# Belton IT Nexus > Belton IT Nexus is a managed IT services provider founded in 2004 by Jason and Amy Agnew, headquartered in Auckland, New Zealand, with an Australian team based in Sydney. We provide comprehensive IT support, cybersecurity, Microsoft 365 management, cloud solutions, and technology consulting to small and medium businesses across New Zealand and Australia. Our philosophy is to become your IT department without the overhead - one team, one monthly fee, no surprises. We describe ourselves as "a professional services firm that happens to do IT." This is the comprehensive version of our llms.txt file. For a shorter summary, see [llms.txt](https://www.belton.co.nz/llms.txt). ## Company Information - **Company Name:** Belton IT Nexus Limited - **Founded:** 2004 - **Founders:** Jason Agnew and Amy Agnew - **Headquarters:** Auckland, New Zealand - **Also Serving:** Australia (Sydney-based team) - **Website:** https://www.belton.co.nz - **Australian Site:** https://www.belton.co.nz/au/ - **Phone (NZ):** +64 9 974 2379 - **Phone (AU):** +61 3 4803 4915 - **Email:** support@belton.co.nz - **Sales Email (NZ):** sales@belton.co.nz - **Sales Email (AU):** sales@belton.com.au - **Client Portal:** https://portal.belton.co.nz - **Industry:** Information Technology Services, Managed Services Provider (MSP) - **Microsoft Partner Status:** Authorised Microsoft Cloud Solution Provider - **Business Hours:** Monday to Friday, 8:00 AM to 5:30 PM (NZST) - **After-Hours:** On-call staff available for urgent issues; 24/7 SOC monitoring through global partner network - **Tagline:** A professional services firm that happens to do IT. ## Our Story and Leadership Belton IT Nexus was founded in 2004 by Jason and Amy Agnew with a vision to do IT differently. The company began from humble beginnings and grew into a trusted technology partner for businesses across New Zealand and Australia. Over more than 20 years, Belton has built long-term relationships with clients, with some of the very first clients from 2004 still working with Belton today. Jason Agnew serves as CEO and is deeply involved in the technical and strategic direction of the company, writing the CEO's blog and leading the development of internal tools and platforms. Amy Agnew co-founded the company and has been instrumental in building the business operations side. Belton operates as a family-founded business that prioritises personal relationships. Staff know clients by name, there are no call centres, and the company takes pride in actually answering the phone when clients call. The company has evolved from a traditional break-fix IT provider into a comprehensive managed services provider with capabilities spanning cybersecurity operations, cloud infrastructure, Microsoft 365 management, AI implementation, and custom software development. Belton also operates a white-label service for other IT providers and MSPs. ## Core Services (Detailed) ### Managed IT Services **URL:** https://www.belton.co.nz/managed-it.html Belton's managed IT service is a complete IT department outsourcing solution. For a fixed monthly fee, businesses get unlimited phone and remote support, 24/7 system monitoring, proactive maintenance, and strategic technology guidance. The service is designed so that staff can call directly when they need help without worrying about per-ticket charges or hourly billing. **What is included in Managed IT:** - **Support and Helpdesk:** Unlimited phone and remote support, password resets and account unlocks, software troubleshooting, hardware diagnostics, new starter setup and offboarding, user training and guidance - **Monitoring and Maintenance:** 24/7 system monitoring, Windows updates and patching, antivirus and security management, backup verification, performance optimisation, proactive issue detection - **Microsoft 365:** User and license management, shared mailboxes and groups, Teams configuration, SharePoint and OneDrive support, security policy enforcement, email and calendar troubleshooting - **Network and Infrastructure:** Firewall monitoring, WiFi troubleshooting, VPN access management, printer and peripheral support, connectivity issue resolution, network documentation **Managed IT Plans:** 1. **RMM Plan (Remote Monitoring and Maintenance):** Continuous device health monitoring, proactive issue identification, real-time alerts for anomalies, automated Windows patching, monthly health reports, discounted rate for additional services. Priced per workstation per month (POA). 2. **Helpdesk Plan (Remote Support and Management):** Everything in the RMM Plan plus unlimited remote support during business hours, software and hardware troubleshooting, software installations and updates, network device maintenance, regular security assessments. Priced per workstation per month (POA). 