Managed Security Services Attachment

This Service Attachment is between Haxxess Enterprise Corporation (sometimes referred to as “Provider,” “we,” “us,” or “our”, and the Client found on the applicable Order or Service Description (sometimes referred to as “you,” or “your,”) and, together with the Order, Master Services Agreement, and other relevant Service Attachments or Descriptions, forms the Agreement between the parties the terms to which the parties agree to be bound. 

The parties further agree as follows:


Provider will deliver to Client the Managed Security Services (“Service”) listed below and identified on the Order. Unless otherwise indicated, Provider will deliver the Services on an ongoing basis.

Provider, through its third-party vendors will make its best effort to ensure the security of Client’s information through third-party security software (“Security Software”). Client designates Provider as its agent to provide the Service to Client, and to enter into any third-party relationship to provide the Service to Client. Use of this Service is subject to the applicable third-party vendor agreements regarding terms of use, which Client and Provider agree has been provided by Provider to Client. Client acknowledges that third-party vendors and their licensors own all intellectual property rights in and to the Security Software. Client will not engage in or authorize any activity that is inconsistent with such ownership. Client acknowledges and agrees to be bound by any applicable third-party vendor’s agreements regarding terms or use or end user licensing terms, and Client understands that any applicable agreement regarding terms of use or end user licensing is subject to change by any third-party vendor or licensor without notice. It is Client’s responsibility to know Client’s rights and obligations when using any third-party vendor or licensor’s software solution.

Standard Security Services

  • Security assessment and report card – Provider periodically will conduct information systems security testing procedures to evaluate the stability and security of Client’s network, and Provider will deliver a written report identifying areas for concern or improvement.
  • Dark Web Monitoring – Provider periodically will deploy sophisticated Dark Web intelligence with search capabilities to identify, analyze and proactively monitor for an organization’s compromised or stolen employee and customer data. Reports will be delivered periodically.
  • Next generation firewall Equipment and Software – Provider will deliver, deploy, configure and manage one or more compatible firewall devices – including associated firewall security software – on Client’s network for Client’s internal business purposes.

The Service includes the following:

  • Installation and configuration of firewall traffic policies.
  • Apply updated firmware when applicable.
  • Configuration changes when needed.
  • Software services included on firewall:
    • Intrusion Prevention – provides real-time protection against network threats, including spyware, SQL injections, cross-site scripting, and buffer overflows.
    • URL Filtering – blocks known malicious sites, and delivers granular content and URL filtering tools to block inappropriate content.
    • Gateway Antivirus – continuously updated signatures, identify and block known spyware, viruses, trojans, worms, rogueware and blended threats – including new variants of known viruses.
  • Network Discovery – generates a visual map of all nodes on your network, making it easy to see where you may be at risk.
  • Reputation-Based Threat Prevention – Cloud-based web reputation service that aggregates data from multiple feeds to provide real-time protection from malicious sites and botnets, while dramatically improving web processing overhead.
  • Spam Prevention – Real-time, continuous, and highly reliable protection from spam and phishing attempts.
  • Application Control – Provides the ability to allow, block, or restrict access to applications based on a user’s department, job function, and time of day.
  • APT Blocker – detects and stops the most sophisticated attacks including ransomware, zero-day threats, and other advanced malware designed to evade traditional network security defenses.
  • Data Loss Prevention – works to enforce compliance by scanning text and files to detect sensitive information attempting to exit your network, whether it is transferred via email, web, or FTP.
  • Threat Detection & Response – Security data collected from the firewall is correlated by enterprise-grade threat intelligence to detect, prioritize and enable immediate action against malware attack.
  • Intelligent Antivirus – leverages signature-less anti-malware solution that relies on artificial intelligence to automate malware discovery.
  • DNS Filtering – detects and blocks malicious DNS requests, redirecting users to a safe page with information to reinforce security best practices.

Client-Side DNS Filtering

Provider will acquire and will assign an appropriate number of licenses to support the deployment of client-side DNS Filtering on all laptop systems.

The Service includes the following:

  • Detects and blocks malicious DNS requests, redirecting users to a safe page with information to reinforce security best practices.
  • Protects laptops while away from the corporate network.

Security Awareness Training & Phishing Simulations

Provider will acquire and will assign an appropriate number of licenses to support the client environment.

The Service includes the following:

  • Scheduled phishing campaigns to send at random times during a specified period.
  • Trackable, fully customizable training course campaigns. Keep track of every user’s participation, making all cybersecurity education accountable and measurable.
  • Full catalog of cybersecurity and compliance training courses.

