environments to ensure full visibility into connected and managed assets. Devices such as workstations, servers, networking equipment, and mobile endpoints are automatically discovered and tracked. This includes metadata like system details, location, network role, and software footprint. Audit logs are maintained to track configuration changes, usage patterns, and anomalies. This service supports strategic decision-making for capacity planning, budgeting, compliance, and security hygiene, and ensures that unauthorized or unmanaged devices can be promptly identified and addressed. |
Network Penetration Testing and Endpoint Continuous Assessment Catalyst Security, Compliance Security
|
Automated Network Penetration Testing Platform Executes full-scope ethical hacking using proven attack frameworks in a consistent, affordable, and scalable manner. |
Manawa offers regular network penetration testing as part of Catalyst and Compliance programs. The service uses an automated platform to emulate the techniques of real-world cyber adversaries, conducting OSINT enumeration, vulnerability scanning, exploitation attempts, lateral movement simulations, and data exfiltration testing. Tests can be scheduled on-demand or periodically. Detailed reports include discovered vulnerabilities, potential impact, and prioritized remediation plans. This continuous offensive approach ensures IT postures remain robust against evolving threats, supports compliance, and identifies weaknesses that automated scanners alone may miss |
Dark Web Identity Monitoring Catalyst Security, Compliance Security
|
Breach Credential Monitoring and Alerting Platform Continuously scans the dark web, paste sites, and illicit marketplaces for exposed credentials and compromised identity data tied to client domains. |
Manawa provides ongoing monitoring of the dark web and other cybercriminal ecosystems to detect exposed credentials tied to client domains. If usernames, passwords, or other identity information appear in breach datasets, paste dumps, or underground marketplaces, alerts are generated for review and action. This early warning allows clients to reset compromised accounts, review affected systems, and educate users to prevent credential reuse and future compromise. The service supports defense-in-depth by reducing the risk of account takeover and lateral movement through exposed or reused passwords. |
Security Information Event Management Platform (SIEM) Catalyst Security, Compliance Security |
Integrated Security Telemetry Aggregation and Correlation Platform Collects and normalizes logs and alerts from distributed collectors, feeding into a central system monitored by security analysts for real-time threat correlation and incident response. |
Manawa provides SIEM functionality by aggregating security telemetry from multiple monitored sources including endpoints, cloud platforms, and dedicated network appliances. The data is normalized, enriched with threat intelligence, and correlated to identify potential attack chains, suspicious behaviours, or policy violations. The system prioritizes alerts and delivers them to a security operations center for expert analysis. This integrated approach improves visibility across the environment, accelerates incident detection, and supports advanced forensic investigation and compliance reporting. |
Endpoint Vulnerability Detection (CVSS >=7.0) Catalyst Security, Compliance Security
|
Endpoint-Level Vulnerability Detection and Risk Scoring Continuously monitors endpoints for known vulnerabilities with a CVSS score of 7.0 or greater and prioritizes based on severity and exploitability. |
Manawa continuously monitors all managed endpoints for vulnerabilities using embedded security telemetry. The platform identifies exposures rated 7.0 or higher on the Common Vulnerability Scoring System (CVSS), which typically represent high or critical risk to the business. These vulnerabilities may involve unpatched software, insecure configurations, or known exploits actively targeted by attackers. The detection process is automated and real-time, ensuring that newly discovered risks are surfaced without delay. Early identification enables timely remediation, reduces exposure windows, and supports regulatory and cyber insurance requirements related to patch management and endpoint security. |
Endpoint Vulnerability Management (CVSS >=7.0) Catalyst Security, Compliance Security
|
Vulnerability Prioritization and Lifecycle Tracking Platform Organizes vulnerabilities detected on endpoints by severity, business impact, and exploitability, and tracks them through the full resolution lifecycle. |
Manawa provides centralized management of endpoint vulnerabilities by consolidating detected high-risk exposures (CVSS ≥7.0) into a unified tracking system. Vulnerabilities are prioritized based on severity, asset criticality, and threat intelligence insights. The management platform enables IT teams to view, sort, and assess open vulnerabilities, assign ownership, and monitor status over time. This structured process improves accountability, ensures nothing is overlooked, and supports audit readiness for cybersecurity frameworks and insurance attestations. It bridges the gap between detection and remediation by converting technical findings into actionable plans that align with business risk tolerance. |
Endpoint Vulnerability Remediation (CVSS >=7.0) Catalyst Security, Compliance Security
|
Managed Patch Deployment and Configuration Hardening Executes remediation actions including patch installation, software updates, and system configuration adjustments to eliminate detected high-risk vulnerabilities. |
Manawa performs structured remediation of endpoint vulnerabilities that score 7.0 or higher on the CVSS scale. Remediation includes deploying vendor-issued patches, updating vulnerable software versions, and applying secure configuration templates. Actions are prioritized based on business impact and severity, and executed using centralized management platforms with audit logging. The process is coordinated to minimize user disruption while ensuring timely closure of exploitable gaps. This remediation service directly supports compliance with common security standards, reduces the attack surface, and strengthens endpoint resilience against real-world threats. |
Security Framework Controls Assessment and Reporting (CIS/ISO/etc) Compliance Security
|
Security Control Mapping and Framework-Based Gap Analysis Uses framework-aligned evaluations and control mapping tools to measure adherence to CIS, ISO 27001, NIST CSF, and other standards. |
Manawa helps organizations assess and align their cybersecurity practices with leading frameworks such as the CIS Controls, ISO 27001, or NIST CSF. We work collaboratively with clients to identify control gaps, review maturity levels, and develop prioritized recommendations for improvement. For organizations that are already pursuing or maintaining formal compliance, we assist in gathering supporting evidence, maintaining documentation, and responding to audits or assessments. Reports are designed for both operational and executive audiences, offering insight into security posture and enabling informed decisions around risk, investment, and governance. This service strengthens control maturity while supporting audit readiness and ongoing compliance. |
Network and User Context Penetration Testing Compliance Security
|
Identity-Aware Network Penetration Testing Platform Conducts simulated intrusions that test the security of accounts, identity access paths, and privileged roles within the network. |
Manawa offers enhanced penetration testing that goes beyond perimeter and vulnerability scanning to assess the security implications of user access and privilege levels. This service simulates attacker behaviour after initial access, evaluating what an intruder could do if a user account were compromised. Tests include lateral movement, privilege escalation, access to sensitive systems or data, and misuse of group memberships or permissions. Findings help quantify the real-world impact of access control weaknesses, and recommendations focus on tightening user roles, improving segmentation, and reducing attack surface from identity-related threats. This service is especially valuable for regulated industries or organizations with layered access models. |
Network and Endpoint Vulnerability Detection for Compliance Optional paid service with Compliance Security
|
Comprehensive Vulnerability Scanning and Risk Identification Uses agentless and agent-based tools to scan internal and external assets, systems, and applications for known vulnerabilities and configuration gaps relevant to regulatory compliance. |
Manawa delivers advanced vulnerability detection across the entire technology environment to support formal compliance initiatives. This includes scanning endpoints, internal infrastructure, cloud services, and internet-facing assets for known vulnerabilities, misconfigurations, and weak security practices. The detection tools can be customized for specific standards, including Canadian frameworks such as PIPEDA and provincial privacy acts, as well as global standards like PCI-DSS, HIPAA, ISO 27001, and NIST. The process provides clients with comprehensive risk visibility aligned to audit expectations, forming the first step in a broader compliance-aligned remediation lifecycle. |
Network and Endpoint Vulnerability Management for Compliance Optional paid service with Compliance Security
|
Compliance-Aligned Vulnerability Lifecycle Tracking and Reporting Categorizes vulnerabilities by compliance impact, asset criticality, and CVSS score, and supports evidence generation for control effectiveness and remediation tracking. |
