S3 logo

About S3

How long have you been in business?

20 years! S3 was founded by Marc, Vince, and myself in June 2003 after we all graduated in computer engineering together. Our vision was to become an outsourced IT department for SMBs which is still what we are today. We were, therefore, a Managed Service Provider before the term was used.

We are still the three sole owners of S3 and work hard at it every day.

Simon Marcil


What are your services?

Managed Services & Co-Managed Services.

As an MSP we become the IT department for SMBs that have no internal IT team or a small one. Our role is to ensure that the IT infrastructure supports the goals and vision of the business while not holding it back in any way. We focus on data security and employee productivity. These are our Managed Services.

Managed Services in a nutshell: The first thing we do is modernize, standardize, and secure the IT infrastructure. We then manage and monitor the infrastructure while our security team keeps it secure. We offer quick remote and onsite support to all the users. Finally, we build a 3-year IT plan with a detailed budget and risk analysis that we review annually.

Here is summary of the services we include:

  • Modernize, standardize, and secure the IT infrastructure as well as the user experience
  • Manage and monitor the on-premise or cloud IT infrastructure
  • Manage and monitor cybersecurity
  • Support users remotely or onsite
  • Manage new user deployments
  • IT strategy (3-year IT plan with budget and risk analysis)
  • IT projects (analysis, execution, and project management)
  • Hardware, software, and cloud services procurement


For SMBs with an IT team, our Co-Managed Services offer a collaborative extension to your team. We bring additional expertise in areas like strategic IT consulting, cybersecurity, 24×7 infrastructure management, user support, and project management and execution. This partnership allows us to bolster your IT capabilities, providing targeted support where it’s most needed and ensuring that your IT initiatives are both effective and aligned with your business strategies.


Marc Perras

Vice-President, Sales

What’s a typical client for S3?

Our typical client is an SMB with a head office in the greater Montreal area. Many of our clients also have other offices throughout Canada and the US. A good proportion of them have hybrid office models and some work entirely from home.

Our clients take the security of their data and the productivity of their people very seriously. They want to ensure that their IT enables them to meet their business goals and does not hold them back.

Our clients are from different industries. 60% are professional service firms and the other 40% are in distribution or manufacturing.

Our clients are in the Microsoft ecosystem. They mostly use Windows, Office 365, Azure. The majority have a mix of cloud and on-premise infrastructure. The others have a purely cloud infrastructure.

Most clients have no full-time IT people. Some have an IT team that is mostly focused on their line of business applications.

Clients usually find us when they outgrow their IT provider, or they lose an internal resource and decide they do not want to manage IT people anymore.

Vincent Rabbat

Vice-President, operations

Cyber Security

What are your security certifications?

We are currently SOC2 Type 1 certified. We are on track to be SOC2 Type 2 in April 2025.

How do you protect me against ransomware?

In our opinion ransomware is the #1 cyber threat to all our clients. We are focused on protecting our clients from these attacks. We follow ransomware news very closely and constantly adjust our standards based on the changing hacking tactics. Our security team’s main objective is ensuring that none of our clients are victims of a successful attack. Here are the steps we take to protect our clients

1. Bullet proof backups

The absolute first thing we do is deploy secure backups. Our backup standard is built on the assumption that the network will be breached, and the attacker will obtain full admin privileges. The backups must be able to withstand this. Our standards have been tested by multiple specialized security firms who were unable to access them.

2. Minimize your exposure

We minimise your exposure by making sure that only services that are absolutely necessary are exposed to the Internet. We will then limit these services exposure by only making them accessible to certain countries. We work with our clients to determine what this list is and will modify it as needs change.

3. Protect the infrastructure with advanced security tools

We deploy a set of advanced security tools that will not only protect you but will also alert our security team if something is not behaving normally.

