Fraud Blocker
Contact

Contact us

We are in the office weekdays from 08:30-16:30. With the hotline open 24 hours a day all year round, we are available when you need it!


Telephone

Denmark: +45 7025 3515

US: +1 213 631 4097 (local rate)

E-mail

info@supporters.dk

support@supporters.dk

Head office

Supporters A/S

Ledreborg Allé 118E

DK-4000 Roskilde

CVR-nr. DK32272592


Other locations

Havndal

Silkeborg





Security and compliance

Visit our Trust Center to read more.


Support

Create a support case

By clicking on "Create case" you confirm your consent to the processing of your personal data in accordance with ours Privacy policy.

Kåret til Danmarks Mest Anbefalede Virksomhed 2024

Contact

Contact us

We are in the office weekdays from 08:30-16:30. With the hotline open 24 hours a day all year round, we are available when you need it!


Telephone

Denmark: +45 7025 3515

US: +1 213 631 4097 (local rate)

E-mail

info@supporters.dk

support@supporters.dk

Head office

Supporters A/S

Ledreborg Allé 118E

DK-4000 Roskilde

CVR-nr. DK32272592


Other locations

Havndal

Silkeborg





Security and compliance

Visit our Trust Center to read more.


Support

Create a support case

By clicking on "Create case" you confirm your consent to the processing of your personal data in accordance with ours Privacy policy.

Price per user from

DKK 10 per day

It doesn't have to be expensive or difficult to focus on your business.

Select TERMINATION PERIOD

6 months
12 months (save 13%)

Basic

Get a supplement for the internal IT department, freeing up time for projects.

monthly price per user

290,-

Add-on support possible

System monitoring

Client maintenance

Basic security

Status meetings

IT procurement

GET STARTED

Call or write to

Jan Grested

Send me an offer

By clicking "Send offer" you confirm your consent to the processing of your personal data in accordance with ours Privacy policy.

Standard

Get an IT supporter and system administrator who handles everyday tasks.

monthly price per user

DKK 690

Features from Basic

Unlimited support

Infrastructure operation

Standard security

User management

3rd party support

GET STARTED

Call or write to

Jan Grested

Send me an offer

By clicking "Send offer" you confirm your consent to the processing of your personal data in accordance with ours Privacy policy.

Premium

Get an IT manager who creates a strategic overview and optimizes your solutions.

monthly price per user

DKK 920

Features from Standard

Onsite support

Extended onboarding

Premium security

Management consulting

Supplier contact

GET STARTED

Call or write to

Jan Grested

Send me an offer

By clicking "Send offer" you confirm your consent to the processing of your personal data in accordance with ours Privacy policy.

Enterprise

Get a security expert to help meet high security requirements.

contact us

Call

Features from Premium

Security strategy

Contingency plans

Enterprise security

IT audit assistance

Regular visits

CALL

Call or write to

Jan Grested

Get a call from Jan

By clicking on "Call me" you confirm your consent to the processing of your personal data in accordance with ours Privacy policy.

Basic

Get a supplement for the internal IT department, freeing up time for projects.

monthly price per user

250,-

Add-on support possible

System monitoring

Client maintenance

Basic security

Status meetings

IT procurement

GET STARTED

Call or write to

Jan Grested

Send me an offer

By clicking "Send offer" you confirm your consent to the processing of your personal data in accordance with ours Privacy policy.

Standard

Get an IT supporter and system administrator who handles everyday tasks.

monthly price per user

DKK 600

Features from Basic

Unlimited support

Infrastructure operation

Standard security

User management

3rd party support

GET STARTED

Call or write to

Jan Grested

Send me an offer

By clicking "Send offer" you confirm your consent to the processing of your personal data in accordance with ours Privacy policy.

Premium

Get an IT manager who creates a strategic overview and optimizes your solutions.

monthly price per user

DKK 800

Features from Standard

Onsite support

Extended onboarding

Premium security

Management consulting

Supplier contact

GET STARTED

Call or write to

Jan Grested

Send me an offer

By clicking "Send offer" you confirm your consent to the processing of your personal data in accordance with ours Privacy policy.