Manawa manages vulnerability findings by consolidating them into structured compliance-aligned workflows. Vulnerabilities are prioritized based on business risk, CVSS severity, asset sensitivity, and relevance to specific regulatory frameworks including Canadian (PIPEDA, provincial laws) and global standards (PCI-DSS, HIPAA, ISO 27001, NIST CSF). The management process ensures that all vulnerabilities are tracked from discovery through resolution, with documentation of timelines, responsible parties, and remediation steps. This approach supports governance, risk, and compliance (GRC) objectives and strengthens the ability to demonstrate due diligence during audits, assessments, or incident reviews. |
Network and Endpoint Vulnerability Remediation for Compliance Optional paid service with Compliance Security
|
Policy-Driven Remediation Execution and Audit Logging Applies patches, reconfigures systems, and hardens environments in accordance with risk thresholds, compliance policies, and audit controls. |
Manawa coordinates the resolution of network and endpoint vulnerabilities that may impact regulatory compliance or security governance obligations. This includes deploying patches, reconfiguring systems, and applying secure baseline settings across internal and external infrastructure. Remediation actions are documented and aligned with standards such as PIPEDA, PCI-DSS, ISO 27001, HIPAA, and NIST, ensuring traceability for internal or third-party audits. Activities are prioritized by risk severity and mapped to control requirements, helping organizations reduce exposure while maintaining evidence of due diligence. This service supports stronger audit readiness, cyber insurance alignment, and long-term security posture improvement. |
Optional Services
Item |
Platform / Technology |
Definition / Process / Outcome |
SSO / Enhanced Multi-Factor AuthenticationO Optional paid service with Catalyst Security, Compliance Security |
Identity Federation and Adaptive MFA Integration Implements secure authentication mechanisms such as SSO (Single Sign-On) and adaptive MFA using centralized identity providers and conditional access rules. |
Manawa offers support for implementing centralized authentication using single sign-on (SSO) and enhanced multi-factor authentication (MFA) technologies. These services consolidate user identity across multiple systems and enforce layered access policies, reducing the risk of credential compromise and simplifying user access. Enhanced MFA options may include app-based push authentication, biometrics, geofencing, and risk-based challenges. This service is highly recommended for organizations pursuing regulatory compliance, zero trust architecture, or hybrid work security strategies. Manawa assists with architecture planning, rollout, and policy enforcement tailored to each client’s environment and risk profile. |
Security Information Event Managment Platform (SIEM) for Compliance Optional paid service with Catalyst Security, Compliance Security |
Extended Log Ingestion and Compliance-Centric SIEM Architecture Ingests syslog and event data from a broad range of sources including firewalls, servers, applications, and cloud platforms for centralized analysis and retention. |
This add-on SIEM service expands the core monitoring capabilities by collecting and correlating logs from additional enterprise sources beyond standard endpoint and network telemetry. Logs from firewalls, Active Directory, domain controllers, cloud applications, and third-party systems are ingested for deeper analysis and longer retention. The service can be delivered using an enhanced MDR platform or via external tools such as Splunk, based on client needs. Manawa supports setup, integration, and tuning of log sources and correlation rules. This level of visibility and retention is often necessary for meeting regulatory standards, cyber insurance mandates, or forensic investigation requirements. |
SIEM Enhanced Log Retention Optional paid service with Catalyst Security, Compliance Security
|
Extended Security Log Storage and Retrieval Retains logs from security sources beyond the standard 90-day period, with options for 6-, 12-, or 24-month storage depending on organizational needs. |
This optional service extends the default log retention window in the SIEM platform beyond the standard 90 days, enabling long-term storage of security events, alerts, and raw telemetry. Extended retention supports organizations with regulatory or contractual obligations to maintain logs for six months or more. It also enhances forensic readiness and enables longer-term trend analysis, threat hunting, and audit defense. The storage policies, indexing, and retrieval processes to ensure logs are accessible and properly secured throughout the retention period. |
Zero Trust Network Access (to replace VPNs) Optional paid service with Catalyst Security, Compliance Security |
Secure Access Service Edge (SASE) with Zero Trust Enforcement Delivers secure remote access through lightweight endpoint clients and cloud gateways, using device posture, user identity, and context-based policies to authorize connections. |
Manawa offers a modern secure access solution that replaces traditional VPN infrastructure with a zero trust network access (ZTNA) framework. This service ensures that users are only granted access to specific resources based on who they are, the health of their device, and where they are connecting from. It removes the need for broad network-level access and instead provides fine-grained, encrypted access to apps and internal services. This service simplifies remote connectivity, improves security posture, and enables more consistent enforcement of access controls across hybrid and remote workforces. It is ideal for organizations prioritizing zero trust architecture, least-privilege access, and VPN-free scalability. |
Compliance Services (ISO, PCI, CIS, etc.) Optional paid service with Catalyst Security, Compliance Security |
Collaborative Compliance Management Platform and Advisory Services Supports ISO 27001, PCI-DSS, CIS, and other frameworks with a centralized portal used jointly by Manawa and the client to track controls, gather evidence, assign responsibilities, and monitor progress toward compliance. |
Manawa offers expert-led compliance services to help organizations align with cybersecurity and data privacy frameworks such as ISO 27001, PCI-DSS, CIS Controls, NIST CSF, and more. Engagements include gap assessments, control mapping, audit preparation, remediation support, and policy development. A collaborative compliance management platform is provided, allowing both Manawa and the client to co-manage progress toward compliance, track control status, assign tasks, upload supporting documentation, and maintain audit-ready records. This structured, transparent approach ensures accountability, reduces the burden on internal teams, and accelerates readiness for formal audits, vendor assessments, and insurance attestations. |
Incident Response Planning & Tabletop Exercises Optional paid service with Catalyst Security, Compliance Security
|
Security Incident Response Framework and Interactive Workshop Facilitation Provides structured planning tools, customizable IR templates, and professionally led tabletop simulations tailored to the client’s environment and regulatory requirements. |
Manawa offers incident response planning and tabletop simulation services to help organizations prepare for and respond effectively to cyber threats. The engagement includes development or review of an incident response plan, customized to the client’s size, sector, and risk landscape. Manawa then facilitates tabletop exercises with key stakeholders, walking through realistic threat scenarios such as ransomware, data breaches, or insider threats. These sessions test roles, escalation paths, communication strategies, and technical responses, helping to uncover gaps before a real incident occurs. Debriefing and action planning are included to improve preparedness and resilience over time. This service is highly valuable for clients pursuing compliance, cyber insurance alignment, or business continuity objectives. |
On-Call 3rd Party Incident Response Team Optional paid service with Catalyst Security, Compliance Security |
Retainer-Based Cybersecurity Incident Response Partnership Establishes a standing agreement with a vetted third-party security firm to deliver emergency response services including containment, investigation, and recovery assistance. |
Manawa offers access to a third-party incident response team as an optional service, enabling rapid escalation in the event of a critical security incident. Clients benefit from a pre-established relationship with a specialized cybersecurity firm capable of handling breach containment, forensic investigation, impact analysis, recovery coordination, and post-incident reporting. This service is offered on a retainer or subscription basis to ensure guaranteed availability during emergencies. It complements internal and MDR capabilities by delivering deeper expertise and faster mobilization during high-severity events. This offering is particularly valuable for regulated industries, insured organizations, or businesses seeking to meet contractual breach response requirements. |
Remote Monitoring and Management
Software agents installed in Covered Equipment (defined below) report status and events on a 24x7 basis; alerts are generated and responded to in accordance with the Service Levels described below.