Multi-Factor Authentication Services / Password Credential Management Services

  • Two-factor authentication for compatible software applications.
  • Single Sign-on services for compatible software applications
  • Customized Security Policies and Procedures

After performing a security assessment and assessing the state of Client’s existing policies and procedures pertaining to network security (if any), Provider will work with Client to prepare a new or revised set of policies and procedures that incorporate cutting edge best practices and that take advantage of the other Services delivered by Provider.

Premium Security Services

If Client purchase Premium Security Services, then in addition to all services included at the Standard Service levels, Provider will deliver the following:

  • Advanced Malware Protection supported by Security Operations Center (SOC).
  • Deployment of advanced malware protection applications to all Windows based devices on customer network.
  • 24×7 SOC service analyzes quarantined applications and files, reducing false positives.
  • Immediate risk identification – Provides rapid recognition of thousands of viruses and malware attack variants, including cryptomining attacks, as well as the root causes of these malicious behaviors, by quickly identifying and diagnosing corrupt source processes and system settings.
  • Ransomware rollback – quickly rollback files to previous safe versions through tracking changes in your devices and restoring them to an acceptable risk state.

Security Log Management.

  • Configure log sources to capture and retain information without creating excessive logging.
  • Limit user access to log files.
  • Avoid logging sensitive or protected information.
  • Secure the processes that generate logs.
  • Identify and resolve logging errors.
  • Analyze log entries, prioritize entries, and respond to those requiring action.

Security Incident Event Management (SIEM) Services supported by SOC.

  • Deployment of SIEM monitoring probes to monitor all critical network devices including; domain controller, firewalls, network switches and routers. When meeting compliance requirement deployment will include all Windows devices as well.
  • Reporting for compliance requirements – generate daily reports and threat analysis outlines for three regulatory standards: HIPAA, PCI and NIST-800.
  • SOC expertise and assistance.

Provider will assist Client in the hours immediately following a data breach to identify the likely source of the breach and to begin formulating an appropriate response to the breach. However, any assistance with data breach-remediation efforts past the first twenty-four (24) hours following a breach – including but not limited to breach-notification planning, in-depth forensic examinations of the source of a breach, and significant, post-breach systems reconfiguration – are not within the scope of this Service Attachment. If Client requests Provider’s assistance with such activities, Provider will prepare a separate Service Attachment for Project Services that will specify what the charges will be for such assistance.



Provider shall provide remote help desk and vendor management services through remote means during Provider’s normal working hours. 

Support Outside Normal Working Hours

Upon request, Provider shall perform emergency Services outside of normal working hours at the rates and according to the guidelines specified in the Order.

Maintenance Windows

Routine server and application maintenance and upgrades will occur during maintenance windows, and some applications, systems or devices may be unavailable or non-responsive during such times.


In order for Client’s existing environment to qualify for Provider’s Services, the following requirements must be met:

  • All servers with Microsoft Windows Operating Systems must be running current version of Windows Server supported by Microsoft, and have all of the latest Microsoft Service Packs and Critical Updates installed and be patched within 30 days of the last patch.
  • All desktop PC’s and notebooks/laptops with Microsoft Windows Operating Systems must be running current version of Windows, and have all of the latest Microsoft Service Packs and Critical Updates installed and be patched within 30 days of the last patch.
  • All server and desktop software must be genuine, licensed and vendor-supported.
  • All wireless data traffic in the environment must be securely encrypted.
  • Provider may deliver on-site Equipment in order to meet service requirements, as needed. 
  • Client’s network environment must be configured with centralized authentication services such as Microsoft Active Directory or Radius services.

Healthcare Clients

  • MS Active Directory

PCI-DSS (credit card)

  • Segregated payment network
  • Segregated wireless network from payment network
  • MS Active Directory

All costs required to bring Client’s environment up to these minimum standards are not included in this Service Attachment.

If Client’s environment fails to satisfy the above requirements at any time during the Service term, Provider may suspend further delivery of the Services and/or terminate this Service Attachment upon five (5) business days’ advance, written notice.


Minor On-Site Tasks

Provider may occasionally request Client staff to perform simple on-site tasks. Client shall comply with all reasonable requests.

Server Upgrades or Repair

Provider will authorize the conduct of all server upgrades or repair.  Client shall not perform any of these actions without Provider notification.