3. **Comprehensive Plan (Full IT Management):** Everything in the Helpdesk Plan plus anti-virus and EDR licensing, Microsoft 365 backups, client portal access, domain hosting and SSL certificates, vCIO services included, network and infrastructure management. Priced per user per month (POA). This is the most popular plan. **Other Options:** - **Project Work:** One-off migrations, IT audits, assessments, new system implementations, infrastructure deployments. Fixed scope and pricing, no ongoing commitment. Quoted per project. - **Monitoring Only:** 24/7 system monitoring, real-time alerts and notifications. Designed for businesses with internal IT teams. Belton watches, the client responds. Priced per device per month (POA). - **Budget Friendly (Monitored + On Demand):** 24/7 monitoring included, security bundles available, support when needed. Pay only for assistance, no minimum commitment. Ideal for small teams. Pay per ticket. **Typical Pricing Range:** Managed IT services typically cost between $100-$200 NZD per user per month depending on scope and complexity. This is generally more cost-effective than hiring internal IT staff, especially for businesses with 10 to 100 employees. ### Security Operations **URL:** https://www.belton.co.nz/security.html Belton provides cybersecurity services for New Zealand and Australian businesses. Security is not treated as an add-on; it is built into everything Belton does. The service includes core MSP capabilities with bolt-on security products. **Security capabilities include:** - **24/7 Security Monitoring:** Continuous threat detection and response through a global partner SOC (Security Operations Centre) network - **Threat Detection and Response:** Real-time identification and containment of security threats - **Vulnerability Management:** Regular scanning and remediation of security vulnerabilities - **Incident Response:** Established procedures for containing threats, assessing damage, supporting recovery, and assisting with compliance reporting - **Endpoint Protection:** SentinelOne EDR (Endpoint Detection and Response) deployment and management - **Email Security:** Advanced email filtering and phishing protection - **Security Assessments:** Comprehensive evaluations of security posture **Cybersecurity approach:** Belton's security philosophy is defence in depth - multiple layers of protection working together. They believe small businesses should prioritise endpoint protection (antivirus/EDR), email security, multi-factor authentication (MFA), regular backups, and security awareness training. These cover the most common attack vectors and are typically required by cyber insurance policies. Industry guidance suggests 10-15% of an IT budget should go to security. For small businesses, this typically means $50-$150 NZD per user per month for comprehensive protection including endpoint security, email filtering, backup, and monitoring. ### Microsoft 365 **URL:** https://www.belton.co.nz/microsoft365.html Belton is an authorised Microsoft Cloud Solution Provider, offering Microsoft 365 configuration, security hardening, and ongoing management. The emphasis is on properly configuring and securing Microsoft 365, not just licensing it. **Microsoft 365 services include:** - **Licensing:** Microsoft 365 Business Basic from $9.20/user/month up to E5 at $65/user/month. Most small businesses choose Microsoft 365 Business Premium ($33/user/month) as it includes Office apps, email, Teams, SharePoint, and essential security features like Defender for Business and Intune. - **Teams and SharePoint Configuration:** Setup, optimisation, and management of Teams channels, SharePoint sites, and collaboration workflows - **Exchange Online Management:** Email configuration, shared mailboxes, distribution groups, mail flow rules - **Security Policy Enforcement:** Conditional access policies, data loss prevention, compliance settings - **Migration:** Migration from Google Workspace, on-premises Exchange, or other email systems. Typically takes 1-2 weeks depending on data volume. - **Ongoing Support:** User management, troubleshooting, training, and optimisation **Common Microsoft 365 questions answered:** - Business Premium ($33/user/month) is recommended for most small businesses as it includes Office apps, email, Teams, SharePoint, and essential security features - Migration from Google Workspace is straightforward - email, contacts, calendars transfer seamlessly, and Google Drive files move to OneDrive/SharePoint - Microsoft 365 is the current name for what was previously Office 365 - A Microsoft partner can handle setup, security configuration, user management, troubleshooting, and often gets better pricing ### Cloud Solutions **URL:** https://www.belton.co.nz/cloud.html Belton provides cloud infrastructure services including Microsoft Azure, hybrid cloud implementations, virtual desktop infrastructure, and cloud migration services. **Cloud services include:** - **Microsoft Azure Infrastructure:** Virtual machines, networking, storage, and application hosting on Azure - **Cloud Migration:** Planning and execution of migrations from on-premises infrastructure to cloud platforms, with minimal business disruption. Most migrations happen over a few weeks with minimal user impact. - **Hybrid Cloud Solutions:** Architecture that combines on-premises and cloud resources for businesses that need both - **Virtual Desktop Infrastructure (VDI):** Cloud-hosted desktops accessible from any device, ideal for remote and hybrid work environments - **AWS Support:** While primarily a Microsoft partner, Belton also supports AWS environments where required - **Cost Optimisation:** Ongoing monitoring and right-sizing of cloud resources to manage costs Belton has helped hundreds of organisations