Questions about working with XaaS Techs
Here are some of the most common questions we get about managed IT, security, and partnering with our team. If you don’t see your question here, reach out — we’re happy to clarify.
Support & Sales
Talk to a human, not a ticket bot.
- Support: Submit a ticket
- Email: info@xaastechs.com
- Phone: (626) 412-8113
- Regions: Inland Empire, LA, OC, SGV, San Diego
Frequently asked questions
These answers are meant to give you a clear picture of what it’s like to work with us as your MSP. Every organization is different, but the foundation stays the same: clear expectations, predictable costs, and friendly support.
We typically work with small and mid-sized organizations that rely heavily on their systems being up — professional services, multi-location businesses, nonprofits, and teams with compliance or security requirements. If you have between about 10 and 250 staff, we’re likely a good fit.
During business hours, most tickets get an initial response within an hour, with many resolved on the first touch. Critical issues (outages, security incidents, major line-of-business failures) are escalated immediately and handled as top priority.
Both. Some clients use us as their full IT department. Others have one or two internal IT staff and rely on us for additional capacity, project work, security, or vCIO planning. We’re comfortable slotting into whatever model makes sense for your team.
Most ongoing agreements are based on a per-user or per-endpoint model with a base minimum. We’ll review your inventory, tools, and requirements, then provide a clear monthly estimate before any commitments. Project work is scoped separately with fixed or not-to-exceed pricing.
We usually work on 12-month terms for managed IT so we can plan properly and invest in your environment, but we keep our agreements straightforward and avoid auto-renew tricks. For projects, we use simple SOWs tied to clear deliverables.
Yes. We design our stacks around security first: MFA, endpoint protection, patching, backups, access control, and logging. We’re not a compliance auditor, but we help you implement the technical controls and documentation that auditors expect to see.
We start with a structured onboarding: documentation review, access and credential cleanup, agent deployment, and a quick-win checklist. We’ll give you a clear cutover date, communicate with your old provider as needed, and make sure staff know how to reach our support team from day one.
The easiest next step is a short discovery call. We’ll ask about your environment, what’s working, what’s not, and any deadlines or risks you’re dealing with. From there, we can outline a practical path forward — whether that’s a managed IT agreement, a focused project, or a second opinion on your current setup.