Skip to main content

Your Hometown IT Services provider with Heart of an Educator

Photo of Owner, Graham PearsonAt Ma3SP, we believe in building long-lasting relationships with our clients based on trust, transparency, and accountability. We work closely with our clients to understand their unique needs and tailor our services to meet their specific requirements.  Our goal is to relieve the burden of managing technology from our clients, so they can focus on what they do best – running their business.

Our team of experts at Ma3SP understands that every business operates differently and faces unique challenges. That’s why we have developed a tailor-made suite of services to meet your specific IT needs. Our services include proactive monitoring, patch management, help desk support, disaster recovery, cybersecurity, data backup and more.

At Ma3SP, we understand that many businesses are currently using a technology service provider that operates in the Break/Fix Model. This model is reactive and often leads to unexpected expenses and downtime for your business.

Our managed IT services provides an alternative to the Break/Fix Model by offering proactive monitoring and support. We remotely monitor your system 24/7, often detecting and resolving issues before they cause any disruption. Our team of experts also works with you to plan ahead and ensure your technology is up to date and functioning optimally.

Our goal is to help your business operate efficiently and effectively by addressing issues before they become major problems. By partnering with us, you can rest assured your technology infrastructure is well-managed and always working for you.

If you’re tired of the reactive, unpredictable nature of the Break/Fix Model, it’s time to consider a proactive approach to your IT needs. Contact us today to schedule a consultation and learn more about our tailored approach to managing your IT infrastructure.

“Ma3SP your hometown  IT services provider with Heart of an Educator”

At Ma3SP, we know that businesses operating in the Break/Fix Model can face unpredictable and expensive technology issues. That’s why we’re offering a special offer for businesses who are currently utilizing a Break/Fix Model technology service provider.
When you switch to our managed IT services, we will waive the onboarding fee and save twenty percent on your annual technology spend,  allowing you to start taking advantage of our proactive support services immediately. Our team of experienced professionals will work with you to ensure your technology infrastructure is optimized for efficiency and productivity.
Your Requirements:
  • Be transparent in what you are currently paying your current provider over a 12 month period with any charges
  • Be transparent in what can be improved upon in your current technology environment
  • Be transparent in what you are currently paying on other technology services that we provide but your current provider is not providing

Our Requirements:

  • We will provide Managed Services to your business with one of our packages we offer that will beat your annual technology spend by twenty percent.
  • One year committment. Each additional year of service, the monthly amount will increase by twelve percent. Not to exceed the fully managed service stack of $250.00 per user.
  • Your business must have a commercial grade firewall with an active subscription that provides updates on a regular basis.  Home Firewalls, Netgear Routers, Comcast Gateways do not qualify. If you do not have one, one can be purchased through us.
  • We will break down the annual technology spend by 12 and then divide that by the number of users to come up with a per user cost.
  • We will start with our Basic Managed Services.
  • We do not want a business to break out of a current contract unless other circumstances are relevant for a contract breech.

I am greatful to the ends of the earth for Graham and his company. His educator background taught me key things that took my Graham and his company have revolutionized my business. His background as an educator has given me a deep understanding of the industry, while his technical knowledge and willingness to stay on top of the latest trends has enabled us to reach new financial heights. He is truly invaluable and I cannot thank him enough for all he has done.

Randall H

I am very thankful for Graham, and Ma3SP, and his willingness to help solve our IT issues. Graham also is focused on making sure we are utilizing our system fully and seeing where we can consolidate our systems to save money, time, and resources.

Nate J

Our Managed Service Offering Includes:

Remote Monitoring and Managment

  • Provides real-time monitoring and management of your IT network, allowing for prompt detection and resolution of issues before they escalate into bigger problems.
  • Offers continuous asset discovery and inventory management, giving businesses greater visibility into their IT infrastructure for better planning and management of their technology resources.
  • Enables proactive maintenance and support of devices using automation to reduce the risk of downtime and limit the potential for security vulnerabilities.
  • Can be customized to meet specific business requirements, allowing for flexible levels of service and support options according to the specific needs and budget of the organization.