4. Close the open buffet

Many networks are designed as a fortress or citadel. Once they are breached you can access everything, it’s basically an open buffet. We close this open buffet by segregating systems so that even if an attacker was able to get on a single system it’s very difficult to move to another. The more difficult it is the more chances are the attacker will make a mistake and set off an alarm allowing us time to respond to neutralise the attack.

5. Monitoring and response

We monitor alerts generated by our set of advanced security tools and investigate any abnormality. Our security will respond to any identified threat to neutralize the attack.

6. Train your users

We will train your users to adopt safer computing habits and to report abnormalities to our security team.

7. Adapt

We constantly adapt our approach as the threats and security tools evolve. We will also adapt based on the experiences of our peers. We meet with other companies like ours in different markets across North America to share best practices every quarter.

Simon Marcil


How do you protect me against email attacks (fraud, phishing, etc..)?

Emails are one way or another part of most cyber-attacks because they work. Attackers will use a well-crafted email to steal a user’s password by tricking them into entering it into a fake site or will impersonate the CEO to try get a fraudulent wire transfer authorized. Protecting your email is essential.

The first thing we do is stop email threats from getting to your users. We achieve this by deploying a leading cloud email security platform. It will stop all emails that contain malicious files as well as ensure that all links in the email are safe. Additionally, emails that are designed to impersonate someone from your company either by using the same name as a colleague or a similar domain (example: s3ttech.ca instead of s3tech.ca) will be blocked.

The second things we do is to educate your users on safer computing habits. We also expose them to the latest tactics used by attackers with phishing simulation emails to keep their reflexes sharp.
Finally, we deploy our set of advanced security tools on your users’ computers and devices which will alert us if anything goes wrong. This way if ever an email threat does make it through our defences to a user, our security team will immediately investigate and remediate the situation.

Simon Marcil


How do you protect my backups?

We have developed a backup security standard to keep backups safe from attackers who will look to compromise them in a ransomware attack. We built our standard with the assumption that the network will be breached and that the attackers will obtain admin rights. Therefore, we completely segregate the backups from the network and put in place their own authentication. Our offsite backups also have ransomware protection built-in which allows for recovery if ever they were to be deleted. Our backup standard withstood penetration testing by multiple specialized security firms. We adapt our backup security standards constantly as the attackers change their tactics.

Simon Marcil


Should I get cyber insurance? If so, how can you help?

Yes, you absolutely should. Unfortunately, even though we are very confident in our abilities to protect you against cyber attacks, nothing can be 100% secure. Insurance is an important part of your response plan.

The security standards that we deploy will make sure that you will be insurable, and we will help you answer all the questions the insurers will have, and they will have a lot. We can also help validate that the proposed coverage makes sense for your business.

Vincent Rabbat

Vice-President, operations

Managed IT Services

What resources do you assign to my account?

Our goal is to offer a personalized service to all users. We do this by assigning a team to each client which includes:

Account Manager: is the main point of contact. He is responsible for ensuring the proper delivery of all services.

Technical Advisor: works with the account manager to translate business needs into solutions which align with the client objectives. The TA has excellent technical knowledge and is a good communicator. The TA is the technical point of contact.

Remote Support Team: our support team is divided in smaller teams of 5 to 7 technicians each that remotely support all users by phone or by email. This way users always interact with the same group of people who know them and their environment.

Onsite Support Technician: the technician that goes onsite when needed or requested.

Marc Perras

Vice-President, Sales

Do you monitor 24/7?

Yes we do! Over the years we have built up our staff overseas which enables us to offer true 24/7/365 coverage for our clients. We now have over 15 people working in Europe and in Asia.

Vincent Rabbat

Vice-President, operations

How does your 24/7 emergency support work?

Users calling outside of helpdesk hours (7am to 7pm Monday to Friday) will be invited to leave a message for an emergency. They will get a call back within 15 to 30 minutes.

Vincent Rabbat

Vice-President, operations

How does your support work?

We offer direct, quick, and personalized helpdesk as well as onsite support to users.

