Scope of our services
Device Management
Endpoint Protection
Identity Protection
Virtual desktop
Automation
Work Anywhere
Compliance
Enterprise Voice
Architecture
We work with our clients to develop the architecture for any or all of these, through a process of discovery, workshops, presentations and discussions. The architecture defines how the parts fit together, for example:
- Zero Trust architecture, work securely from anywhere with strong user and device identity
- Cloud-first architecture, with on-premises integration where necessary
- Endpoint architecture combining security and ease of use.
Engineering
The engineering defines the exact configurations that achieve the required objectives, for example:
- Device configuration profiles, compliance policies, scripts
- Device enrollment
- Endpoint protection: AV, Encryption, Attack Surface Reduction, hardening
- M365 Apps policies
- Conditional Access policies
- Application Control
- Management of administrator identities and devices
- SharePoint and Exchange configuration, hybrid design and migrations
- Sensitivity labelling and Data Loss Prevention
- Teams, Teams Voice, Direct Routing of PSTN, videoconference integration
Problem Resolution
We specialise in investigating and resolving difficult problems in enterprise workplace infrastructure. These arise typically when products from different vendors are integrated.