  • Provides 24/7 support for IT-related issues and incidents, ensuring that your team has access to reliable assistance regardless of when issues arise.
  • Offers responsive and timely support from experienced professionals, ensuring that IT-related issues are resolved quickly and efficiently to minimize any downtime.
  • Provides access to a Knowledge Base, enabling clients’ employees can quickly and easily troubleshoot common issues without the need for assistance.
  • Allows for easy tracking and reporting of issues through a single, centralized platform, providing transparency and clarity over all IT support issues, and their resolution

Software Patching

  • Offers automatic software patching and updating across all devices connected to the network, ensuring that all devices receive the latest security and software updates promptly.
  • Helps mitigate the risk of software vulnerabilities and other security flaws by ensuring that all patches are up-to-date.
  • Simplifies patch management by allowing it to be managed from a central location, reducing the need for manual intervention, which can lead to greater efficiency and accuracy.
  • Offers the flexibility to customize patching policies, such as selecting when patches are deployed and which patches are deployed, ensuring that the patching strategy aligns with clients’ needs, and availability windows.

Antivirus and Threat Protection

  • Provides comprehensive threat intelligence, with advanced security features to detect, prevent and remediate any security breaches or malware attacks.
  • Offers flexible and scalable solutions that are adaptable for any business size or structure, whether it is a small or large organization.
  • Cloud-based infrastructure, allows for automatic and constant updating of malware signatures in near real-time, safeguarding your IT network from the latest threats.
  • Can be remotely administered and monitored by our Managed Service Provider team, providing you with the peace of mind that your infrastructure is being regularly maintained and updated by professionals.

DNS Filtering

  • Provides a powerful security measure designed to protect users and IT infrastructure from cyber threats by filtering malicious content at the DNS layer, before it can potentially reach end-users.
  • Helps block unauthorized access to websites and browser-based attacks, mitigating cybersecurity risks and data breaches.
  • Gives organizations detailed insights into their network traffic patterns, making it easier for administrators to identify and block malicious activity quickly, to save time and resources that would otherwise be spent on breach remediation and incident response.
  • Helps identify and prevent vulnerabilities before they can be exploited, offering an added layer of protection that can help to ensure that a business’s IT network remains safe and secure at all times.

Network Printer Management

  • Allows for the centralized management of printer fleets, providing greater control and visibility to printer usage and performance, reducing costs and streamlining processes.
  • Enables remote monitoring of printer status and maintenance requirements, ensuring that IT providers can proactively respond to printer issues, limiting downtime and increasing availability.
  • Provides greater security via granular user-level and job-level security policies that enhance security features, protecting sensitive company information and reducing printing security breaches.
  • Can generate reports that can track printer usage and performance, enabling better decisions about resource allocation and identifying areas for improvement, while also enhancing cost-effectiveness.

DNS Hosting Per Domain

  • Access to an expansive global network of DNS servers
  • Improved reliability with distributed and replicated name servers
  • Reduced latency with low response times
  • Enhanced security with secure protocols against malicious attacks
  • Increased flexibility for adding domains and new record types
  • Easy management via user-friendly interfaces and APIs
  • Real-time monitoring to detect issues quickly and prevent downtime
  • Save costs by taking advantage of free management tools
  • Increased uptime and reliability with a reliable hosting provider
  • Improved scalability to handle unexpected traffic spikes
  • Constant monitoring of domain expiration dates to ensure continuous service
  • Automated renewal processes to prevent domain name expiry
  • Secured DNS records through advanced encryption methods
  • Seamless integration with web hosting services for complete domain management

Backup Appliance KUB-6 (6 Terabytes)

  • Provides automated and configurable disaster recovery services designed specifically for the needs of virtualized applications.
  • Allows organizations to quickly recover critical systems with minimal or no data loss in the event of an outage.
  • Offers local and remote snapshot replication capabilities that reduce the complexity of administering large-scale DR solutions.
  • Utilizes advanced compression and deduplication technology to maximize storage efficiency.
  • Includes comprehensive monitoring and reporting features that provide real-time visibility into your DR processes.
  • Features cost savings on licensing and infrastructure with simplified administration costs.
  • Delivers unprecedented protection through integrated encryption technology that safeguards customer data from unauthorized access.
  • Offers multiple deployment options, giving you flexibility in how you configure your DR solution.

Password Management Solution

  • Increase security by allowing users to set complex and unique passwords for each account, secure them with a master password, and access them on any device.
  • Minimize the risk of data breaches by ensuring that passwords are always up-to-date and stored securely in an encrypted form.
  • Improve user productivity through automated password reset requests and one-click login capabilities across multiple devices, applications and websites.
  • Ensure regulatory compliance by meeting audit requirements for strong password policies and secure storage of sensitive credentials.