We assign a team of 5 to 7 helpdesk technicians to a client. This way users always speak to the same group of technicians who know their environment. Our technicians will answer all calls from users directly from 7am to 7pm Monday to Friday. Over 80% of calls are answered within 2 minutes. We also have a 24/7 emergency support where users will receive a callback from a technician within 30 minutes.

We set up a dedicated support portal that provides your users with the ability to instantly communicate with a technician via chat or schedule an appointment at their convenience. In addition, this portal, which is also accessible in Microsoft Teams, contains how-to guides and personalized help resources designed specifically to meet the needs of your users, allowing them to benefit from a comprehensive and tailored support experience.

Additionally, users can also email our support via an email address configured on their domain, for example: support@yourdomain.ca.

We also offer onsite support. It ranges from going onsite when it’s needed to resolve an issue to going onsite a couple times a month, to a couple times a week, and even full time in some cases. We are very flexible with this and adjust to our clients changing needs pretty much on the fly.

We constantly improve our service from feedback we get from users. We have a survey included with every intervention making it easy for users to give us their valuable feedback. Our service managers will plan a call with any user that had a negative experience. The goal is to first apologize, and then to understand what happened so we can ensure it does not reoccur. We also conduct an annual survey to all users to track the progression of user satisfaction.

We regularly review user incidents to identify and fix recurring issues.

We are not perfect, and unfortunately, we do make mistakes. But we are absolutely committed to constantly improve our service and give the best experience for all our users!

Marc Perras

Vice-President, Sales

Co-Managed IT Services

What are Co-Managed IT Services?

Our Co-Managed IT Services are a collaborative partnership between your IT team and our team. This model is designed to augment and support your in-house IT team. Combining our resources, expertise, and capabilities with your internal team’s intimate knowledge of your business creates a powerful synergy that enhances your IT’s efficiency, security, and reliability.

Unlike our managed IT services, where we take full responsibility for your IT, co-managed IT allows for a more flexible approach. You decide which IT functions you want to keep in-house and which ones you’d like us to handle. This can range from specific tasks like 24/7 monitoring, cybersecurity, backup, and disaster recovery solutions to more comprehensive support such as help desk services, strategic planning, and project management.

  • The goal of co-managed IT services is to fill the gaps in your IT capabilities without the need to hire additional staff. This approach provides several benefits, including:
  • Expertise on Demand: Access to a wide range of specialized skills and industry-leading technologies without the associated costs of hiring more staff or investing in expensive training programs.
  • Scalability: The ability to easily scale IT support up or down based on your business needs, without the challenges of managing additional employees.
  • Enhanced Security: Benefit from our robust cybersecurity measures and expertise to protect your business from evolving threats.
  • Cost Efficiency: Optimize your IT spending by only paying for the services you need, when you need them, allowing for more predictable budgeting.
  • 24/7 Support: Ensure your business and IT systems are always running smoothly with round-the-clock monitoring and support, minimizing downtime, and improving business continuity.

We work together to make your IT more robust, resilient, and aligned with your business goals.

Simon Marcil


How do Co-Managed IT Services differ from Managed IT Services?

The main difference between co-managed and managed IT services lies in the level of involvement and control your business retains over its IT operations.


Our Managed IT Services are a complete outsourcing solution where we manage all aspects of your IT infrastructure. This includes day-to-day management, cybersecurity, and strategic planning, allowing you to focus on core business functions without the complexities of IT management. It’s ideal for businesses without an in-house IT team or those looking to free up internal resources.


Our Co-Managed IT Services, in contrast, are a collaborative approach designed to complement your existing in-house IT team. We provide additional expertise, resources, and tools to fill gaps, handle specific projects, or offer specialized skills your team might lack. This model maintains your internal control over IT operations while offering the flexibility to scale support as needed.