Enterprise

Get a security expert to help meet high security requirements.

contact us

Call

Features from Premium

Security strategy

Contingency plans

Enterprise security

IT audit assistance

Regular visits

CALL

Call or write to

Jan Grested

Get a call from Jan

By clicking on "Call me" you confirm your consent to the processing of your personal data in accordance with ours Privacy policy.

Features

Comparison

More than 50 IT users? Contact us.

Basic
Standard
Premium
Enterprise

Features

Comparison

More than 50 IT users? Contact us.

Basic
Standard
Premium
Enterprise

Support

Help desk

The help desk ensures users fast and always available telephone and e-mail support, without the costs running wild.

Add-on

Unlimited

Unlimited

Unlimited

Support portal

Support portal giver adgang til Supporters GO, hvor du kan holde styr på dine sager, brugere, roller og meget andet.

Permanent contact persons

Permanent contact persons mean that you always get help from your contact persons who know your organization and systems.

Support agent

The support agent provides quick access to support and collects health information on the computer.

Knowledge database

Knowledge base contains Supporters' expert knowledge that helps solve general and customer-specific issues efficiently.

24/7 AI-support

24/7 AI-support giver adgang til generel AI-baseret it-support indenfor og udenfor normal åbningstid, så du kan få hjælp døgnet rundt uden evt. ekstra omkostninger.

Guaranteed response time (SLA)

Guaranteed response time to all support incidents ensures that the organization maintains a high level of production.

Internal case escalation

Internal case escalation means that all support cases are handled in the same place - and relevant cases are escalated to your own IT employees.

Decentralized client support

Decentralized client support includes support incidents on end users' computers and phones.

User creation and termination

User creation and termination means that we handle users across your central systems.

Permission management

Rights administration gathers handling of identities and accesses across systems in one unified place, so that errors and misunderstandings are limited.

Central system support

Central system support includes support incidents on servers, network equipment and online services.

3rd party support

3rd party support means that described special procedures are carried out without the need for the involvement of several suppliers.

PC-deployment

PC deployment includes new and reinstallation of clients, so that employees can move on quickly in the event of a change or failure of computers.

Support on future projects

Support for future measures means that new projects are covered by support without additional costs after implementation.

24/7 emergency hotline

24/7 on-call service outside normal opening hours provides the option of pay-as-you-go support, so employees are never idle unnecessarily.

Self-service password reset

Self-service password reset enables the employee to reset their forgotten passwords themselves and thus increases flexibility in everyday life.

M365 user control panel

The M365 user control panel enables the HR manager to easily update personnel information and auto-responders for colleagues.

Service desk

The service desk enables all cases to be handled in the same place - relevant clarifications are made directly with your own system owners.

Onsite support

Onsite support offers the same advantage as having an internal IT department when help is needed at the address.

Employee on- and offboarding

Employee on- and off-boarding extends user management to include the other practical processes from ordering to setup and introduction.

Supplier contact (SPOC)

Supplier contact is handled as a Single Point of Contact, so that your users can turn to one place (Supporters) with IT tasks.

Disposal of hardware

Disposal allows you to hand in your used toners for recycling and hardware for data destruction.

Free transport

Free driving makes the agreement flexible, because you can budget a fixed amount each month, regardless of how often we visit you.

Regular visits

Regular visits are planned so that tasks can be completed on days when your regular contact persons visit you.

Extended opening hours (7am-6pm)

Extended opening hours provide access to IT support during several hours of the day, so that your business does not stand still.

Home support

Home support provides help to the employee on their own equipment, so that work can be carried out unhindered anywhere on all hardware.

Mobile support

Mobile support provides help for the employee's mobile phone so that work can be carried out unhindered anywhere.

Fixed consulting days

Fixed consultant days are planned so that tasks can be solved on days when your permanent contact persons visit you.

Drift

Documentation

Documentation is done continuously and provides an overview of the extent of the systems and the historical development.

Patch management

Patch management allows updating at a fixed frequency of equipment under controlled and planned conditions, so that the devices are better secured against threats.

Passive system monitoring

Passive system monitoring alerts you to errors on the IT platform so that you can correct errors.

