toggle menu

Managed Services

The simple definition of managed services from Wikipedia is:

“…the practice of outsourcing the responsibility for maintaining, and anticipating need for, a range of processes and functions in order to improve operations and cut expenses. It is an alternative to the break/fix or on-demand outsourcing model where the service provider performs on-demand services and bills the customer only for the work done.

“…The client and the MSP [managed service provider] are bound by a contractual, service-level agreement that states the performance and quality metrics of their relationship.”

Solutions - Managed Services

Derive Technologies’ managed service plans are constructed specifically for each individual client, mixing standard Derive professional service offerings with customized ones. Derive’s offerings (click on the Standard Service Offerings info tab below to see them) incorporate both proactive and reactive services spanning a variety of IT technology domains.

The firm’s best technology leaders are made available through the Project Management Office (PMO); the PMO facilitates efficient interactions between client leadership and Derive’s service delivery personnel and builds Service Level Agreements (SLAs) that align with client requirements. The PMO’s advisory service also aligns Derive’s managed services with client workstreams and ensures strict compliance with PMBOK (Project Management Body of Knowledge) standardized methodology.

Derive’s senior technology advisors add further value with visionary planning functions that complement traditional managed services. As an evolutionary outgrowth of Derive’s client advisory, the firm has established a unique c-level service — called The Virtual CTO — aimed primarily at SMB and middle-market organizations to provide enterprise-grade strategic technology roadmaps aligned with an organization’s business goals and objectives.

Click on The Virtual CTO info tab below to learn more about this service that can help your organization not only plan for current needs, but anticipate future technology trends, requirements, and opportunities.

To have a discussion about Derive’s managed services, BOOK A FREE CONSULTATION

Read More

Domain Areas for IT Infrastructure Managed Services:

Project Management Office (PMO)

  • The PMO facilitates effective collaboration between clients and Derive’s service delivery team. The PMO sets up workstreams, scheduling, communication, and keeps a client’s executive steering committee “in the loop.” The PMO produces assets associated with the managed services contracted and delivered via a Service Level Agreement (SLA) document
  • Establishes an Office of the CTO for clients utilizing the Virtual CTO service. Derive includes the “Virtual CTO” as part of this leadership team. That function is an executive advisory role that works with the client’s Office of the CTO to ensure alignment of service with client goals
  • The PMO ensures that the engagement adheres to agreed-upon project management methodology. At Derive, the standard methodology is PMBOK (Project Management Body of Knowledge)
  • Administration – tracking and reporting is the PMO’s responsibility

Cloud/Hybrid Cloud

Cloud and hybrid cloud infrastructure present a new, fresh approach to IT operations. Derive has put together a unique service offering to address this paradigm. Today there are several premier providers of cloud services; Derive is a Premium Partner with all of them.

Derive takes a layered approach to managed cloud services, beginning with an engagement to identify client needs and requirements. Frequently, Derive adapts legacy infrastructure to a new cloud-based architectures. A representation of some of those services consists of:

  • Configuration services
    • Backup Services
    • Periodic testing for restore services including VMs
  • Initial configuration of Derive managed services customers to a Remote Management & Monitoring (RMM) portal
  • Installation of a monitoring agent to a customer’s on-premises and cloud-based virtual servers, and configuration of desired health checks, alerts, daily, and weekly reports
  • Continual monitoring of the health, security, performance, and availability of customer servers
  • Rapid response to alerts on an as-needed basis
  • Quarterly planning meetings with customer IT staff to review trends, discuss performance tuning, capacity planning and insights from Derive analytic reports


Virtualization is a method that is used within on-premise capacity as well as cloud-based infrastructures. It is an operating system layered onto a server that allows multiple logical environments to exist on one or more physical environments. Physical components like servers, networking and storage are managed inside the virtualized environment.

Derive provides architecture/design, installation, maintenance, patching and administration to these environments. Derive frequently works with the following virtualization providers:

  • VMWare
  • Citrix
  • NetScaler
  • Nutanix
  • Microsoft
  • Physical Servers/hosts
    • HPE/Dell/Lenovo
    • Network – endpoints, cabled, wireless

These partners and others are supported. During an initial discussion, the Derive team analyzes the current state and desired future state of an organization’s virtual assets. At that point, Derive can make recommendations on how best to move forward.