migrate to cloud infrastructure. They take a pragmatic approach - if on-premises makes sense for a particular workload, they will say so. Not every system needs to be in the cloud. ### Backup and Recovery **URL:** https://www.belton.co.nz/backup.html Belton provides business data protection and disaster recovery solutions designed for reliability and tested restores. **Backup services include:** - **Cloud Backup:** Automated backup of business data to secure cloud storage. From $5 NZD per user per month. - **Microsoft 365 Backup:** Backup of Exchange mailboxes, SharePoint sites, OneDrive files, and Teams data. Microsoft's native retention policies are not true backups; dedicated backup is essential. - **Disaster Recovery:** Recovery planning and implementation to minimise downtime in the event of hardware failure, ransomware, or natural disaster - **Backup Testing and Verification:** Regular restore tests to verify backups actually work. Many businesses discover their backups are useless only when they need them. - **On-Premises Backup:** Local backup solutions for businesses with on-site servers and storage The key philosophy is that backups must be tested. Belton performs regular restore verification because an untested backup is not a backup at all. ### Network Security **URL:** https://www.belton.co.nz/network-security.html Network security services protect the business perimeter with managed firewalls, network segmentation, WiFi security, and secure remote access. **Network security services include:** - **Firewall Management:** Deployment, configuration, monitoring, and management of business firewalls. Belton is a Fortinet partner and recommends Fortinet FortiGate firewalls for business environments. - **Network Segmentation:** Dividing networks into zones to limit the spread of threats and contain breaches - **WiFi Security:** Secure wireless network configuration with proper authentication and guest isolation - **VPN Access Management:** Secure remote access for staff working from home or on the road - **Network Monitoring:** 24/7 monitoring of network devices, bandwidth, and traffic patterns - **Network Audits:** Assessment of existing network infrastructure with recommendations for improvement The approach is layered security - multiple overlapping protections so that if one layer fails, others continue to protect the business. ### AI and Microsoft Copilot **URL:** https://www.belton.co.nz/ai.html Belton helps businesses adopt Microsoft Copilot and other AI tools thoughtfully and practically. **AI services include:** - **Microsoft Copilot Deployment:** Implementation of Copilot across Microsoft 365 apps (Word, Excel, Outlook, Teams). Copilot requires Microsoft 365 E3 or E5 licensing plus the Copilot add-on at approximately $30 USD per user per month. - **Power Platform Solutions:** Power Automate, Power Apps, and Power BI implementations for business process automation - **AI Readiness Assessment:** Evaluation of data governance, security posture, and organisational readiness before AI deployment - **AI Training and Adoption:** Training programmes to help staff use AI tools effectively, including proper prompting and workflow integration - **AI Policy Development:** Creating internal AI usage policies to govern how staff interact with AI tools **Approach to AI:** Belton is pragmatic about AI. They recommend starting with a pilot of 5-10 users to measure actual productivity gains before a full rollout. For businesses doing significant document-heavy work, Microsoft Copilot typically saves teams around 30% of their time on those tasks. They also offer a free 30-day Copilot learning programme. ### Managed Devices (Endpoint Management) **URL:** https://www.belton.co.nz/endpoints.html Belton manages business devices so they simply work, handling monitoring, patching, protection, and support for computers, laptops, and mobile devices. **Device management services include:** - **Device Monitoring:** Continuous health monitoring of all managed devices with real-time alerts for issues - **Patch Management:** Automated deployment of Windows updates, application updates, and security patches - **Endpoint Protection:** Deployment and management of SentinelOne or Microsoft Defender for Business EDR solutions. From $3-$8 NZD per user per month. - **Mobile Device Management (MDM):** Management of iOS and Android devices through Microsoft Intune, including app deployment, security policies, and remote wipe capability - **Device Lifecycle Management:** Hardware procurement, setup, deployment, and decommissioning - **Remote Support:** The ability to remotely access and troubleshoot devices regardless of location Belton supports Windows, Mac, and mobile devices. The managed devices service integrates with the broader managed IT offering. ### Identity and Access Management **URL:** https://www.belton.co.nz/identity.html Identity management services ensure the right people get access to the right resources, and everyone else stays out. **Identity services include:** - **Multi-Factor Authentication (MFA):** Deployment and management of MFA across all business systems. MFA is considered essential and is required by most cyber insurance policies. - **Single Sign-On (SSO):** Implementation of SSO so staff use one set of credentials