Remote Helpdesk
- Remote support provided during normal business hours for managed devices and covered software.
- Tiered-level support provides a smooth escalation process and helps to ensure effective solutions.
Remote Infrastructure Maintenance / Onsite Support
- Configuration, monitoring, and preventative maintenance services provided for the managed IT infrastructure
- If remote efforts are unsuccessful then Manawa will dispatch a technician to the Client’s premises to resolve covered incidents (timing of onsite support is subject to technician availability and scheduling)
Backup and Disaster Recovery
- 24/7 monitoring of backup system, including offsite backup, offsite replication, and an onsite backup appliance at customer expense (“Backup Appliance”)
- Troubleshooting and remediation of failed backup disks
- Preventive maintenance and management of imaging software
- Firmware and software updates of backup appliance
- Problem analysis by the network operations team
- Monitoring of backup successes and failures
- Weekly recovery verification
Backup Data Security: All backed up data is encrypted in transit and at rest in 256-bit AES encryption. All remote facilities housing backed up data implement physical security controls and logs, including security cameras, and have multiple internet connections with failover capabilities.
Remote Backup Retention: Backed up data will be retained for 7 days.
Backup Alerts: Managed servers will be configured to inform of any backup failures.
Recovery of Data: If you need to recover any of your backed up data, then the following procedures will apply:
Service Hours: Backed up data can be requested during our normal business hours, which are currently Monday to Friday from 8 AM to 6 PM Eastern Time.
Request Method. Requests to restore backed up data should be made through one of the following methods:
Restoration Time: We will endeavour to restore backed up data as quickly as possible following our receipt of a request to do so; however, in all cases data restoration services are subject to technician availability. Generally, we can restore between 0 and 1 GB of data within 4 hours of your request, and 1 GB to 5 GB within 8 hours of your request. Data restoration exceeding 5 GB will be handled in accordance with technician availability.
Updates & Patching
- Deploy updates (e.g., x.1 to x.2), as well as bug fixes, minor enhancements, and security updates as deemed necessary on all managed hardware.
- Perform minor hardware and software installations and upgrades of managed hardware.
- Perform minor installations (i.e., tasks that can be performed remotely and typically take less than sixty (60) minutes to complete).
- Deploy, manage, and monitor the installation of approved service packs, security updates and firmware updates as deemed necessary on all applicable managed hardware.
Firewall-as-a-Service Solution
- Provide a FIPS 140-2 compliant firewall configured for your organization’s specific bandwidth, remote access, and user needs.
- Helps to prevent hackers from accessing internal network(s) from outside the network(s), while providing secure and encrypted remote network access; provides antivirus scanning for all traffic entering and leaving the managed network; provides website content filtering functionality.
Managed Email Threat Protection
- Managed email protection from phishing, business email compromise (BEC), SPAM, and email-based malware.
- Friendly Name filters to protect against social engineering impersonation attacks on managed devices.
- Protection against social engineering attacks like whaling, CEO fraud, business email compromise or payroll fraud.Protects against newly registered and newly observed domains to catch the first email from a newly registered domain.
- Protects against display name spoofing.
- Protects against “looks like” and “sounds like” versions of domain names.
End User Security Awareness Training
- Online, on-demand training videos (multi-lingual).
- Online, on-demand quizzes to verify employee retention of training content.
- Baseline testing to assess the phish-prone percentage of users; simulated phishing email campaigns designed to educate employees about security threats.
Hardware as a Service (HaaS)
- Provision and deployment of designated hardware (see the Quote or other applicable schedule for complete hardware list – “HaaS Equipment”)
- Installation of HaaS Equipment.
- Repair/replacement of HaaS Equipment (see below for additional details).
- Technical support for HaaS Equipment.
- Periodic replacement of HaaS Equipment (see below for additional details).
Two Factor Authentication
- Advanced two factor authentication with advanced admin features.
- Secures on-premises and cloud-based applications.
- Permits custom access policies based on role, device, location.
- Identifies and verifies device health to detect “risky” devices
Password Manager
- Password Vault: Securely store and organize passwords in a secure digital location accessed through your browser or an app.
- Password Generation: Generate secure passwords with editable options to meet specific criteria.
- Financial Information Vault: Securely store and organize financial information such as bank accounts and credit card information in a secure digital location accessed through your browser or an app.
- Contact Information Vault: Store private addresses and personal contact information within your vault accessed through your browser or an app.
- Single Sign-On: Single sign-on grants authorized employees or users access to applications with a single set of login credentials, based on a user’s identity and permission levels. Single sign-on relies on SAML (Security Assertion Markup Language), a secure, behind-the-scenes protocol, to authenticate users to cloud, mobile, legacy, and on-premise apps.
- Browser App: Browser extension permits easy access to all of your information including the vaults, financial information, contact information, and single sign-on through the app.
- Smart-Phone App: Mobile phone app enables access to your vault and stored information on your mobile device.
Labor for New / Replacement Workstations
Includes all labor charges for setup of new workstations, or replacement of existing workstations.