Security is a domain that touches all facets of IT infrastructure. As part of an initial assessment, Derive examines how different security systems and policies should be configured and deployed. Tight integration of security protocols into the overall IT infrastructure fabric is key to establishing an effective IT security domain.

Based on the outcome of the security assessment, the PMO and practice leads will earmark security components as required as part of a unified IT infrastructure security protocol. The security workstream can be a standalone effort or part of another IT project.

Infrastructure Support - Administration, Patching, Updates & Upgrades

  • VMware stack
  • Physical servers/hosts – firmware updates
  • Nutanix
  • Storage/SAN

Backup Software

  • Veeam

Systems Monitoring & Alerting

  • System Monitor

To learn more about how Derive Technologies can address your needs, BOOK A FREE CONSULTATION

Obstacles to strategic goal setting and the determination of long-term IT roadmaps are commonplace in many organizations, and often encountered in SMB-size entities due to human resource shortfalls. In many instances, Derive can solve this challenge by providing a Virtual CTO service to augment an organization’s technology leadership on a short- or longer-term basis.

Derive’s internal practice leaders in computing, networking, hyperconvergence, virtualization, hybrid cloud computing and datacenter implementation and management combine their individual decades of operational and managerial experience—along with dozens of advanced technology certifications from industry-leader IT vendors—to solve critical gaps in technology direction-setting for clients.

The Virtual CTO service takes the combined technology leadership, knowledge, and hands-on experience of Derive’s most senior architects and practice leads and makes it available to those clients in clear need of advanced technology roadmap construction and strategic planning. This service is designed to appeal to organizations that can be classified as:

  • Wanting a level playing field with competitors through enterprise-grade strategic planning
  • Requiring help to remedy to one or more complex technology-based issues or challenges that are time-critical and require broad and deep IT technology expertise over multiple areas
  • Needing strategic guidance and long-term planning where appropriate c-level technology leadership is not available or requires additional expert-level assistance

The Virtual CTO service is staffed out of Derive’s Project Management Office (PMO) and can be deployed in many ways, ranging from long-term strategic technology planning to the dissection of complex problems and the assembly of detailed tactical executable solutions. Client management teams can use this service as a powerful adjunct to the advisory services normally provided by Derive as part of its managed service agreement.

To learn more about how Derive Technologies can address your needs, BOOK A FREE CONSULTATION


Derive Technologies has provided business and technological innovation for our clients through progressive, decades-long relationships with some of the world's most important providers of core infrastructure, cloud, mobility, collaboration, security and numerous other solutions.

DOWNLOAD CUTSHEET As a Dell Technologies Gold Certified channel partner, Derive represents Dell’s wide portfolio of datacenter, storage, cloud and desktop products plus related services. This includes:
Derive’s Premier Certification status with Cisco—and a long list of diverse technical certifications—enables fast, expert assessments, design, implementation, and support of today’s complex data network needs. Most of...
A highly valued channel partner, Citrix enables organizations to effectively support traditional office and remote virtual workforces with exceptional user experiences delivered via seamless VDI (Virtual Desktop Infrastructure) environments. Accompanied...
DOWNLOAD CUTSHEET Derive Technologies partners with Nutanix to deliver powerful IT solutions based on the vendor’s highly popular hyperconverged infrastructure (HCI) technology. Derive and Nutanix can deliver the promise of HCI: A full IT...
Veeam is an industry-leading backup and data management platform for on-premises, cloud-based, and virtual computing environments. In addition to normal organizational concerns about data loss from the unexpected, like power outages, today’s threat...
Webair specializes on the data security needs of several industry verticals: Financial, Healthcare, and Government. It provides: Private cloud hosting, storage services, and VDI solutions Offsite backups of mission-critical data and...
DOWNLOAD CUT SHEET Derive Technologies partners with Gradient Cyber to deliver cybersecurity threat monitoring, detection, and response 24/7 across your entire IT infrastructure.  Gradient Cyber is a trusted cybersecurity partner operating primarily...
DOWNLOAD CUT SHEET Check Point Software is a worldwide provider of advanced cybersecurity solutions founded in 1993. Since then they’ve grown to provide a comprehensive suite of enterprise-level software, however their initial claim to fame was...
HP Inc. (HPI) provides a wide variety of endpoint devices like desktop and notebook computers, monitors, tablets, printers and imaging—along with a wealth of collaborative service offerings related to IT management—for small, medium and large...
Derive Technologies partners with HPE to deliver comprehensive computing, networking, and storage solutions, all with consumption-model (OPEX) options. Contact Derive for an informational briefing. HPE, formed after its split from the original Hewlett...
As a long-time Microsoft Gold Partner, Derive Technologies is highly experienced in delivering Microsoft’s solutions aimed at the enterprise and SMB space. Derive’s go-to solution portfolio includes Microsoft Windows, Microsoft 365, plus the...
Apple’s long-term relationship with Derive enables us to source, deploy, and support Apple devices and infrastructure for organizations that are both leading-edge and cost-effective. Derive has always taken special pride in being able to provide the...
VMWare is a premier provider of software solutions that enable organizations to operate multiple operating systems, applications, and computing workloads on a single server. By installing a hypervisor software layer on the server, one or more virtual...
Lenovo’s line of products extends well beyond its well-known and respected lineup of workstations, desktop computers, notebooks, laptops, ultrabooks, tablets, phones (Motorola) and monitors. The firm has extended its reach into the datacenter with...