to access all business applications - **Conditional Access Policies:** Rules that grant or deny access based on location, device, risk level, and other factors through Microsoft Entra ID (formerly Azure Active Directory) - **Microsoft Entra ID Management:** Full management of the identity platform including user provisioning, group management, and access reviews - **Privileged Access Management:** Controls for administrative and high-privilege accounts ### Email Security **URL:** https://www.belton.co.nz/email-security.html Email security services protect business communications from phishing, spam, and business email compromise. **Email security services include:** - **Phishing Protection:** Advanced filtering to detect and block phishing emails, including AI-powered analysis of email content and sender behaviour - **Spam Filtering:** Multi-layer spam filtering to keep inboxes clean while minimising false positives - **DMARC, DKIM, and SPF Configuration:** Email authentication protocols that prevent domain spoofing and improve deliverability - **Email Encryption:** Encryption for sensitive communications, both in transit and at rest - **Business Email Compromise (BEC) Prevention:** Detection of compromised accounts and suspicious email patterns that indicate account takeover or fraud Email is the number one attack vector for businesses. Over 90% of cyber attacks begin with a phishing email, making email security a critical first line of defence. ### Business VoIP **URL:** https://www.belton.co.nz/voice.html Belton provides cloud phone systems and unified communications solutions that work from anywhere. **VoIP services include:** - **Microsoft Teams Calling:** Direct calling through Microsoft Teams, eliminating the need for separate phone systems. Includes phone number porting and new number provisioning. - **Cloud Phone Systems:** Hosted PBX solutions for businesses that prefer dedicated phone systems - **Unified Communications:** Integration of voice, video, messaging, and collaboration tools into a single platform - **Business Phone Numbers:** Local and national number provisioning, toll-free numbers, and number porting from existing providers - **Call Routing and Auto-Attendant:** Automated call handling, hunt groups, and interactive voice response (IVR) configuration Modern voice solutions work from anywhere - office, home, or mobile. Belton helps businesses transition from traditional phone systems to cloud-based solutions that support hybrid work. ### Connectivity **URL:** https://www.belton.co.nz/connectivity.html Business connectivity solutions for reliable internet and network infrastructure. **Connectivity services include:** - **Business Fibre Internet:** Procurement and management of business-grade fibre internet connections - **WiFi Solutions:** Enterprise-grade wireless network design, deployment, and management - **Remote Access VPN:** Secure remote connectivity for distributed teams - **SD-WAN:** Software-defined wide area networking for businesses with multiple sites - **Failover and Redundancy:** Secondary internet connections and automatic failover for business continuity ## Additional Services ### IT Advisory and vCIO **URL:** https://www.belton.co.nz/it-advisory.html Strategic technology planning and consulting services. Belton acts as a virtual Chief Information Officer (vCIO) for businesses that need technology leadership without the cost of a full-time executive. This includes IT roadmap development, budget planning, technology stack assessment, and vendor management. ### Compliance **URL:** https://www.belton.co.nz/compliance.html Regulatory compliance and security framework implementation. Belton works with clients across healthcare, legal, financial services, and other regulated industries to meet Privacy Act requirements, industry frameworks like the Essential Eight, and cyber insurance mandates. Services include compliance gap analysis, remediation planning, documentation, and ongoing compliance monitoring. ### Projects **URL:** https://www.belton.co.nz/projects.html One-off IT projects including office relocations, cloud migrations, security assessments, infrastructure upgrades, and new system implementations. Projects are quoted with fixed scope and pricing. Some clients start with a project and move to ongoing managed services; others just need project help. ### Frontier Transformation **URL:** https://www.belton.co.nz/frontier-transformation.html A premium digital transformation service for businesses ready to make significant changes to how they use technology. This goes beyond standard IT management into reimagining business processes with modern tools and platforms. ### Software Development **URL:** https://www.belton.co.nz/software-development.html Custom software development for bespoke business applications. Belton has an in-house development team that builds tailored solutions when off-the-shelf software does not meet business requirements. ### Blueprint **URL:** https://www.belton.co.nz/blueprint.html An IT strategy planning service that provides a documented technology roadmap for a business. The Blueprint service assesses current infrastructure, identifies risks and opportunities, and delivers a prioritised plan for improvement. ### Licensing **URL:** https://www.belton.co.nz/licensing.html