- Labor covers:
- New computers / additional computers added during the term of the Quote;
- Replacement of existing computers that are four (4) or more years old (as determined by the manufacturer’s serial number records);
- Replacement of existing computers that lost/stolen or irreparably damaged and/or out of warranty but not yet four years old;
- Operating systems upgrades – subject to hardware compatibility.
The following restrictions apply:
- Upgrades or installs of new or replacement computers are limited to four (4) devices per month unless otherwise approved in advance by Manawa;
- This service is not available for used or remanufactured computers; and,
- New/replacement computers must be business-grade machines (not home) from a major manufacturer like Dell, HPE, or Lenovo.
Wi-Fi Management
- Projects for installation of new Wi-Fi equipment by Manawa at the Client’s premises will include a sufficient number of Wireless Access Points to provide a bandwidth of at least 10Mbps (download) in all areas requiring wireless network coverage, as agreed upon by Manawa and Client.
- Manawa will maintain, supervise, and manage the wireless system, including hardware and software at no additional cost.
- Installed equipment will be compatible with the then-current industry standards.
- Manawa will provide remote support services during normal business hours to assist with device connectivity issues. (Support services will be provided on a “best efforts” basis only, and Client understands that some end-user devices may not connect to the wireless network, or they may connect but not perform well).
Additional Description of Services
The following additional details further explain and define the scope of the Services.
Hardware as a Service (HaaS)
HaaS Equipment We will provide you with the HaaS Equipment described in the Quote or, if no hardware is expressly designated as HaaS Equipment in the Quote, then a complete list of HaaS Equipment will be provided to you under separate cover.
Deployment. We will deploy the HaaS Equipment within the timeframe stated in the Quote, provided that you promptly provide all information that we reasonably request from you to complete deployment. This deployment guaranty does not apply to any software, other managed services, or hardware devices other than the HaaS Equipment. If you wish to delay the deployment of the HaaS Equipment, then you may do so provided that you give us written notice of your election to delay no later than five (5) days following the date you sign the Quote. Deployment shall not extend beyond two (2) months following the date on which you sign the Quote. You will be charged at the rate of fifty percent (50%) of the monthly recurring fees for the HaaS-related services during the period of delay. Following deployment, we will charge you the full monthly recurring fee (plus other usage fees as applicable) for the full term indicated in the Quote.
Equipment Hardware Repair or Replacement. Manawa will repair or replace HaaS Equipment by the end of the business day following the business day on which the applicable problem is identified by, or reported to, Manawa and has been determined by Manawa to be incapable of being remediated remotely.
This warranty does not include the time required to rebuild your system, such as the time required to configure a replacement device, rebuild a RAID array, reload the operating system, reload and configure applications, and/or restore from backup (if necessary).
If Manawa fails to meet the warranties in this section and the failure materially and adversely affects your hosted environment (“Hosted System”), you are entitled to a credit in the amount of 5% of the monthly fee per hour of downtime (after the initial one (1) hour allocated to problem identification), up to 100% of your monthly fee for the affected HaaS Equipment. In no event shall a credit exceed 100% of the applicable month’s monthly fee for the affected equipment.
Periodic Replacement of HaaS Equipment. From time to time and in our discretion, we may decide to swap out older HaaS Equipment for updated or newer equipment. (Generally, equipment that is five years old or older may be appropriate for replacement). If we elect to swap out HaaS Equipment due to normal, periodic replacement, then we will notify you of the situation and arrange a mutually convenient time for such activity.
Return of HaaS Equipment. Unless we expressly direct you to do so, you will not remove or disable, or attempt to remove or disable, any software agents that we installed in the HaaS Equipment. Doing so could result in network vulnerabilities and/or the continuation of license fees for the software agents for which you will be responsible, and/or the requirement that we remediate the situation at our then-current hourly rates, for which you will also be responsible. Within ten (10) days after the termination of HaaS-related Services, Client will provide Manawa access to the premises at which the HaaS Equipment is located so that all such equipment may be retrieved and removed by us. If you fail to provide us with timely access to the HaaS Equipment or if the equipment is returned to us damaged (normal wear and tear excepted), then we will have the right to charge you, and you hereby agree to pay, the replacement value of all such unreturned or damaged equipment.
Covered Equipment / Hardware / Software
Managed Services will be applied to the equipment listed in the Quote and/or monthly invoice (“Covered Hardware”).
The Services will apply to the Manawa approved software on Covered Hardware (“Supported Software”) provided, however, that all Supported Software must, at all times, be properly licensed, and under a maintenance and support agreement from the Supported Software’s manufacturer. In this Services Guide, Covered Hardware and Supported Software will be referred to as the “Environment” or “Covered Equipment.”
We will provide support for any software applications that are licensed through us (see “Recurring Services” above). Such software (“Supported Software”) will be supported on a “best efforts” only, and any support required beyond Level 2-type support will be facilitated with the applicable software vendor/producer. Coverage for non-Supported Software is outside of the scope of the agreement, and will be provided to you on a time and materials basis. Should our technicians provide you with advice concerning non-Supported Software, the provision of that advice should be viewed as an accommodation, not an obligation, to you.
Physical Locations Covered by Services
Services will be provided remotely unless, in our discretion, we determine that an onsite visit is required. Onsite visits will be scheduled in accordance with the priority assigned to the issue (below) and are subject to technician availability. Unless we agree otherwise, all onsite Services will be provided at Client’s primary office location. Additional fees may apply for onsite visits: Please review the Service Level section below for more details.
Term; Termination
The Services will commence, and billing will begin, on the date indicated in the Quote (“Commencement Date”) and will continue through the initial term listed in the Quote (“Initial Term”). We reserve the right to delay the Commencement Date until all onboarding/transition services (if any) are completed, and all deficiencies / revisions identified in the onboarding process (if any) are addressed or remediated to Manawa’s satisfaction.
The Services will continue through the Initial Term until terminated as provided in the Agreement, the Quote, or as indicated in this section (the “Service Term”).
Auto-Renewal. After the expiration of the initial Service Term, the Service Term will automatically renew for contiguous terms equal to the initial Service Term unless either party notifies the other of its intention to not renew the Services no less than ninety (90) days before the end of the then-current Service Term.
Per Seat Licensing: Regardless of the reason for the termination of the Services, you will be required to pay for all per seat licenses (such as, if applicable, Microsoft NCE licenses) that we acquire on your behalf. Please see “Per Seat License Fees” in the Fees section below for more details.
Assumptions / Minimum Requirements / Exclusions
The scheduling, fees and provision of the Services are based upon the following assumptions and minimum requirements:
- Server hardware must be under current warranty coverage.
- All equipment with Microsoft Windows® operating systems must be running then-currently supported versions of such software and have all of the latest Microsoft service packs and critical updates installed.
- All software must be genuine, licensed and vendor-supported.
- Server file systems and email systems (if applicable) must be protected by licensed and up-to-date virus protection software should you choose not to use one of the platforms provided by Manawa.