related blogs


Creating an Unbreakable Cold Chain for Proper Vaccine Storage

Now more than ever, cold storage is the key to safeguarding vaccine efficacy. Temperature-sensitive medications like the top COVID-19 vaccines require careful tracking since even the smallest deviation above approved storage temperatures can...

How Hospitals are Increasing Asset Availability to Handle High Patient Volume

Increased patient volume has long been a prevalent issue in healthcare. With every flu season, hospitals nationwide have adapted and converted facilities to accommodate a swell of patients. While COVID-19 hospitalizations have been in a...

Three Technologies Curbing the Prevalence of Healthcare Misidentification

An estimated 1 in every 2,326 blood specimens is inaccurately labeled, translating into a recurrent error risk once every two weeks for a standard-sized hospital. Specimen and patient misidentification have been age-old issues in...

What are the Components of an Efficient Telehealth System?

A mere five years ago, telehealth was slowly making its presence known, used by less than 20% of healthcare facilities in the U.S. However, during the coronavirus outbreak, that number skyrocketed by 154% within the first weeks of...

How Enhanced Mobility Overcomes the Challenges in Modern Healthcare

Before the pandemic, new healthcare technologies such as telehealth and clinal mobile devices were already making an impact worldwide. However, now as we continue to move through unprecedented demands, the push for innovation has been superseded by...

Everything You Need to Know About Enterprise Cyberattacks in 2022

Everything You Need to Know About Enterprise Cyberattacks in 2022 Cybersecurity threats against enterprise businesses, particularly sophisticated and high-value ransomware attacks, are growing more prevalent by the day…and largely originate...

Derive Tech's 3 Most Critical Cybersecurity Services for Enterprise Businesses

Derive Tech's 3 Most Critical Cybersecurity Services for Enterprise Businesses Now more than ever businesses big and small are racing to fortify their cybersecurity defenses to protect themselves against online threats. Russian cyberattacks have...

Baseline Security Practices for the Modern SMB

Baseline Security Practices for the Modern SMB Cyberattacks around the world are continuing to escalate in both frequency and severity, exacerbated by current global events. Ransomware attacks in particular are an ever-growing threat vector, with the...

What the SEC’s New Cybsercurity Requirements Mean For You

Any business worth their salt has read the cyber landscape of the last few years and shored up their digital defenses to protect against attacks. The practice of cybersecurity protection, however, is soon to transition from a best practice into a...

How to Improve Your SMB’s Resiliency

While the goal of IT security is to prevent cyberattacks, small and medium-sized businesses (SMBs) need to be prepared to recover quickly if a breach is successful. Rapid recovery lessens the economic and reputational impact of a breach. Resilient...

5 Ways to Strengthen Your SMB’s Security Posture 

Small and medium-sized businesses (SMBs) often lack the resources needed to adopt a strong security posture. Given the unrelenting escalation of cyberattacks, SMBs can’t afford to skimp on security. With attacks potentially costing companies...

Learning Models and Generative AI in Managed Cybersecurity Services

As businesses big and small across the healthcare industry become increasingly reliant on technology to optimize and deliver patient care, effective managed cybersecurity services (outsourced management of security procedures and systems) have never...


Please fill out this field.
Please fill out this field.
Please fill out this field.
Please fill out this field.
Please validate captcha.