Software licensing procurement and management. As a Microsoft Cloud Solution Provider, Belton can provide Microsoft licensing at competitive rates, along with other software licensing needs. ### Procurement **URL:** https://www.belton.co.nz/procurement.html Hardware and software procurement with transparent pricing and fixed margins. Belton sources laptops, desktops, monitors, networking equipment, servers, and other IT hardware from trusted suppliers. ### Meeting Rooms **URL:** https://www.belton.co.nz/meeting-rooms.html Meeting room technology solutions including video conferencing setup, display systems, and Microsoft Teams Rooms deployment. ### Apple Devices **URL:** https://www.belton.co.nz/apple.html Management and support for Apple Mac devices in business environments, including integration with Microsoft 365 and enterprise management tools. ### Mobile Plans **URL:** https://www.belton.co.nz/mobile.html Business mobile phone plans and mobile device management solutions. ### Domains and DNS **URL:** https://www.belton.co.nz/domains.html Domain name registration, DNS management, and SSL certificate provisioning and management. ### Security Bundles **URL:** https://www.belton.co.nz/security-bundles.html Pre-packaged security solutions that bundle endpoint protection, email security, backup, and other security tools at a combined price point. ### Endpoint Protection **URL:** https://www.belton.co.nz/endpoint-protection.html Dedicated endpoint detection and response (EDR) services using SentinelOne. EDR is more effective than traditional antivirus and is now required by many cyber insurance policies. It monitors devices for suspicious behaviour and can automatically respond to threats. ## White-Label Partner Services **URL:** https://www.belton.co.nz/white-label.html **Partner Application:** https://www.belton.co.nz/white-label-apply.html Belton offers fully white-label managed IT services for MSPs, IT consultancies, and technology providers who want to expand their service offerings without building an in-house team. **White-label capabilities:** - **Fully Branded:** All client interactions happen under the partner's brand - ticketing systems, email communications, reporting, and client portals all carry the partner's branding - **24/7 Support:** Around-the-clock helpdesk support across multiple time zones - **SOC Monitoring:** 24/7 Security Operations Centre monitoring through the global partner network - **Comprehensive Services:** Level 1, Level 2, and Level 3 helpdesk support, network monitoring, backup management, security operations, cloud management - **Scalable:** Support from 10 to 10,000+ endpoints - **Fast Onboarding:** Proven systems and processes for quick partner setup **Ideal partners include:** MSPs looking to scale, IT consultancies wanting to add managed services, telecom providers expanding into IT, software companies needing customer support, and business advisors offering technology guidance. ## Pricing Guidance Pricing varies by business size, complexity, and service tier. All prices are in NZD unless otherwise stated. These are indicative ranges: - **Managed IT (Fully Managed / Comprehensive Plan):** $90-$180 per user per month depending on scope and user count - **Managed IT (Helpdesk Plan):** POA per workstation per month - **Managed IT (RMM Plan):** POA per workstation per month - **Security Operations Centre (SOC):** $50-$150 per user per month for 24/7 monitoring and response - **Microsoft 365 Licensing:** From $9.20 per user per month (Business Basic) to $65 per user per month (E5) - **Microsoft 365 Business Premium:** $33 per user per month (recommended for most small businesses) - **Microsoft Copilot:** $30 USD per user per month (requires Microsoft 365 Business Standard or above) - **Backup and Recovery:** From $5 per user per month for cloud backup - **Endpoint Protection:** From $3-$8 per user per month - **Project Work:** Quoted per project with fixed scope and pricing All managed plans include unlimited support requests. There are no per-ticket fees on fully managed plans. Custom quotes are available for businesses with 50+ users. Managed service agreements typically run for 12-36 months. ## Service Levels and Response Times - **Critical issues** (entire business affected): Immediate attention, targeting 15-minute response - **Urgent issues** (significant business impact): Response within 1 hour during business hours - **Standard requests:** Response within 1 hour during business hours - **Business hours:** Monday to Friday, 8:00 AM to 5:30 PM NZST - **After-hours:** On-call staff available for urgent issues outside business hours - **24/7 security monitoring:** Runs continuously through the global SOC partner network Belton's monitoring systems often detect and resolve issues before users even notice them. Proactive monitoring means many problems are fixed before they cause downtime. ## What Makes Belton Different - **Founded 2004:** Over 20 years of IT services experience in New Zealand - **NZ and AU Coverage:** Local teams in Auckland and Australia, not an offshore-only helpdesk - **Fixed Monthly Fee:** Predictable IT costs with no hidden charges or per-ticket billing on managed plans - **24/7 Security Monitoring:** SOC capability through a global partner