- The Environment must have a currently licensed, vendor-supported server-based backup solution that can be monitored. If not Manawa will provide a Quote for one.
- All wireless data traffic in the environment must be securely encrypted.
- There must be an outside static IP address assigned to a network device, allowing VPN access.
- All servers must be connected to working UPS devices. If not Manawa will provide a Quote for an appropriate solution based as agreed upon with client meeting customer's Recovery Point Objective (RPO), Recovery Time Objective (RTO), and Recovery Service Level (RSL).
- Recovery coverage assumes data integrity of the backups or the data stored on the backup devices. We do not guarantee the integrity of the backups or the data stored on the backup devices. Server restoration will be to the point of the last successful backup.
- Client must provide all software installation media and key codes it not previously provided to Manawa in the event of a failure.
- Any costs required to bring the Environment up to these minimum standards are not included in this Services Guide.
- Client must provide us with exclusive administrative privileges to the Environment.
- Client must not affix or install any accessory, addition, upgrade, equipment, or device on to the firewall, server, or NAS appliances (other than electronic data) unless expressly approved in writing by us.
Exclusions. Services that are not expressly described in the Quote will be out of scope and will not be provided to Client unless otherwise agreed, in writing, by Manawa. Without limiting the foregoing, the following services are expressly excluded, and if required to be performed, must be agreed upon by Manawa in writing:
- Customization of third party applications, or programming of any kind.
- Support for operating systems, applications, or hardware no longer supported by the manufacturer.
- Data/voice wiring or cabling services of any kind.
- Battery backup replacement.
- Equipment relocation.
- The cost to bring the Environment up to the Minimum Requirements (unless otherwise noted in “Scope of Services” above).
- The cost of repairs to hardware or any supported equipment or software, or the costs to acquire parts or equipment, or shipping charges of any kind.
Service Levels
Automated monitoring is provided on an ongoing (i.e., 24x7x365) basis; response, repair, and/or remediation services (as applicable) will be provided only during business hours unless otherwise specifically stated in the Quote. We will respond to problems, errors, or interruptions in the provision of the Services in the timeframe(s) described below. Severity levels will be determined by Manawa in our discretion after consulting with the Client. All remediation services will initially be attempted remotely; Manawa will provide onsite service only if remote remediation is ineffective and, under all circumstances, only if covered under the Service plan selected by Client.
Service Level Objectives (SLO)
Trouble/Severity |
Response Time Objective* |
Resolution Time Objective* |
Unsupported Elements |
Priority 1 - Critical Problem |
15 minutes |
ASAP |
Best Effort |
Priority 2 - High |
30 minutes |
4 hours |
Best Effort |
Priority 3 - Medium |
4 hours |
8 hours |
Best Effort |
Priority 4 - Low |
4 hours |
2 business days |
Best Effort |
Priority Matrix
Impact |
High Urgency |
Medium Urgency |
Low Urgency |
High |
Priority 1 |
Priority 2 |
Priority 3 |
Medium |
Priority 2 |
Priority 3 |
Priority 4 |
Low |
Priority 3 |
Priority 4 |
Priority 4 |
Impact Definition
Impact |
Description |
High |
Critical - Major business processes are stopped |
Medium |
Business is degraded, but there is a reasonable workaround |
Low |
More of an irritation than a stoppage |
Urgency Definition
Urgency |
Description |
High |
Whole company is affected |
Medium |
Departments or large group of users are affected |
Low |
One user or a small group of users is affected |
* All time frames are calculated as of the time that Manawa is notified of the applicable issue / problem by Client through Manawa’s designated support portal, help desk, or by telephone at the telephone number listed in the Quote. Notifications received in any manner other than described herein may result in a delay in the provision of remediation efforts. Help desk support provided outside of our normal support hours will be billed to Client at Manawa's current professional service hourly rate, and a 2 hour minimum applies. Additionally, resolution times are based on Manawa's efforts and do not include time spent with 3rd party vendors while attempting to resolve the issue.
Service Credits: Our service level target is 90% as measured over a calendar month (“Target Service Level”). If we fail to adhere to the Target Service Level and Client timely brings that failure to our attention in writing (as per the requirements of the MSA), then Client will be entitled to receive a pro-rated service credit equal to 1/30 of that calendar month’s recurring service fees (excluding hard costs, licenses, etc.) for each day on which the Target Service Level is missed. Under no circumstances shall credits exceed 30% of the total monthly recurring service fees under an applicable Quote.
Fees
The fees for the Services will be as indicated in the Quote.
Changes to Environment. Initially, you will be charged the monthly fees indicated in the Quote. Thereafter, if the managed environment changes, or if the number of authorized users accessing the managed environment changes, then you agree that the fees will be automatically and immediately modified to accommodate those changes.
Minimum Monthly Fees. The initial Fees indicated in Quote are the minimum monthly fees (“MMF”) that will be charged to you during the term. You agree that the amounts paid by you under the Quote will not drop below the MMF regardless of the number of users or devices to which the Services are directed or applied, unless we agree to the reduction. All modifications to the amount of hardware, devices, or authorized users under the Quote (as applicable) must be in writing and accepted by both parties.
Increases. In addition, we reserve the right to increase our monthly recurring fees and, if applicable, our data recovery-related fees; provided, however, if an increase is more than five percent (5%) of the fees charged for the Services in the prior calendar year, then you will be provided with a sixty (60) day opportunity to terminate the Services by providing us with written notice of termination. You will be responsible for the payment of all fees that accrue up to the termination date and all pre-approved, non-mitigatable expenses that we incurred in our provision of the Services through the date of termination. Your continued acceptance or use of the Services after this sixty (60) day period will indicate your acceptance of the increased fees.
In addition to the foregoing, we reserve the right to pass through to you any increases in the costs and/or fees charged by third party providers for the third party services (“Pass Through Increases”). Since we do not control third party providers, we cannot predict whether such price increases will occur, however, should they occur, we will endeavour to provide you with as much advance notice as reasonably possible.
Travel Time. If onsite services are provided, we will travel up to 60 minutes from our office to your location at no charge. Time spent traveling beyond 60 minutes (e.g., locations that are beyond 60 minutes from our office, occasions on which traffic conditions extend our drive time beyond 60 minutes one-way, etc.) will be billed to you at our then current hourly rates. In addition, you will be billed for all tolls, parking fees, and related expenses that we incur if we provide onsite services to you.
Appointment Cancellations. You may cancel or reschedule any appointment with us at no charge by providing us with notice of cancellation at least one business day in advance. If we do not receive timely a notice of cancellation/re-scheduling, or if you are not present at the scheduled time or if we are otherwise denied access to your premises at a pre-scheduled appointment time, then you agree to pay us a cancellation fee equal to two (2) hours of our normal consulting time (or non-business hours consulting time, whichever is appropriate), calculated at our then-current hourly rates.