Network operation

Network operation includes continuous updating and optimization of network equipment to ensure high uptime and optimal performance.

Backup control

Backup control ensures that the status of backup jobs is monitored and handled in case of errors, so that your data and systems are protected.

Asset management

Asset management ensures that there is always an overview of which devices exist and who in the organization they belong to.

Customized procedures

Customized procedures mean that individual instructions are carried out according to special wishes and needs.

Ongoing quality checks

Ongoing quality checks ensure that changes are carried out uniformly, so that the systems are developed in a scalable manner and without sand.

Active system monitoring

Active system monitoring alerts Supporters about errors on the IT platform, so that we can correct errors, and you can move on quickly.

Server maintenance

Server operation includes ongoing updates and adjustments, as well as cleanup on servers to ensure high uptime and optimal performance.

License management

License management means that we keep track of and adjust the active software licenses so that you can always get a fair picture and not pay too much.

Computer optimization

Computer optimization provides ongoing adjustments that make the device more efficient and minimize errors.

Recovery testing

Recovery testing ensures spot checks of file backup data to ensure a valid and functional backup.

Disaster backup

Disaster backup allows for full restoration of a server image backup to secure both data and functionality.

Software packaging

Software packaging provides continuous updating of software packages for central and automated installation.

Security

Remote wipe of devices

Remote device wipe makes it possible to reset stolen or lost devices when they come online.

Firewall protection

Firewall protection controls traffic and ensures that the built-in protection against network threats is activated and functioning properly.

PC network isolation

PC network isolation limits the computer's access to the other networks if a threat is identified.

Cloud antivirus

Cloud antivirus protects against viruses and other malicious files, scans your devices in the background and minimizes the risk of infections.

Zero-day protection

Zero-day protection shields computers from memory attacks that exploit unknown software vulnerabilities as additional protection against hackers.

Device encryption

Device encryption ensures that information on computers is inaccessible to unauthorized persons if it falls into the wrong hands.

Server backup software

Server backup software includes license to state-of-the-art tools for data and image backup.

Multi-Factor Authentication (MFA)

Multifactor authentication adds protection against identity theft and other attack methods against weak passwords.

Secure browsing (DNS)

Secure Browser protects internet use from fixed locations against web threats such as phishing and malware.

Client backup

Client backup includes data backup setup of selected user folders via built-in functionality.

Endpoint protection (EDR)

Endpoint protection adds an extra layer of security beyond traditional antivirus to detect suspicious activity on the device.

Security incidents (SIR)

Security incidents are handled formally and efficiently by our security team in the event of a suspected breach of security.

Dark Web Monitoring

Dark Web Monitoring notifies of data breaches and password leaks.

Certified data deletion

Certified data deletion provides security for the correct deletion of sensitive information from data-bearing devices.

Phishing protection

Phishing protection includes extended functionality to prevent spoofed emails and CEO fraud.

Privilege Access Management (PAM)

User rights management locks down the ability of end users to run malicious software on computers.

Compliance assessments

Compliance assessments provide help in completing security audits from, for example, customers and insurance companies.

Cyber awareness training

Cyber awareness training ensures that employees are kept up to date with common threats and to spot suspicious activity.

Log management (SIEM)

Log management provides external storage and analysis of log files to avoid accidental deletion and modification.

Device management (MDM)

Device administration guarantees that computers and phones always comply with fixed compliance requirements.

Ongoing data cleanup

Ongoing data cleanup creates an overview of which personally sensitive data exists in the systems and should be deleted.

Browser isolation

Browser isolation protects against phishing of credentials and downloading of unsafe files from online sources.

Theft protection of computers

Anti-theft prevents stolen devices from being reset and resold without unlocking.

Software authentication

Software authentication limits the employee's ability to launch unapproved programs.

Security hardening

Security hardening minimizes the attack surface on computers by configuring operating system settings according to best practice.

Password manager

Password manager helps protect login information and maintain good access management practices.

Other advanced security measures

Other advanced security measures can be selected as required.

Strategy

Case reporting

Case reporting gives the IT manager insight into the IT operation and support in order to monitor and develop the collaboration further.

