Enterprise-grade IT support and cybersecurity — delivered with clarity, consistency, and a security-first mindset at a price point that makes sense for the businesses that can't afford to be breached.
Subscription-based IT support with cybersecurity baked in — flat monthly pricing, no surprises, no lock-in tricks.
| Feature | Essentials $75/user |
Secure ⭐ $125/user |
Sentinel $175/user |
|---|---|---|---|
| Remote Helpdesk Support | ✓ | ✓ | ✓ |
| Microsoft 365 Support | ✓ | ✓ | ✓ |
| Endpoint Monitoring | ✓ | ✓ | ✓ |
| Patch Management | ✓ | ✓ | ✓ |
| Microsoft Defender AV | ✓ | ✓ | ✓ |
| MFA Enforcement | — | ✓ | ✓ |
| Identity & Access (Entra ID) | — | ✓ | ✓ |
| Email Security & Phishing Protection | — | ✓ | ✓ |
| Backup & Verified Restores | — | ✓ | ✓ |
| Quarterly Security Review | — | ✓ | ✓ |
| Advanced EDR (Huntress) | — | — | ✓ |
| Vulnerability Scanning | — | — | ✓ |
| After-Hours Emergency Support | — | — | ✓ |
| Monthly Executive Security Report | — | — | ✓ |
| SLA Response Time | Same business day | 4 hours (biz hours) | 1 hour emergency |
We audit your users, devices, and M365 environment to understand your current security posture and identify gaps.
RMM agents, endpoint protection, and backup tools are deployed across all devices with zero disruption to your workflow.
MFA enforced, admin accounts secured, security policies applied. Your environment is hardened to Twilight Tech standards.
Everything is documented — credentials, network diagrams, SOPs, vendor contacts. Nothing lives only in someone's head.
Orientation call, support walkthrough, and your dedicated support channel goes live. You're officially Twilight Tech managed.
Browse the À La Carte section. Not sure? Book a $50 IT Consultation and we'll tell you exactly what you need — the fee gets credited to any service you book.
Use the intake form below, or email support@twilighttech.io. Describe your situation and we'll confirm same day.
You'll receive a flat-rate invoice before any work begins. Pay once, no surprises. Work starts after payment is confirmed.
Most services are completed remotely within 24–48 hours. You'll get a full summary of everything done.
That's it. You're not subscribed to anything. Managed plans are here when you're ready — but there's zero pressure.
Our next-generation Sentinel platform uses AI-assisted cybersecurity analysis to continuously scan your domain, analyze security risks, and generate actionable threat reports. Coming soon for managed clients.
Join the Early Access ListNot ready for a managed plan? No pressure. Every service below is one-time, flat-rate, and zero commitment.
Custom AI assistants that manage your operations, automate your workflows, and run your business — hands-free. Not a pitch deck. A deployed system.
We don't just talk about AI — we build it, deploy it, and prove it works. Our AI systems manage emails, schedule meetings, monitor security, track projects, and handle client operations — all from a single natural-language command.
Custom AI that understands your business — manages emails, schedules meetings, answers questions, and handles operations through natural conversation.
Send emails, find free slots, create events, and manage your inbox — all by telling the AI what you need in plain English.
Real-time system awareness — process monitoring, service health checks, USB detection, event log analysis, and proactive security alerts.
Live dashboards showing your KPIs, client pipeline, revenue, SLA compliance, and ticket status — updated in real time.
Control your AI assistant from anywhere via Telegram. Send commands from your phone and get instant responses.
Deep integration with Gmail, Google Calendar, Drive, Tasks, and Contacts. Your AI manages your entire workspace.
Track projects, milestones, blockers, and deadlines. AI-powered task creation, prioritization, and progress reporting.
For managed service providers: automated ticketing, SLA tracking, client portals, outreach campaigns, and revenue reporting.
A deployable security entity that watches traffic across your network, learns what normal looks like, and flags the stuff that doesn't fit — before you even get the call.
HackBot started as a purple-team toolkit. It's now a deployable security sentinel — a Docker-packaged server that plugs into your environment, learns what's normal for your network, and responds with judgment. Alerts land where your SOC already lives. Containment actions wait for your approval. Threat forecasts tell you what's coming, not just what already happened.
HackBot spends its first week learning what "normal" looks like in your environment. Per-client behavioral profiles across traffic, logins, processes, and data flows. When something actually changes, it notices.
A 3AM login is suspicious on Tuesday, normal for your 24/7 ops team. Baselines split across time-of-day and day-of-week so alerts fit the context of your business.
Some actions fire automatically. Some wait for your approval. Some require explicit triggers. One-click approve or deny. Kill switch halts everything.
Not just "here's what happened." HackBot estimates breach risk per client, predicts CVE exploitation timelines, and tracks MITRE kill-chain progression so you see what's coming next.
Email, Slack, Telegram, PagerDuty, custom webhooks. Severity-adapted tone — critical alerts wake you up, low-priority waits for the daily digest.
NIST 800-53, PCI-DSS, HIPAA, SOC 2. HackBot maps findings to framework controls so your auditors see gaps, not raw data.
The watchdog has its own watchdog. HackBot monitors its own security services and self-heals before anything goes dark on your network.
HackBot inherits the architecture that powers J-Bot — our flagship AI OS. Proven foundation, security-forged specialization.
Real commands. Real results. Every screenshot below is from a live, deployed system — not a mockup.
A real walkthrough of AI-powered operations — from natural language command to completed task.
Book a free 30-minute consultation. We'll show you a live system, not a slideshow.
Twilight Tech was founded by James "Twilight" Destrades Jr., an IT professional with over 8 years of hands-on help desk experience and a decade of customer service expertise. Based in Atlanta, Georgia, Twilight Tech brings enterprise-grade thinking to small businesses that deserve real protection.
This isn't a call center. Every ticket, every policy, every security configuration is handled with direct expertise in Microsoft environments, Active Directory, endpoint security, and identity management. Cybersecurity isn't an afterthought here — it's the foundation.
James has built and repaired custom PCs, deployed Microsoft 365 tenants, hardened endpoints, managed Active Directory, responded to security incidents, and built an AI-powered cybersecurity platform from scratch — 113,000+ lines of production code. Twilight Tech exists to make that expertise accessible to the businesses that need it most.
Select the type of request below. Our intake process ensures you get the right tech, right away.
// Let us know who we're helping
// Tell us about the machine
Windows + Pause — or right-click Start → System. Shows CPU, RAM, and Windows version.Ctrl + Shift + Esc → Performance tab → GPU.Windows + R, type msinfo32, press Enter — shows everything at once.🍎 Apple menu in the top-left corner.About This Mac — shows chip, memory, and macOS version.More Info... then scroll to Storage to see drive size.// Describe what's happening
// Set priority and give us access
Thanks for reaching out to Twilight Tech. We've received your repair request and will contact you within your selected urgency window. Check your email for a confirmation.
Email Us Directly →All tiers are starting points — every build is fully customized to your needs and budget. ↓ Fill out the form below.
// Who is this build for?
// What will this machine do?
// Set your price range
// What matters most to you?
// When do you need it?
Your custom PC build request is in. Twilight Tech will review your specs and budget and send you a custom parts list and quote within 1–2 business days.
Email Us Directly →Ready to get started, need a one-time service, or just want to understand your security posture? Whether you're a small business owner or a fellow security engineer — Twilight Tech is standing by.