Automated Payment. You may pay your invoices by Pre-Authorized Debit (PAD), as described below.
- PAD. When enrolled in a PAD payment processing method, you authorize us to electronically debit your designated checking or savings account, as defined by you, for any payments due under the Quote. This authorization will continue until otherwise terminated in writing by you. We will apply a $35.00 service charge to your account for any electronic debit that is returned unpaid due to insufficient funds or due to your bank’s electronic draft restrictions.
- You may pay by cheque provided for one time projects if your cheque is delivered to us prior to the commencement of the project. Cheques that are returned to us as incorrect, incomplete, or “not sufficient funds” will be subject to a $50 administration fee and any applicable fees charged to us by your bank or financial institution.
Backup Payment Method.
In order to ensure seamless processing of payments and to maintain uninterrupted access to our services, we require that clients provide a valid credit card which will be kept securely on file. This credit card will only be utilized under the following circumstances:
- Failed Pre-Authorized Debit Transactions: In the event a Pre-Authorized Debit (PAD) transaction fails to process correctly due to any reason such as insufficient funds, bank errors, or any other cause, we reserve the right to attempt to charge the provided credit card for the full amount due.
- Discontinuation of PAD Authorization: If a client discontinues their PAD authorization or indicates an intention not to make payment as agreed, we may charge the owed amount to the credit card on file to cover all applicable fees due under the terms of the agreement.
Credit Card Processing Fee: Should it become necessary to use the credit card on file as a backup payment method, a processing fee of 3% of the transaction amount will be applied to cover additional costs associated with credit card payments.
Authorization and Notification: By providing a credit card on file, the client authorizes Manawa to charge the card for any of the reasons stated above. We commit to notifying the client via email at least 48 hours in advance of charging the credit card, detailing the amount and reason for the transaction.
Clients are encouraged to ensure that their billing information is kept current to avoid any service disruptions. If there are any changes to your payment method or if you have any questions about billing, please contact our billing department at accounting@manawa.net.
Microsoft Licensing Fees. The Services require that we purchase certain “per seat” licenses from Microsoft (which Microsoft refers to as New Commerce Experience or “NCE Licenses”) in order to provide you with one or more of the following applications: Microsoft 365, Dynamics 365, Windows 365, and Microsoft Power Platform (each, an “NCE Application”). To leverage the discounts offered by Microsoft for these applications and to pass those discounts through to you, unless otherwise agreed upon, we will purchase NCE Licenses for one (1) year terms for the NCE Applications required under the Quote. As per Microsoft’s requirements, NCE Licenses cannot be canceled once they are purchased and cannot be transferred to any other customer. Each NCE License that we purchase may require a one (1) or three (3) year term. For that reason, you understand and agree that regardless of the reason for termination of the Services, you are required to pay for all applicable NCE Licenses in full for the entire term of those licenses. Provided that you have paid for the NCE Licenses in full, you will be permitted to use those licenses until they expire, even if you move to a different managed service provider.
Additional Terms
Authenticity
Everything in the managed environment must be genuine and licensed—including all hardware, software, etc. If we ask for proof of authenticity and/or licensing, you must provide us with such proof. All minimum hardware or software requirements as indicated in a Quote or this Services Guide (“Minimum Requirements”) must be implemented and maintained as an ongoing requirement of us providing the Services to you.
Monitoring Services; Alert Services
Unless otherwise indicated in the Quote, all monitoring and alert-type services are limited to detection and notification functionalities only. Monitoring levels will be set by Manawa, and Client shall not modify these levels without our prior written consent. Client may request customized monitoring and alerting services from time-to-time for non-standard business critical items, and Manawa will endeavour to provide such services where possible via Manawa's monitoring and alerting platforms. Additional one-time or recurring monthly fees may apply to facilitate this customized monitoring.
Remediation
Unless otherwise provided in the Quote, remediation services will be provided in accordance with the recommended practices of the managed services industry. Client understands and agrees that remediation services are not intended to be, and will not be, a warranty or guarantee of the functionality of the Environment, or a service plan for the repair of any particular piece of managed hardware or software.
Configuration of Third Party Services
Certain third party services provided to you under this Services Guide may provide you with administrative access through which you could modify the configurations, features, and/or functions (“Configurations”) of those services. However, any modifications of Configurations made by you without our knowledge or authorization could disrupt the Services and/or or cause a significant increase in the fees charged for those third party services. For that reason, we strongly advise you to refrain from changing the Configurations unless we authorize those changes. You will be responsible for paying any increased fees or costs arising from or related to changes to the Configurations.
Dark Web Monitoring
Our dark web monitoring services utilize the resources of third party solution providers. Dark web monitoring can be a highly effective tool to reduce the risk of certain types of cybercrime; however, we do not guarantee that the dark web monitoring service will detect all actual or potential uses of your designated credentials or information.
Modification of Environment
Changes made to the Environment without our prior authorization or knowledge may have a substantial, negative impact on the provision and effectiveness of the Services and may impact the fees charged under the Quote. You agree to refrain from moving, modifying, or otherwise altering any portion of the Environment without our prior knowledge or consent. For example, you agree to refrain from adding or removing hardware from the Environment, installing applications on the Environment, or modifying the configuration or log files of the Environment without our prior knowledge or consent.
Co-Managed Environment
In co-managed situations (e.g., where you have designated other vendors or personnel, or “Co-Managed Providers,” to provide you with services that overlap or conflict with the Services provided by us), we will endeavour to implement the Services an efficient and effective manner; however, (a) we will not be responsible for the acts or omissions of Co-Managed Providers, or the remediation of any problems, errors, or downtime associated with those acts or omissions, and (b) in the event that a Co-Managed Provider’s determination on an issue differs from our position on a Service-related matter, we will yield to the Co-Managed Provider’s determination and bring that situation to your attention
Anti-Virus; Anti-Malware; Endpoint Protection Platforms (EPP); Endpoint Detection and Response (EDR)
Our anti-virus / anti-malware / EPP / EDR solution will generally protect the Environment from becoming infected with new viruses and malware (“Viruses”); however, Viruses that exist in the Environment at the time that the security solution is implemented may not be capable of being removed without additional services, for which a charge may be incurred. We do not warrant or guarantee that all Viruses and malware will be capable of being detected, avoided, or removed, or that any data erased, corrupted, or encrypted by malware will be recoverable. In order to improve security awareness, you agree that Manawa or its designated third party affiliate may transfer information about the results of processed files, information used for URL reputation determination, security risk tracking, and statistics for protection against spam and malware. Any information obtained in this manner does not and will not contain any personal or confidential information.
