Certifications & Partnerships
Certifications

Cyber VerifyTM
The Cyber VerifyTM is based on the Unified Certification Standard (UCS) for Cloud and Managed Service Providers developed by the MSPAlliance.
We're proud of this certification because:
-
It's the only certification specifically designed for managed service and managed security service providers.
-
It shows we've been examined by an independent third party.
-
It must be renewed on an annual basis.

AICPA SOC 2
The SOC 2 report is a compliance report, not a certification. The report is designed to give the user insight into the system controls to assess and address the risks associated with an outsourced service.
The SOC 2 is often the primary document security departments rely upon to assess a vendor’s security risk. The report plays an important role in oversight, vendor management programs, internal corporate governance, risk management processes, and regulatory oversight.

MSP 501
Our inclusion on the Channel Futures MSP 501 list places us among the best managed technology support providers in the world.

Microsoft Gold Partner
This certification recognizes our mastery of Microsoft products and cutting-edge business technologies including Azure cloud services, Office 365, and Microsoft Windows.
Partnerships
We perform extensive due diligence before partnering with vendors. We're proud to do business with the service providers below.

KnowBe4 is the world’s largest integrated platform for security awareness training combined with simulated phishing attacks.

With an automated, cloud-based platform, LogicMonitor enables global MSPs to supercharge their managed service offering and increase operational efficiency.

Mimecast’s value begins with the most effective cloud-native platform for the #1 threat vector: email.

SentinelOne's Singularity Platform instantly defends against cyberattacks—performing at a faster speed, greater scale, and higher accuracy than possible from any single human or even a crowd.

Fortinet empowers its customers with intelligent, seamless protection across the expanding attack surface and the power to take on ever-increasing performance requirements of the borderless network—today and into the future.