Security and Regulatory Recommendations

Although it is under no obligation to do so, from time to time, Provider may make recommendations regarding regulatory compliance, safety and security related to Client’s network and practices (e.g., multi-factored authentication). If Client fails to adopt or implement the recommended protocols, Client is responsible for any and all damages related to regulatory, security, privacy, or data protection, including but not limited to fines, data breach notification, malware or ransomware costs, restoration, forensic investigation, restoring backups, or any other costs or damages related to Client’s refusal to implement the recommended protocols.  


Significant Changes to Client’s Network

Client shall notify Provider via email of all significant proposed network changes and shall provide the opportunity for Provider to comment and follow-up.

Research Regarding Network Changes

Evaluation of network change requests will sometimes require significant research, design, and testing by Provider. These types of requests are not covered by this agreement and will be billed at Provider’s then-current rate for time and materials.


Service Fees

For the Services described in this Service Attachment selected or ordered by Client, Client shall pay the Service Fees specified in the Order that is in effect at that time. 

Client Delay

If Provider is unable to commence delivery of the Services on the Managed Services Start Date (defined below) because of any failure on the part of Client (including but not limited to failure of Client to provide the Client resources in a timely manner), Client nonetheless will begin to incur and Service Fees, which Client shall pay in accordance with this Service Attachment, beginning on the Managed Services Start Date.


We are not responsible for failures to provide Services that are caused by the existence of any of the following conditions:

  • Expired Manufacturer Warranty or Support – Parts, equipment or software not covered by a current vendor/manufacturer warranty or support.
  • Alterations and Modifications not authorized by Provider – Any repairs made necessary by the alteration or modification of equipment other than that authorized by Provider, including alterations, software installations or modifications of equipment made by Client’s employees or anyone other than Provider.
  • Hardware Malfunction – Anytime where there is a defect or malfunction in any hardware or software not caused by Provider that adversely affects Provider’s ability to perform the Services.
  • Client Resource Problems – Anytime a problem occurs resulting from a Client resource that are not under Provider’s management or control.
  • Network Changes – Any changes Client may have made to the networking environment that were not communicated to or approved by Provider.
  • Task Reprioritization – Any problems or failures related to a prioritization or reprioritization of tasks by Client.
  • Force Majeure – Any problems resulting from a Force Majeure Event as described in the Master Services Agreement.
  • Client Actions – Any problem resulting from Client actions or inactions that were contrary to our reasonable recommendations.
  • Client Responsibilities – Any problems resulting from your failure to fulfill any responsibilities or obligations under our agreements.
  • Internet Connectivity Loss – Any loss of internet connectivity that occurs at Client locations for any reason.
  • Software Maintenance – Any maintenance of applications software packages are involved, whether acquired from Provider or any other source. 
  • Remote Computers – Home or remote computers that are not covered under the Agreement.

We are not responsible for failures to provide Services that occur during any period of time in which any of the following conditions exist:

  • Problem Ticket Management – The time interval between the initial occurrence of a desktop malfunction or other issue affecting functionality and the time Client reports the desktop malfunction or issue to Provider.
  • Power Supply Malfunction – Instances where a uninterruptable power supply (UPS) device malfunctions and renders Provider unable to connect to the network or troubleshoot the device in question.
  • Third-Party Criminal Activity – Provider is not responsible for criminal acts of third parties, including but not limited to hackers, phishers, crypto-locker, and any network environment subject to ransom. You agree to pay ransom or hold provider harmless for any activity effecting network security on your environment related to third-party criminal activity. Any costs or fees to rebuild or service machines are provided and sold separately by Provider.
  • Viruses – Provider is not responsible for any harm that may be cause by Client’s access to third party application programming interfaces or the execution or transmission of malicious code or similar occurrences, including without limitation, disabling devices, drop dead devices, time bombs, trap doors, Trojan horses, worms, viruses and similar mechanisms. Any costs or fees to rebuild or service machines are provided and sold separately by Provider.
  • Hardware Equipment – Client equipment must be maintained under manufactures warranty or maintenance contract or is in working order. Provider is not responsible for client equipment that is not maintained under manufacturer’s warranty or maintenance contract or that is otherwise out of order. All fees, warranties, and liabilities against Provider assumes equipment is under manufactures warranty or maintenance contracts or is in working order.