Breach/Cyber Security Incident Recovery
Unless otherwise expressly stated in the Quote, the scope of the Services does not include the remediation and/or recovery from a Security Incident (defined below). Such services, if requested by you, will be provided on a time and materials basis under our then-current hourly labor rates. Given the varied number of possible Security Incidents, we cannot and do not warrant or guarantee (i) the amount of time required to remediate the effects of a Security Incident (or that recovery will be possible under all circumstances), or (ii) that all data impacted by the incident will be recoverable. For the purposes of this paragraph, a Security Incident means any unauthorized or impermissible access to or use of the Environment, or any unauthorized or impermissible disclosure of Client’s confidential information (such as user names, passwords, etc.), that (i) compromises the security or privacy of the information or applications in, or the structure or integrity of, the Environment, or (ii) prevents normal access to the Environment, or impedes or disrupts the normal functions of the Environment.
Environmental Factors
Exposure to environmental factors, such as water, heat, cold, or varying lighting conditions, may cause installed equipment to malfunction. Unless expressly stated in the Quote, we do not warrant or guarantee that installed equipment will operate error-free or in an uninterrupted manner, or that any video or audio equipment will clearly capture and/or record the details of events occurring at or near such equipment under all circumstances.
Fair Usage Policy
Our Fair Usage Policy (“FUP”) applies to all Services that are described or designated as “unlimited.” An “unlimited” service designation means that, subject to the terms of this FUP, you may use the service as reasonably necessary for you to enjoy the use and benefit of the service without incurring additional time-based or usage-based costs. However, unless expressly stated otherwise in the Quote, all unlimited services are provided during our normal business hours only and are subject to our technicians’ availabilities, which cannot always be guaranteed. In addition, we reserve the right to assign our technicians as we deem necessary to handle issues that are more urgent, critical, or pressing than the request(s) or issue(s) reported by you. Consistent with this FUP, you agree to refrain from (i) creating urgent support tickets for non-urgent or non-critical issues, (ii) requesting excessive support services that are inconsistent with normal usage patterns in the industry (e.g., requesting support in lieu of training), (iii) requesting support or services that are intended to interfere, or may likely interfere, with our ability to provide our services to our other customers.
Hosted Email
You are solely responsible for the proper use of any hosted email service provided to you (“Hosted Email”).
Hosted Email solutions are subject to acceptable use policies (“AUPs”), and your use of Hosted Email must comply with those AUPs. In all cases, you agree to refrain from uploading, posting, transmitting or distributing (or permitting any of your authorized users of the Hosted Email to upload, post, transmit or distribute) any prohibited content, which is generally content that (i) is obscene, illegal, or intended to advocate or induce the violation of any law, rule or regulation, or (ii) violates the intellectual property rights or privacy rights of any third party, or (iii) mischaracterizes you, and/or is intended to create a false identity or to otherwise attempt to mislead any person as to the identity or origin of any communication, or (iv) interferes or disrupts the services provided by Manawa or the services of any third party, or (v) contains Viruses, trojan horses or any other malicious code or programs. In addition, you must not use the Hosted Email for the purpose of sending unsolicited commercial electronic messages (“SPAM”) in violation of any federal or state law. Manawa reserves the right, but not the obligation, to suspend Client’s access to the Hosted Email and/or all transactions occurring under Client’s Hosted Email account(s) if Manawa believes, in its discretion, that Client’s email account(s) is/are being used in an improper or illegal manner.
VoIP/ Phone System
911 Dialling / Emergency Dialling - Limitations
The VoIP Service (“VoIP Service”) may not support traditional 911 or E911 access to emergency services in all locations. The 911 dialling feature of the VoIP Service is not automatic; Client may be required to take affirmative steps to register the address where the VoIP Service will be used in order to activate the 911 Dialling feature. Client understands that Client must inform any users of the VoIP Service of the non-availability of traditional 911 or E911.
When a VoIP calling device is registered in a particular location, it cannot be moved without re-registering the device in the new location. Client agrees that it will not move any VoIP calling device without Manawa’s written consent. Client shall hold Manawa harmless for any and all claims or causes of action arising from or related to Client’s inability to use traditional 911 or E911 services.
When an emergency call is made, one or more third parties use the address of Client’s registered location to determine the nearest emergency response location, and then the call is forwarded to a general number at that location. When the emergency location receives Client’s call, the operator will not have Client’s address and may not have Client’s phone number. Client understands and agrees that users of the VoIP System must provide their address and phone number in order to get help. Client hereby authorizes Manawa to disclose Client’s name and address to third-party service providers, including, without limitation, call routers, call centres and public service answering points, for the purpose of dispatching emergency services personnel to Client’s registered location.
Client understands and agrees that 911 dialling does not and will not function in the event of a power failure or disruption. Similarly, the hosted VoIP Services will not operate (i) during service outages or suspensions or terminations of service by Client’s broadband provider or ISP, or (ii) during periods of time in which Client’s ISP or broadband provider blocks the ports over which the VoIP Services are provided. Client further understands and agrees that 911 Dialling will not function if Client changes its telephone number, or if Client adds or ports new telephone numbers to Client’s account, unless and until Client successfully register its location of use for each changed, newly added or newly ported telephone number.
Client expressly agrees not to use VoIP System for auto-dialling, continuous or extensive call forwarding, telemarketing, fax broadcasting or fax blasting, or for any other use that results in excessive usage inconsistent with standard commercial calling patterns.
Patch Management
We will keep all managed hardware and managed software current with critical patches and updates (“Patches”) as those Patches are released generally by the applicable manufacturers. Patches are developed by third party vendors and, on rare occasions, may make the Environment, or portions of the Environment, unstable or cause the managed equipment or software to fail to function properly even when the Patches are installed correctly. We will not be responsible for any downtime or losses arising from or related to the installation or use of any Patch. We reserve the right, but not the obligation, to refrain from installing a Patch if we are aware of technical problems caused by a Patch, or we believe that a Patch may render the Environment, or any portion of the Environment, unstable.
Backup (BDR) Services
All data transmitted over the Internet may be subject to malware and computer contaminants such as viruses, worms and trojan horses, as well as attempts by unauthorized users, such as hackers, to access or damage Client’s data. Neither Manawa nor its designated affiliates will be responsible for the outcome or results of such activities.
BDR services require a reliable, always-connected internet solution. Data backup and recovery time will depend on the speed and reliability of your internet connection. Internet and telecommunications outages will prevent the BDR services from operating correctly. In addition, all computer hardware is prone to failure due to equipment malfunction, telecommunication-related issues, etc., for which we will be held harmless. Due to technology limitations, all computer hardware, including communications equipment, network servers and related equipment, has an error transaction rate that can be minimized, but not eliminated. Manawa cannot and does not warrant that data corruption or loss will be avoided, and Client agrees that Manawa shall be held harmless if such data corruption or loss occurs. Client is strongly advised to keep a local backup of all of stored data to mitigate against the unintentional loss of data.
