Frequently Asked Questions

Everything you need to know about our services and team

Our managed IT services provide comprehensive technology support tailored to your business needs. We offer three tiers designed to scale with your organization:

Core Benefits Across All Tiers:

  • 24/7 monitoring and support
  • Proactive issue detection and resolution
  • Regular system maintenance and updates
  • Security management and threat protection
  • Direct access to our experienced technical team

We offer three tiers to match different business needs and budgets:

Prime Lite - $105/user

Best for: Businesses needing essential IT support and security

  • 24/7 IT Support
  • Cybersecurity Protection
  • Microsoft 365 or Google Workspace
  • On-site support as needed

5 user minimum

Prime Plus - $165/user

Best for: Growing businesses needing infrastructure and connectivity

  • Everything in Lite
  • Office Firewall
  • Wireless & Ethernet
  • Cloud Backup
  • IT Relocation Support

10 user minimum

Prime Complete - $205/user

Best for: Organizations wanting a complete IT department replacement

  • Everything in Plus
  • Desktop Computers
  • Monitors Included
  • Full Hardware Management
  • Complete IT Solution

10 user minimum

Absolutely! We understand that business needs change. You can adjust your service tier as your organization grows or your requirements evolve.

We'll work with you to ensure a smooth transition with no disruption to your operations. Contact us to discuss tier changes at any time.

Most vendors sell you software. We provide a complete security partnership.

Included
Add-On/Extra Cost
Not Available
Service Component CrowdStrike SentinelOne ThreatLocker Only
EDR/MDR Platform ThreatLocker Falcon Singularity ThreatLocker
24/7 MDR Service Cyber Hero w/ Prime Vector Overlay Falcon Complete Vigilance Cyber Hero
Platform Configuration & Setup Full Service Self-Service Self-Service Self-Service
Ongoing Management & Tuning Monthly DIY DIY DIY
Custom Playbook Development Tailored Generic Generic Generic
Vulnerability Management Included Spotlight Module Not Offered Not Offered
Patch Management Included Not Offered Not Offered Not Offered
Immutable, Secure Data Backups Included (250GB/user) Not Offered Not Offered Not Offered
Security Awareness Training Included Not Offered Not Offered Not Offered
Phishing Simulations Monthly Not Offered Not Offered Not Offered
Compliance Auditing Add-On Limited Limited Not Offered
Penetration Testing Add-On Not Offered Not Offered Not Offered
Local Support & Partnership Northern Colorado Call Center Call Center Call Center
Strategic Security Guidance Regular Reviews Not Included Not Included Not Included

The Bottom Line: Prime Vector provides comprehensive, turn-key security management that goes far beyond what traditional EDR vendors offer. We handle the technology, management, and ongoing optimization so you can focus on your business.

Full Managed IT means we become your complete IT department. We handle everything technology-related so you can focus on your core business.

What We Handle:

  • Complete infrastructure management and monitoring
  • All hardware and software procurement and maintenance
  • 24/7 help desk support for your entire team
  • Strategic IT planning and budgeting
  • Security, compliance, and risk management
  • Vendor management and coordination

This is ideal for organizations that want to eliminate the overhead of an internal IT department while gaining access to enterprise-level expertise.

Co-Managed IT is a partnership model where we work alongside your existing IT staff to fill gaps and enhance capabilities.

Perfect for organizations that:

  • Have internal IT staff but need additional expertise
  • Require 24/7 coverage beyond their team's capacity
  • Need specialized skills (security, cloud, networking)
  • Want to reduce burden on internal resources

We augment your team's capabilities while respecting their existing processes and knowledge. Your IT staff maintains control while we provide support, expertise, and scalability.

GRC services help you establish, maintain, and prove compliance with industry regulations and security standards.

Our GRC Services Include:

  • Policy development and documentation
  • Risk assessments and mitigation strategies
  • Compliance framework implementation (HIPAA, PCI-DSS, SOC 2, etc.)
  • Security controls assessment
  • Audit preparation and support
  • Ongoing compliance monitoring

We help you meet regulatory requirements and prepare for audits with comprehensive compliance management.

Services Include:

  • Gap analysis against compliance frameworks
  • Documentation and evidence collection
  • Control implementation and testing
  • Internal audit support
  • Remediation planning and execution
  • Continuous compliance monitoring and reporting

We support various compliance standards including HIPAA, PCI-DSS, SOC 2, ISO 27001, NIST, and more.

We proactively identify and remediate security vulnerabilities before they can be exploited.

Our Approach:

  • Regular vulnerability scanning across all systems
  • Risk assessment and prioritization of vulnerabilities
  • Automated patch deployment for operating systems and applications
  • Testing and validation of patches before deployment
  • Detailed reporting on security posture
  • Emergency patching for critical vulnerabilities

This service significantly reduces your attack surface and helps maintain compliance with security standards.

We specialize in enterprise-grade firewall solutions with over a decade of experience. As a certified Fortinet partner with former manufacturer engineers on our team, we provide expert firewall management and optimization.