Key Differences:

  • Control: Co-managed services allow businesses to maintain greater control within their IT operations, whereas managed services are more hands-off, with our team taking full responsibility.
  • Flexibility: Co-managed IT provides tailored support to meet specific needs, making it highly flexible, while managed IT offers a comprehensive, all-in-one solution.
  • Target: Co-managed services are best for businesses with an existing IT team needing extra support, whereas fully managed services are suited for businesses looking to outsource their IT.

Marc Perras

Vice-President, Sales

Can we choose which IT tasks to keep in-house and which to outsource?

Absolutely! Our co-managed IT services model is built on flexibility and customization to meet your specific business needs. We understand that every one of our clients has unique requirements and capabilities, and our goal is to complement your in-house IT team.

Simon Marcil


What are your change management processes?

When it comes to making changes to the networks we manage, our approach is rigorous and structured to ensure security, reliability, and transparency. Here is our process:

Recurring Maintenance Windows: We establish recurring maintenance windows with each client in advance for all modifications. This allows us to plan for changes predictively, minimizing the impact on our clients’ daily operations.

Change Requests: We create a change request for each modification. This document describes the nature of the change, its potential impacts on the network, and a rollback plan if necessary. This step is crucial to ensure that all stakeholders fully understand the scope and implications of the proposed change.

Approval of Changes: No changes are implemented without prior approval. This approval process ensures that all changes are carefully reviewed and deemed necessary and safe before execution.

Change Log: We maintain a log of all changes made to the networks. This registry provides a complete history of changes, thereby improving transparency and cooperation.

Vincent Rabbat

Vice-President, operations

IT Projects

What kind of projects do you do?

At S3, we take on a wide variety of projects, everything from cloud migrations (Office 365 & Azure), cybersecurity enhancements, infrastructure upgrades, to managing office moves. We know how important your time and workflow are, which is why for each project, we assign a dedicated project manager to be your point of contact. They’ll navigate the project from start to finish, working within your schedule to ensure minimal disruption to your daily operations. Our team of about 20 experts is committed to providing a smooth and efficient experience, tailoring our approach to fit seamlessly into your work hours. It’s all about making the process as straightforward and stress-free for you as possible.

Marc Perras

Vice-President, Sales

Do you provide project managers for projects?

Yes! For every project, we allocate a dedicated project manager whose primary responsibility is to guarantee that we adhere to our timeline and budget. Working closely with the client on the planning of each task, our project manager ensures that disruptions are minimized, maintaining the smooth operation of your business throughout the project’s duration. Serving as your central point of contact, they manage all communications, ensuring that your needs and expectations are met.

Marc Perras

Vice-President, Sales

Can projects be scheduled outside regular business hours?

Absolutely! We get how crucial it is for your business to keep running without any hitches. That’s why we’re all about bending our schedules to fit yours, ensuring we keep any disruptions to an absolute minimum. When you kick off a project with us, we’ll pair you up with one of our project managers. They’re here not just to keep things ticking along on time and on budget, but also to work hand-in-hand with you. Together, you’ll map out the perfect plan for each task, aiming to slot them in at the most convenient times for you. Our goal? To make sure your operations stay as smooth as possible, no matter what we’re working on behind the scenes.

Simon Marcil


What types of projects does S3 specialize in?

At S3, our expertise spans a broad spectrum of IT projects. With a dedicated project team of approximately 20 skilled IT experts, we ensure personalized and efficient service for each client. Our portfolio includes:


  • Office 365 Migrations
  • Cybersecurity Enhancements
  • Infrastructure Upgrades
  • Office Relocations
  • Software Implementations
  • Networking Projects
  • SharePoint Migrations
  • Cloud Migrations to Azure
  • Computer and Laptop Upgrades
  • Network Redundancy Projects


As recognized experts in Microsoft, Dell, VMware, Cisco, and Fortinet technologies, we’re equipped to handle your IT projects

Simon Marcil


Contact Us


"*" indicates required fields

This field is for validation purposes and should be left unchanged.