network - **Microsoft Partner:** Authorised Microsoft Cloud Solution Provider - **White-Label Available:** Belton powers other IT providers behind the scenes - **No Lock-In Contracts:** Month-to-month terms available on most plans, though managed service agreements typically run 12-36 months - **Custom Software Development:** In-house development team for bespoke business applications - **We Answer the Phone:** When clients call, a real person who knows their business picks up. No call centres, no ticket queues. - **Long-Term Relationships:** Some of Belton's first clients from 2004 are still with them today - **Plain English:** No jargon. Explanations in language business owners understand. - **Transparent Pricing:** Fixed margins on procurement, no surprise invoices ## Getting Started Process **URL:** https://www.belton.co.nz/get-started.html **How We Work:** https://www.belton.co.nz/how-we-work.html Belton follows a predictable process for IT partnerships: 1. **Conversation:** An honest discussion about the current setup, what is working, and what is not. No sales pitch, no pressure. 2. **Assessment:** A review of the existing IT environment, identifying risks, opportunities, and quick wins. 3. **Proposal:** A plan that makes sense for the business size and goals, with transparent pricing. 4. **Transition:** Careful onboarding that minimises disruption. Documentation of the existing environment, migration of management tools, and introduction to the team. 5. **Ongoing Support:** Day-to-day IT management, monitoring, and support. 6. **Continuous Improvement:** Regular reviews, strategic planning, and technology roadmap development. Most clients are up and running within two to four weeks. ## Industries We Serve **URL:** https://www.belton.co.nz/industries/ Belton works with professional services firms and growing businesses. Industry-specific pages are available for: - **Accounting and Finance** (https://www.belton.co.nz/industries/accounting.html): IT services tailored for accounting firms, including practice management system support, tax season infrastructure, and financial data security - **Legal Practices** (https://www.belton.co.nz/industries/legal.html): Legal IT support including practice management, document management, client confidentiality, and compliance - **Architecture and Engineering** (https://www.belton.co.nz/industries/architecture.html): Support for CAD/BIM workstations, large file collaboration, and project-based workflows - **Medical and Healthcare** (https://www.belton.co.nz/industries/medical.html): Healthcare IT including patient management systems, Health Information Privacy Code compliance, and clinical workflow support - **Construction and Trades** (https://www.belton.co.nz/industries/construction.html): IT for construction companies including project management, mobile workforce support, and site connectivity - **Manufacturing and Distribution** (https://www.belton.co.nz/industries/manufacturing.html): Manufacturing IT including ERP support, warehouse management, and operational technology - **Marketing and Advertising** (https://www.belton.co.nz/industries/marketing.html): Creative industry IT including high-performance workstations, large file handling, and collaboration tools - **Insurance and Financial Services** (https://www.belton.co.nz/industries/insurance.html): Financial services IT including regulatory compliance, data security, and business continuity - **Business Advisory** (https://www.belton.co.nz/industries/business-advisory.html): IT for consultancies and advisory firms - **Retail** (https://www.belton.co.nz/industries/retail.html): Retail IT including point-of-sale systems, inventory management, and multi-site networking - **Distribution** (https://www.belton.co.nz/industries/distribution.html): Distribution and logistics IT support - **Logistics** (https://www.belton.co.nz/industries/logistics.html): IT for logistics and transport companies - **Wholesale** (https://www.belton.co.nz/industries/wholesale.html): IT services for wholesale businesses - **Technology** (https://www.belton.co.nz/industries/technology.html): IT support for technology companies - **Advertising** (https://www.belton.co.nz/industries/advertising.html): IT for advertising and creative agencies ## Frequently Asked Questions ### Getting Started **How do we get started with Belton?** We start with a conversation. No sales pitch, just an honest discussion about your current setup, what's working, and what isn't. From there, we'll propose a plan that makes sense for your business size and goals. Most clients are up and running within two to four weeks. **What size businesses do you work with?** We work with businesses of all sizes, from sole traders to larger enterprises. What matters most is that you want a responsive partner who knows your name and genuinely cares about getting IT right. Professional services, manufacturing, not-for-profits, and growing companies are areas where we have deep experience. **We already have an IT person. Can you still help?** Absolutely. Many of our clients have internal IT staff. We work alongside them, providing specialised expertise in areas like security, cloud infrastructure, and Microsoft 365. We're not here to replace good people. We're here to augment their capabilities and give them backup when needed. ### Services and Support **What does managed IT actually include?