Procurement
Equipment and software procured by Manawa on Client’s behalf (“Procured Equipment”) may be covered by one or more manufacturer warranties, which will be passed through to Client to the greatest extent possible. By procuring equipment or software for Client, Manawa does not make any warranties or representations regarding the quality, integrity, or usefulness of the Procured Equipment. Certain equipment or software, once purchased, may not be returnable or, in certain cases, may be subject to third party return policies and/or re-stocking fees, all of which shall be Client’s responsibility in the event that a return of the Procured Equipment is requested. Manawa is not a warranty service or repair centre. Manawa will facilitate the return or warranty repair of Procured Equipment; however, Client understands and agrees that (i) the return or warranty repair of Procured Equipment is governed by the terms of the warranties (if any) governing the applicable Procured Equipment, for which Manawa will be held harmless, and (ii) Manawa is not responsible for the quantity, condition, or timely delivery of the Procured Equipment once the equipment has been tendered to the designated shipping or delivery courier.
Quarterly Business Review; IT Strategic Planning
Suggestions and advice rendered to Client are provided in accordance with relevant industry practices, based on Client’s specific needs and Manawa’s opinion and knowledge of the relevant facts and circumstances. By rendering advice, or by suggesting a particular service or solution, Manawa is not endorsing any particular manufacturer or service provider.
Technology Success Services (vCIO, Technology Alignment Managers, Technology Alignment Process)
The advice and suggestions provided by us in our capacity as a virtual chief technology or information officer will be for your informational and/or educational purposes only. Manawa will not hold an actual director or officer position in Client’s company, and we will neither hold nor maintain any fiduciary relationship with Client. Under no circumstances shall Client list or place the Manawa on Client’s corporate records or accounts.
Sample Policies, Procedures.
From time to time, we may provide you with sample (i.e., template) policies and procedures for use in connection with Client’s business (“Sample Policies”). The Sample Policies are for your informational use only, and do not constitute or comprise legal or professional advice, and the policies are not intended to be a substitute for the advice of competent counsel. You should seek the advice of competent legal counsel prior to using or distributing the Sample Policies, in part or in whole, in any transaction. We do not warrant or guarantee that the Sample Policies are complete, accurate, or suitable for your (or your customers’) specific needs, or that you will reduce or avoid liability by utilizing the Sample Policies in your (or your customers’) business operations.
Penetration Testing; Vulnerability Assessment
You understand and agree that security devices, alarms, or other security measures, both physical and virtual, may be tripped or activated during the penetration testing process, despite our efforts to avoid such occurrences. You will be solely responsible for notifying any monitoring company and all law enforcement authorities of the potential for “false alarms” due to the provision of the penetration testing services, and you agree to take all steps necessary to ensure that false alarms are not reported or treated as “real alarms” or credible threats against any person, place or property. Some alarms and advanced security measures, when activated, may cause the partial or complete shutdown of the Environment, causing substantial downtime and/or delay to your business activities. We will not be responsible for any claims, costs, fees or expenses arising or resulting from (i) any response to the penetration testing services by any monitoring company or law enforcement authorities, or (ii) the partial or complete shutdown of the Environment by any alarm or security monitoring device.
No Third Party Scanning
Unless we authorize such activity in writing, you will not conduct any test, nor request or allow any third party to conduct any test (diagnostic or otherwise), of the security system, protocols, processes, or solutions that we implement in the managed environment (“Testing Activity”). Any services required to diagnose or remediate errors, issues, or problems arising from unauthorized Testing Activity is not covered under the Quote, and if you request us (and we elect) to perform those services, those services will be billed to you at our then-current hourly rates.
HaaS
You will use all Manawa-hosted or Manawa-supplied equipment and hardware (collectively, “Infrastructure”) for your internal business purposes only. You shall not sublease, sublicense, rent or otherwise make the Infrastructure available to any third party without our prior written consent. You agree to refrain from using the Infrastructure in a manner that unreasonably or materially interferes with our other hosted equipment or hardware, or in a manner that disrupts or that is likely to disrupt the services that we provide to our other clientele. We reserve the right to throttle or suspend your access and/or use of the Infrastructure if we believe, in our sole but reasonable judgment, that your use of the Infrastructure is violates the terms of the Quote, this Services Guide, or the Agreement.
Obsolescence
If at any time any portion of the managed environment becomes outdated, obsolete, reaches the end of its useful life, or acquires “end of support” status from the applicable device’s or software’s manufacturer (“Obsolete Element”), then we may designate the device or software as “unsupported” or “non-standard” and require you to update the Obsolete Element within a reasonable time period. If you do not replace the Obsolete Element reasonably promptly, then in our discretion we may (i) continue to provide the Services to the Obsolete Element using our “best efforts” only with no warranty or requirement of remediation whatsoever regarding the operability or functionality of the Obsolete Element, or (ii) eliminate the Obsolete Element from the scope of the Services by providing written notice to you (email is sufficient for this purpose). In any event, we make no representation or warranty whatsoever regarding any Obsolete Element or the deployment, service level guarantees, or remediation activities for any Obsolete Element.
Hosting Services
You agree that you are responsible for the actions and behaviours of your users of the Services. In addition, you agree that neither Client, nor any of your employees or designated representatives, will use the Services in a manner that violates the laws, regulations, ordinances, or other such requirements of any jurisdiction.
In addition, Client agrees that neither it, nor any of its employees or designated representatives, will: transmit any unsolicited commercial or bulk email, will not engage in any activity known or considered to be "spamming" and carry out any "denial of service" attacks on any other website or Internet service; infringe on any copyright, trademark, patent, trade secret, or other proprietary rights of any third party; collect, attempt to collect, publicize, or otherwise disclose personally identifiable information of any person or entity without their express consent (which may be through the person or entity's registration and/or subscription to Client’s services, in which case Client must provide a privacy policy which discloses any and all uses of information that you collect) or as otherwise required by law; or, undertake any action which is harmful or potentially harmful to Manawa or its infrastructure.
Client is solely responsible for ensuring that its login information is utilized only by Client and Client’s authorized users and agents. Client’s responsibility includes ensuring the secrecy and strength of user identifications and passwords. Manawa shall have no liability resulting from the unauthorized use of Client’s login information. If login information is lost, stolen, or used by unauthorized parties or if Client believes that any hosted applications or hosted data has been accessed by unauthorized parties, it is Client’s responsibility to notify Manawa immediately to request the login information be reset or unauthorized access otherwise be prevented. Manawa will use commercially reasonable efforts to implement such requests as soon as practicable after receipt of notice.
Licenses
If we are required to re-install or replicate any software provided by you as part of the Services, then it is your responsibility to verify that all such software is properly licensed. We reserve the right, but not the obligation, to require proof of licensing before installing, re-installing, or replicating software into the managed environment. The cost of acquiring licenses is not included in the scope of the Quote unless otherwise expressly stated therein.