Advanced Zero Day Protection

  • Proactively protect your systems from emerging and unknown cyber threats by identifying and responding to malicious attacks in real time.
  • Enable faster detection of malicious activities with advanced analytics and machine learning algorithms that detect anomalies in system behavior.
  • Achieve greater visibility into suspicious activities across the network and devices, allowing for more effective containment strategies to be implemented quickly.
  • Ensure compliance with regulatory requirements such as HIPAA, NIST, GLBA and PCI DSS by providing a secure layer of protection against new security vulnerabilities.

Multi-Factor Authentication

  • Enhance the security of user accounts with additional layers of authentication independent of user credentials.
  • Reduce the risk of credential theft by requiring two or more factors such as passwords, biometrics, and/or tokens to authenticate access to an enterprise system or service.
  • Increase security visibility by providing real-time risk analysis of potential attackers and their methods used against your network infrastructure.
  • Improve operational efficiency by streamlining authentication processes for end users without sacrificing data protection or privacy measures.
  • Mitigate compliance violations through the implementation of multi-factor authorization protocols that adhere to existing regulations and standards such as industry guidelines from HIPAA and PCI DSS.
  • Cost-effectively protect sensitive data from unauthorized access with out-of-band authentication solutions that rely on alternative communication channels like SMS, phone calls or push notifications sent directly to users’ mobile devices.
  • Quickly detect threats in near real time with advanced analytics capabilities for immediate response and remediation activities when malicious actors attempt to access critical systems or services.
  • Enable secure remote access to your organization’s applications and systems with multiple layers of authentication, while simultaneously providing a better user experience with fewer manual steps required during sign-on process

Email Backup Solution

  • Automatically create a backup of emails, attachments, and other data with scheduled backups or on-demand configurations easy to maintain and manage.
  • Protect business continuity by preventing any data loss resulting from user errors, malicious intent, hardware failure or system outages.
  • Achieve secure storage of emails in the cloud with encryption capabilities that prevent unauthorized access when transferring and storing critical data.
  • Retrieve deleted messages and recover corrupted files with advanced recovery features available both locally and in the cloud to quickly address any potential data issues.
  • Easily restore email accounts with complete recovery options that can be configured to recreate the exact email state prior to a catastrophic event such as a virus infection or system crash.
  • Simplify compliance requirements through automated retention polices for emails according to legal regulations like Sarbanes Oxley Act (SOX) and the Health Insurance Portability & Accountability Act (HIPAA).
  • Streamline search functions with advanced search capabilities that help users find information more quickly from their mailbox whether it’s stored locally or in the cloud backup service provider environment.

Email Filtering Solution

  • Protect your network from malicious threats such as viruses, Trojans, phishing scams and more with advanced filtering techniques that can detect and block malicious content before it reaches your user’s inboxes.
  • Manage both inbound and outbound email traffic with solutions that scan the incoming data for threats or violations of compliance rules before delivering messages to users.
  • Defend against spam by applying various white-lists and black-lists to quarantine potential dangerous emails server side before they reach your end users.
  • Save time for IT team by reducing manual administration tasks associated with sorting through potentially malicious content or dealing with false positive alerts from email filters that may have been triggered due to certain peculiarities in user messages exchanged within the same organization or between organizations.
  • Improve user productivity with customizable settings that allow users to tailor their own email filtering policies based on their individual needs or preferences such as blocking specific websites or sender groups from sending emails to their address.
  • Increase workflow efficiency with automated actions taken when a potential threat is recognized like forwarding non-compliant emails directly to IT team instead of spam folder for further processing and investigation.
  • Enhance message security by scanning all attachments sent in emails to protect against data leakage without compromising end user experience while they receive important files securely over the wire – even large ones!
  • Leverage a secure infrastructure built on open source technologies like DKIM, SPF, DMARC, and TLS to ensure complete protection across all devices

Domain Dark Web Monitoring

  • Automatically detect brand impersonations and phishing attacks targeting your organization through monitoring activities in dark web forums, marketplaces, and chat rooms.
  • Stay ahead of cyber attacks by tracking and tracing malicious actors’ access to stolen credentials associated with your organization.
  • Rapidly identify where private or confidential information related to your organization is being discussed on the dark web, allowing you to take proactive measures to protect it.
  • Leverage customizable alerts that instantly alert you in case of any suspicious activities related to domain names associated with your organization in real-time.
  • Monitor changes to second-level domains that are not easily visible on the internet, such as subdomains created with malicious intent like phishing campaigns.
  • Detect new threats and vulnerabilities before they become a problem by staying up-to-date on all dark web communications regarding vulnerability exploitations or data leakage incidents targeting your company’s domain name.
  • Mitigate risk exposures swiftly by taking preventive measures when malicious or suspicious activities are identified early on through proactive dark web monitoring services such as DNS change notifications, Whois monitoring and more.
  • Keep track of all activity surrounding the domain names associated with your business with comprehensive reporting capabilities for quick analysis and actionable insights into potential threats