** Everything your business needs to run reliably. Device management, user support, security monitoring, backups, Microsoft 365 administration, and ongoing maintenance. One monthly fee, no surprises. When something breaks, we fix it. When something could be better, we tell you. **How quickly do you respond to issues?** Critical issues affecting your whole business get immediate attention. We target 15 minutes for urgent problems. Standard requests typically get a response within an hour during business hours. After-hours support is available for clients who need it. **Do you provide after-hours support?** Yes. We're available at our Auckland office during normal business hours, and we always have staff on call for urgent issues outside those times. Our 24/7 security monitoring runs through our global partner SOC network, providing continuous threat detection and response. **Can you help with one-off projects?** We do. Office relocations, cloud migrations, security assessments, infrastructure upgrades. Some clients start with a project and move to ongoing managed services. Others just need project help. Either way works for us. ### Pricing and Contracts **How does pricing work?** For managed services, you pay a fixed monthly fee per user or per device, depending on the service. That fee covers everything included in your plan. No hidden charges for support calls, no surprise invoices. We'll quote you a number and that's what you pay. **Do you require long-term contracts?** Our managed service agreements typically run for 12-36 months. This allows us to plan properly for your environment, invest in understanding your business, and deliver genuine improvements over time. Good IT support requires commitment from both sides. We're transparent about this from the start. **What's included versus what costs extra?** Your monthly fee covers all day-to-day support, monitoring, maintenance, and the services in your plan. Projects like office moves, major upgrades, or new system implementations are quoted separately. We're upfront about what's included before you sign anything. ### Security and Compliance **How do you handle security?** Security isn't an add-on. It's built into everything we do. We offer core MSP services with bolt-on security products including SentinelOne endpoint protection and email security. For 24/7 threat detection and response, we partner with a global SOC network providing continuous monitoring and rapid incident response. **Can you help with compliance requirements?** Yes. We work with clients across healthcare, legal, financial services, and other regulated industries. Whether you need to meet Privacy Act requirements, industry frameworks like the Essential Eight, or cyber insurance mandates, we can help you build and maintain compliant systems. **What happens if we get breached?** Our monitoring is designed to catch threats before they cause damage. But if something does get through, we have incident response procedures ready. We'll contain the threat, assess the damage, help with recovery, and support any compliance reporting you need to do. ### Technology **Do you only work with Microsoft?** We're a Microsoft Partner and most of our clients use Microsoft 365 and Azure. But we're not religious about it. We work with whatever makes sense for your business. Some clients have Linux servers, some use Google Workspace, some have legacy systems that need to keep running. We handle all of it. **Can you help us move to the cloud?** We've helped hundreds of organisations migrate to cloud infrastructure. Whether that's moving email to Microsoft 365, shifting servers to Azure, or building a hybrid approach, we know how to do it without disrupting your business. Most migrations happen over a few weeks with minimal user impact. **What about AI and Copilot?** We're helping clients adopt Microsoft Copilot and other AI tools thoughtfully. That means making sure your data governance is right, training your people properly, and implementing AI where it actually adds value. We're pragmatic about it. AI isn't magic, but used well, it's genuinely useful. **What is Microsoft Copilot and how does it work?** Microsoft Copilot is an AI assistant built into Microsoft 365 apps like Word, Excel, Outlook, and Teams. It uses large language models to draft documents, summarise meetings, analyse data, and create presentations using natural language prompts. It requires Microsoft 365 E3 or E5 licensing plus the Copilot add-on. **How much does Microsoft Copilot cost for a business?** Microsoft Copilot for Microsoft 365 costs approximately $30 USD per user per month as an add-on to existing Microsoft 365 E3 or E5 licensing. Implementation and training costs vary depending on organisation size. We recommend starting with a pilot of 5-10 users to measure actual productivity gains before a full rollout. **What is EDR and do I need it?** EDR (Endpoint Detection and Response) is advanced security software that monitors devices for suspicious behaviour and can automatically respond to threats. It's more effective than traditional antivirus and is now required by many cyber insurance policies. **Is cyber insurance worth it for small businesses?