One of the refunds we secured for a town in New Jersey
We may be able to do this for you.
No fee if no refund
Good Morning Paul,
I credited account #2DG29572 in the amount of $4,223.50 which posted to that account on 12/16/14 for the time period of 01/17/14 through 11/26/14 for the incorrect pricing.
In order to possibly provide you further credit for the dropped pricing/contract rates; we would need to submit for a Settlement. If you are interested in a possible Settlement; please let me know and I will submit for approval to begin the Settlement process.
To track the status of this request, visit the Verizon Enterprise Center online at https://enterprisecenter.verizon.com. If you are not already registered, simply click the “enroll now” button to register.
This is a follow up letter from our channel partner AT&T to one of our CPA clients in N.J.
AT&T is one of our seventy-five partners providing Cyber security, Cloud, IT, VoIP, bandwidth and more to CPA’s, professionals and businesses in the USA.
This is just one example of what we provide, with our 35 years of consulting services, as channel partners and agents with our vendors. There is never a fee to you the end user.
Hi Joe,
Great speaking with you. We have an exceptionally large portfolio of cybersecurity services. Attached are a few product briefs. I think we have an opportunity to start with some quick value with our consulting services, then grow as we continue to partner with some of our other solutions.
The below services are the ones we discussed at length, they will skyrocket your visibility and ongoing security maturity and at a great price point.
Please let me know if you have any questions and how you would like to carry this conversation forward.
AT&T Managed service powered by Qualys (MVP-Qualys): 500 assets $10,000 annual.
Patch Management – This is an optional add-on to the vulnerability scanning component above and leverages the host agents to provide patching on Windows assets
Penetration testing seeks to exploit the vulnerabilities identified to gain access to critical systems, sensitive information, or a specified trophy. This assessment will be conducted from an external perspective.
Penetration testing seeks to exploit the vulnerabilities identified to gain access to critical systems, sensitive information, or a specified trophy. This assessment will be conducted from an internal persp