Security Operation Center (SOC)

  • Maximize the visibility and control of the IT environment by gaining real-time access to threat intelligence, analytics, and automation capabilities.
  • Reduce False Positive Alerts by employing advanced analytics to correlate disparate security events, enabling analysts to quickly identify true malicious intent.
  • Automate tedious manual processes like updating policies, rules and threat definitions with intuitive dashboards and self-learning systems that adapt over time.
  • Improve response times for potential threats with faster identification by leveraging Big Data Analytics and AI for detection & prevention activities.
  • Enhance security posture through automated alerts in case of suspicious activity or policy violations across complex network infrastructure environments.
  • Receive timely updates from experts on the latest trends in cybersecurity threats, vulnerabilities, best practices and mitigation strategies.
  • Detect insider threats through continuous monitoring of employee activities, data access logs and device usage to detect unauthorized behavior or misuse of company assets in real time.
  • Improve risk management by utilizing automated security solutions to detect malware outbreaks before they have a chance to cause major damage or disruption to business operations

Compliance Software as a Service

  • Compliance software can help protect your organization from potential threats, like data loss or security breaches.
  • It ensures that all relevant regulations and laws are met, so you remain compliant with industry standards.
  • Automated tools can be used to detect threats or discrepancies in real time.
  • Compliance software provides visibility into the health of your organization’s IT infrastructure.
  • Implementing compliance software increases operational efficiency and security by preventing manual errors caused by human oversight.
  • Audits can be easily performed with compliance software to ensure that current procedures are secure and effective.
  • Real-time alerts notify stakeholders of any changes that affect compliance status, so they can take action immediately.

Microsoft 365 Business Standard: Everything in Microsoft 365 Business Basic, plus: Desktop version of Microsoft 365 apps with premium features, Easily host webinars, Attendee registration and reporting tools, Manage customer appointments.  Microsoft apps are (Word, Excel, Powerpoint, Teams, Outlook, OneDrive, Sharepoint, Exchange, Access and Powerpoint)

Microsoft 365 Business Premium: Everything in Microsoft 365 Business Standard, plus: Advanced security, Access and data controlm and Cyberthreat protection. Microsoft apps are (Word, Excel, Powerpoint, Teams, Outlook, OneDrive, Sharepoint, Exchange, Access, Powerpoint, Intune, Azure Information Protection)

Example of Offering

Business Information

  • 6 Employees
  • 6 Workstations
  • 1 Windows Server
  • 4 Multifunctional Network Printers
  • Paying Microsoft directly for Microsoft 365 Standard (75.00 Per Month)
  • Paying Carbonite directly for Backup of Server (50.00 Per Month)
  • Paying for PC Matic directly (100.00 Per Year)
  • Paying Technology Provider  (40.00 Per Device/Month / $2880 Year)
  • Had 4 Incidents in the past year to resolve issues. Client was charged 125.00 per Hour. Within the 4 incidents they were billed 16 Hours. Total of $2000.00
  • Total technology Spend for the Year: $6480
  • Managed Services at $5832 for the year = $486.00 Per Month
  • Under this Special Offer the client would receive the following
    • Remote Monitoring and Management
    • Helpdesk
    • Software Patching
    • Antivirus and Threat Protection
    • DNS Filtering
    • Network Printer Management
    • DNS Hosting Per Domain (1)
    • Backup Appliance KUB-6
      • Backing Up All Workstations and Server
    • 6 Accounts of Microsoft 365 Business Standard
    • All Inclusive, Except for Project based Work
  • Year 2 would add
    • Password Management Solution
    • Multi-Factor Authentication
  • Year 3 would add
    • Email Backup Solution
    • Advanced Email Filtering Solution
  • Year 4 would add
    • Security Operation Center
  • Year 5 would add
    • Advanced Zero Day Protection
  • Year 6 would add
    • Domain Dark Web Monitoring
  • Year 7 would add
    • Compliance Software as a Service


Struggling with IT Services.
Contact Us Today

Leave the WORRY of your Technology to US

Schedule Consultation Meeting