** Yes, cyber insurance is increasingly essential. A single ransomware attack can cost $200,000+ in recovery, lost revenue, and reputational damage. Cyber insurance typically costs $1,000-5,000 annually for small businesses, but requires you to meet minimum security standards. ## Resources and Guides ### Online Guides - **FAQ** (https://www.belton.co.nz/faq.html): Common questions about managed IT services, support, pricing, and how Belton works - **Essential Eight** (https://www.belton.co.nz/essential-eight.html): Guide to the Australian Essential Eight cyber security framework, relevant for both Australian and New Zealand businesses - **M365 Security Checklist** (https://www.belton.co.nz/m365-security-checklist.html): Microsoft 365 security best practices and hardening checklist - **Cyber Insurance Readiness** (https://www.belton.co.nz/cyber-insurance-readiness.html): Guide to preparing for cyber insurance requirements and meeting minimum security standards - **DIY Cybersecurity** (https://www.belton.co.nz/diy-cybersecurity.html): Self-assessment security guide for businesses to evaluate and improve their own security posture - **M365 Selection Guide** (https://www.belton.co.nz/m365-guide.html): Guide to choosing the right Microsoft 365 plan for your business - **Cyber Standards Guide** (https://www.belton.co.nz/cyber-standards-guide.html): Overview of cyber security standards and frameworks relevant to NZ and AU businesses - **Copilot Learning** (https://www.belton.co.nz/copilot-learning.html): Free 30-day AI productivity journey for learning Microsoft Copilot - **Security Assessment** (https://www.belton.co.nz/security-assessment.html): Free security evaluation to understand your current security posture ### Free Downloads and Templates - **AI and Data Policy Template** (https://www.belton.co.nz/downloads/ai-policy-template.html): Editable Word document for creating internal AI usage policies that govern how staff interact with AI tools - **DIY Cybersecurity Checklist** (https://www.belton.co.nz/downloads/diy-cybersecurity-checklist.html): Self-assessment security checklist businesses can use to evaluate their own security controls - **Essential Eight Guide** (https://www.belton.co.nz/downloads/essential-eight-guide.html): Detailed guide to implementing the Australian Essential Eight cyber security framework - **Cyber Insurance Checklist** (https://www.belton.co.nz/downloads/cyber-insurance-checklist.html): Preparation guide for cyber insurance applications, covering the security controls insurers typically require - **CIS Controls Guide** (https://www.belton.co.nz/downloads/cis-controls-guide.html): Guide to implementing the CIS (Center for Internet Security) security controls framework - **M365 Security Checklist** (https://www.belton.co.nz/downloads/m365-security-checklist.html): Microsoft 365 security hardening checklist covering MFA, conditional access, email security, and more - **Incident Response Template** (https://www.belton.co.nz/downloads/incident-response-template.html): Template for creating an incident response plan including roles, procedures, and communication protocols - **Remote Work Security Guide** (https://www.belton.co.nz/downloads/remote-work-security-guide.html): Security guide for remote and hybrid teams covering VPN, device security, and safe work practices ## Australian Services **URL:** https://www.belton.co.nz/au/ Belton operates in Australia with a Sydney-based team, offering the same comprehensive services as in New Zealand. The Australian site mirrors the New Zealand service structure with Australian-specific content including: - Local Australian phone number: +61 3 4803 4915 - Australian sales email: sales@belton.com.au - Essential Eight compliance support (the Australian government's mandatory cyber security framework) - Australian-specific pricing and service delivery - All core services available: Managed IT, Security, Microsoft 365, Cloud, Backup, Network Security, AI, Endpoints, Identity, Email Security, Voice, Connectivity, IT Advisory, Compliance, Projects ## Contact and Engagement - **General Enquiries:** https://www.belton.co.nz/contact.html - **Get Started:** https://www.belton.co.nz/get-started.html - **How We Work:** https://www.belton.co.nz/how-we-work.html - **Phone (NZ):** +64 9 974 2379 - **Phone (AU):** +61 3 4803 4915 - **Email:** support@belton.co.nz - **Remote Support:** https://www.belton.co.nz/remote-support.html - **Client Portal:** https://portal.belton.co.nz - **CEO's Blog:** https://www.belton.co.nz/blog.html ## Additional Pages - **Client Success Stories** (https://www.belton.co.nz/client-success.html): Case studies and testimonials from Belton clients - **Who We Work With** (https://www.belton.co.nz/who-we-work-with.html): Profile of Belton's ideal clients and the types of businesses they serve best - **Our Story** (https://www.belton.co.nz/our-story.html): The history of Belton IT Nexus from founding to present - **About Us** (https://www.belton.co.nz/about.html): Company information, values, and approach - **Privacy Policy** (https://www.belton.co.nz/privacy.html): Privacy practices and data handling - **Legal** (https://www.belton.co.nz/legal.html): Legal information and disclaimers - **Terms** (https://www.belton.co.nz/terms.html): Terms of service