Our Services Include:

  • Firewall design and implementation
  • Seamless migrations from any brand to Fortinet
  • 24/7 monitoring and management
  • Regular rule reviews and optimization
  • Security policy enforcement
  • Threat detection and response

We provide comprehensive monthly reporting and ongoing optimization to ensure your firewall performs optimally and protects your network effectively.

Monthly Reporting Includes:

  • Security threat analysis and blocked attacks
  • Bandwidth utilization and top applications
  • Policy compliance and rule effectiveness
  • Performance metrics and recommendations
  • Emerging threats and vulnerability alerts

We conduct regular firewall rule audits to ensure optimal security and performance.

Rule Check Process:

  • Identify unused, redundant, or outdated rules
  • Review rule ordering for optimal performance
  • Ensure rules align with security best practices
  • Identify overly permissive rules that create security risks
  • Recommend consolidation opportunities
  • Document all changes and rationale

This ongoing optimization keeps your firewall lean, secure, and performing at its best.

We schedule regular calls to review findings, discuss recommendations, and plan improvements to your firewall security.

Call Agenda:

  • Review of monthly security reports and metrics
  • Discussion of any security incidents or threats
  • Presentation of optimization recommendations
  • Planning for rule changes and updates
  • Review of upcoming security requirements
  • Q&A and strategic planning

These calls ensure you're always informed about your security posture and have a clear roadmap for improvements.

Corey Freeman - Co-Founder & Security Architect

Background: Master's degree in Cybersecurity & Information Assurance

Experience:

  • Senior Lead Security Architect (Commercial & Public Sector) at Lumen Technologies
  • Senior Analyst, Cyber Risk Defense at Kaiser Permanente
  • Security Engineer at CenturyLink and Level 3 Communications
  • CISSP and other industry certifications

Expertise: SIEM architecture, security logging infrastructure, MSSP solutions, compliance frameworks, and protecting Fortune 500 environments and healthcare systems.

Craig Mock - Co-Founder & Solutions Architect

Background: Master's degree in Information Assurance and Computer Security with a concentration in Banking and Finance from Dakota State University

Experience:

  • Solutions Engineer at F5 Networks (Service Provider Team)
  • Sales/Systems Engineer at Fortinet (Carrier & Service Provider Group)
  • Solutions Architect at Zivaro (State of Colorado architect)
  • 20+ years in security consulting through MC10

Expertise: Enterprise architecture, firewall solutions, data center infrastructure, multi-petabyte environments, and designing security for major telecom carriers and state government.

Our values drive everything we do and shape how we serve our clients:

🤝 Integrity First 💪 Technical Excellence 🎯 Client Success 🔒 Security Focused 📈 Continuous Learning ⚡ Responsive Service 🌟 Partnership Mentality 💡 Proactive Solutions

What Drives Us:

  • Solving Real Problems: We focus on practical solutions that address your actual business challenges, not selling products you don't need
  • Building Long-Term Relationships: We measure success by client retention and satisfaction, not transaction volume
  • Bringing Enterprise Expertise to All: We believe small and mid-sized organizations deserve the same level of expertise as Fortune 500 companies
  • Transparency and Education: We explain what we're doing and why, empowering you to make informed decisions
  • Staying Current: Technology evolves rapidly; we invest in continuous learning to provide cutting-edge solutions

We work best with organizations that value technology as a strategic asset and are looking for a true partnership, not just a vendor.

Organization Profile:

  • Size: 5-500 employees (sweet spot: 10-100 users)
  • Industries: Professional services, healthcare, education, faith-based organizations, municipalities, financial services
  • Technology Maturity: Ready to move beyond break-fix to proactive IT management
  • Growth Stage: Stable or growing organizations that need IT to scale with them

You're a Great Fit If You:

  • Value security and want to protect your data and reputation
  • Recognize that downtime costs your business money
  • Want a strategic technology advisor, not just tech support
  • Prefer transparent pricing with no surprises
  • Appreciate quick response times and proactive communication
  • Are looking for a long-term IT partner who grows with you
  • Want access to enterprise-level expertise at a reasonable price

Location: We're based in Northern Colorado and serve clients nationwide. We provide on-site support in the Colorado region and remote support everywhere.

After decades working for large enterprises and service providers, we saw a gap in the market: small and mid-sized organizations that need enterprise-grade IT expertise but can't afford a full internal team.

Our Mission: To make Fortune 500-level IT expertise accessible to organizations of all sizes. We believe every business deserves reliable technology, strong security, and strategic guidance—not just the big companies.

We started Prime Vector Technologies to build a different kind of IT services company—one that combines:

  • Deep technical expertise from major enterprise environments
  • Personal, responsive service you'd expect from a small business
  • Transparent pricing without hidden fees
  • A genuine commitment to our clients' success

We're not here to be the biggest MSP—we're here to be the best partner for organizations that value quality, expertise, and integrity.