The following list of items are excluded from the scope of included Services, and may incur additional charges or require a separate billable project:

  • Scheduled Maintenance – Any part of the Service outside designated or scheduled maintenance windows or other agreed upon periods of time that are necessary for repairs or maintenance.
  • Task Reprioritization – Any problems or failures related to a prioritization or reprioritization of tasks by Client.
  • Agreed Temporary Exclusions – Any temporary exclusion that we may request, subject to your approval, to implement changes in applications, environments, conversions or system software.
  • Software Maintenance – Unusual work that results from a failed software patch or update that results in an interruption in Client’s business, with the exception of Microsoft Windows updates and patches.
  • Programming Modifications – Any programming (modification of software code) and program (software) maintenance occurs.
  • Training – Any training service of any kind.
  • Software and Web Development – Any Services requiring software and web development work.
  • Remote Computers – Home or remote computers that are not covered under the Agreement.
  • Replacement Software – Implementation of new or replacement software.
  • Relocation / Satellite Office – Office relocation/satellite office setup.
  • Equipment Refresh – Any non-workstation equipment refreshes.

The following list of items are costs that are considered separate from the Service pricing:

Costs Outside Scope of the Service – The cost of any parts, equipment, or shipping charges of any kind. The cost of any software, licensing, or software renewal or upgrade fees of any kind. The cost of any third-party vendor or manufacturer support or incident fees of any kind. The cost of additional facilities, equipment, replacement parts, software or service contract.

The following is a list of Services Provider does not perform:

  • Printer Hardware Repair – Printer hardware repair or maintenance work.
  • Third-party Vendor Disputes – The management or involvement with disputes or charges with any third-party vendor, other than issues relating to the technical services.



This Service Attachment is effective on the date specified on the Order (the “Service Start Date”). Unless properly terminated by either party, this agreement will remain in effect through the end of the term specified on the Order (the “Initial Term”).




Month-to-Month Services

If the Order specifies no Initial Term with respect to any or all Services, then we will deliver those Services on a month-to-month basis. We will continue to do so until one party provides written notice to the other party of its intent to terminate those Services, in which case we will cease delivering those Services at the end of the next calendar month following receipt such written notice is received by the other party.

Early Termination by Client With Cause

If an Initial Term is specified in the Order, then you may terminate this agreement for cause following sixty (60) days’ advance, written notice delivered to Provider upon the occurrence of any of the following:

  • We fail to fulfill in any material respect our obligations under this agreement and fail to cure such failure within thirty (30) days following our receipt of your written notice.
  • We terminate or suspend our business operations (unless succeeded by a permitted assignee under this agreement)

Early Termination by Client Without Cause

If an Initial Term is specified in the Order , and if you have satisfied all of your obligations under this Service Attachment, then no sooner than ninety (90) days following the Service Start Date, you may terminate this Service Attachment without cause during the Initial Term upon sixty (60) days’ advance, written notice, provided that you pay us a termination fee equal to  fifty percent (50%) of the recurring, Monthly Service Fees remaining to be paid from the effective termination date through the end of the Initial Term, based on the prices identified on the Order.

You may terminate this Service Attachment without cause following the Initial Term during any Renewal term upon sixty (60) days’ advance, written notice, without paying an early termination fee.

Termination by Provider

We may elect to terminate this Service Attachment upon ninety (90) days’ advance, written notice, with or without cause.

Effect of Termination

As long as Client is current with payment of: (i) the Fees under this Agreement, (ii) the Fees under any Project Services Attachment or Statement of Work for Off-Boarding, and/or (iii) the Termination Fee prior to transitioning the Services away from Provider’s control, then if either party terminates this Service Attachment, Provider shall assist Client in the orderly termination of services, including timely transfer of the services to another designated provider. Client shall pay Provider the actual costs of delivering at our then prevailing rates for any such assistance. Termination of this Service Attachment for any reason by either party immediately nullifies all access to Services supplied by Provider. Provider will immediately uninstall any affected software from your Client’s devices, and Client hereby consents to such uninstall procedures.

Upon request by Client, Provider may provide Client a copy of Client Data in exchange for a data-copy fee invoiced at Provider’s then prevailing rates, not including the cost of any media used to store the data. After thirty (30) days following termination of this Agreement by either party for any reason, Provider shall have no obligation to maintain or provide any Client Data and shall thereafter, unless legally prohibited, delete all Client Data on its systems or otherwise in its possession or under its control.

Provider may audit Client regarding any third-party services. Provider may increase any Fees for Off-boarding that are passed to the Provider for those third-party services Client used or purchased while using the Service.

Client agrees that upon Termination or Off-Boarding, Client shall pay all remaining third-party service fees and any additional third-party termination fees.

stay in touch

Subscribe to our newsletter and we'll keep you informed about latest IT news.