Scope of our services

Device Management

Endpoint Protection

Identity Protection

Virtual desktop


Work Anywhere


Enterprise Voice


We work with our clients to develop the architecture for any or all of these, through a process of discovery, workshops, presentations and discussions. The architecture defines how the parts fit together, for example:

  • Zero Trust architecture, work securely from anywhere with strong user and device identity
  • Cloud-first architecture, with on-premises integration where necessary
  • Endpoint architecture combining security and ease of use.


The engineering defines the exact configurations that achieve the required objectives, for example:

  • Device configuration profiles, compliance policies, scripts
  • Device enrollment
  • Endpoint protection: AV, Encryption, Attack Surface Reduction, hardening
  • M365 Apps policies
  • Conditional Access policies
  • Application Control
  • Management of administrator identities and devices
  • SharePoint and Exchange configuration, hybrid design and migrations
  • Sensitivity labelling and Data Loss Prevention
  • Teams, Teams Voice, Direct Routing of PSTN, videoconference integration

Problem Resolution

We specialise in investigating and resolving difficult problems in enterprise workplace infrastructure. These arise typically when products from different vendors are integrated.