Status meetings

Status meetings provide an ongoing opportunity to optimize cooperation and create additional value for each other.

IT procurement

IT purchases can be made through our advantageous purchasing agreements to make the practical work easy - and because large-scale operations give us special discounts.

It-policy

IT policy gives the business direction, the employees a fixed framework and ensures compliance with special industry and GDPR requirements.

Security assessment

Security assessment creates an overview of basic areas of action to improve the organization's security baseline

Discounted hourly price

The hourly benefit price provides an attractive price for work performed on parallel projects outside the fixed price agreement to develop and improve the IT platform.

Extended onboarding

With extended onboarding, we invest up to 100 hours in you to be able to work proactively in the collaboration.

2-year improvement plan

The ongoing 2-year improvement plan provides a decision-making basis for making the right decisions in relation to supporting the organization's IT strategy.

Projects under 1 hour

Projects under 1 hour are included in the agreement and are carried out without charge, so that minor improvement measures are not invoiced separately.

Management consulting

Management consulting includes sparring about the company's IT strategy, new investments or general use of IT.

Budget planning

The ongoing 2-year improvement plan provides a decision-making basis for making the right decisions in relation to supporting the organization's IT strategy.

GDPR- & NIS2- assistance

GDPR sparring facilitates a fixed process for clarifying the technical security measures that are necessary in relation to the personal data regulation.

Recurring tasks

Year wheel tasks are carried out recurrently with a fixed frequency, so that routine tasks are not deprioritized or forgotten.

Restoration guarantee

Restoration after a breakdown protects you against unforeseen costs if your IT system goes down or breaks.

Steering group participation

Steering group participation includes ongoing participation in and sparring with an internal steering group regarding IT use.

Contract negotiation with 3rd party

Contract negotiation with 3rd parties includes help in reviewing and negotiating terms with other external IT suppliers.

Telephony administration

Telephony administration gives you the freedom to leave the administrative work with mobile subscriptions to us.

Contingency plan

A contingency plan provides written documentation and a tested plan for recovery of the business if the accident occurs.

IT audit assistance

IT audit assistance provides assistance in clarifying questions from the audit during annual auditing.

Cybersecurity strategy

Cybersecurity strategy creates a plan for action areas to improve IT security.

WE MAKE IT EASY

Switch today - and we'll take the risk

Get rid of old agreements

Undgå dobbeltomkostninger med vores bindingstilskud (op til 3 mdr.), så du nemt kan komme ud af gamle supportaftaler.

Satisfied or money back

Get your money back for the trial period with our no-cure-no-pay model, if we do not live up to your expectations.

Call me up

Call or write to

Jan Grested

Get a call from Jan

By clicking on "Call me" you confirm your consent to the processing of your personal data in accordance with ours Privacy policy.

Frequently asked questions

Read why we are in favor of transparent prices and a long-term collaboration.

What is the advantage of fixed price?

The advantage of a fixed price is first and foremost the accrual of the costs, because it becomes easier to budget the operating costs. Fixed price also means that we have a common interest and thus an incentive for problem-free IT operation. With one common goal, we get the foundation for a long-term collaboration without surprises in everyday life.

Why should we outsource our IT operations and support?

Outsourcing sker ofte for at sænke omkostningerne eller for at hæve kvaliteten. I vores koncept har vi effektiviseret alle tilbagevendende it-processer, så du både kan spare penge og få løftet kvaliteten. Vi er drevet af et interessefællesskab hvor indtjeningen naturligt følger med, hvis vi gør det et godt stykke arbejde. Vi skaber derfor mere værdi ved at automatisere og tilpasse vores processer præcist til jeres hverdag.

Can we be sure that there will be no additional expenses?

Yes, you can be absolutely sure of that! We have made the agreement and prices 100% transparent. We continuously improve the agreement so that more services are included. Projects are not part of the contract price, but we never initiate a project without prior approval from you.

Can I change my agreement to another ITaaS agreement ?

Yes you can. It is both possible to upgrade and downgrade the agreement.

It is possible to upgrade the agreement from month to month. However, minor delays may occur on individual partial services.

If you wish to downgrade the agreement, simply follow the agreed notice of termination.