Workplace features

Device Mgmt

Identity Protection

Endpoint Protection




Cloud Network

Enterprise Voice


We do the architecture and engineering for any or all of these. The architecture defines how the parts fit together, for example:

  • Zero Trust architecture with strong user and device identity
  • Cloud architecture following NCSC Cloud Security principles
  • End user device architecture for desktop and mobile platforms


The engineering defines the exact configurations that achieve the required objectives, for example:

  • Autopilot W10 deployment
  • iOS Device Enrollment Programme (DEP)
  • Conditional Access policies
  • Device Configuration policies with ADMX-backed settings and custom OMA-URI settings
  • Application Control with MDAC
  • Device hardening with Microsoft Security Baseline
  • Windows Hello authentication
  • Credentials Guard with Secure Boot
  • Exploit Guard with Attack Surface Reduction
  • Power Automate and Azure Automation for new team creation in Teams