
How we work: Discover. Assess. Architect. Implement. Operate.
A structured methodology that reduces risk, delivers clarity, and ensures nothing is missed—so you get predictable outcomes instead of surprise fire drills.
Discover
Understand your environment so we can design the right solution — no assumptions, no surprises.
Key Activities
- Stakeholder interviews with leadership, IT staff, and end users
- Document current state: devices, apps, network, security posture
- Identify compliance or regulatory expectations
- Map critical workflows and dependencies
- Define success criteria, constraints, and risk tolerance
Deliverable: Discovery report with findings, risks, and initial recommendations
Assess
Identify gaps, risks, and limitations before we change anything.
Key Activities
- Technical audit of network, identity, MDM, backups, and security controls
- Risk review and vulnerability assessment
- Performance and capacity analysis
- Compliance gap analysis (aligned with ISO 27001, NIST, Privacy Act, etc.)
- Review of vendor contracts, licensing, and support agreements
Deliverable: Assessment report with prioritised gaps, risks, and a remediation roadmap
Architect
Design a future-state environment that's secure, scalable, and fully documented.
Key Activities
- Design unified identity platform (Microsoft 365, Google Workspace, JumpCloud, or similar)
- Plan Apple MDM architecture (ABM/ASM, Jamf, ADE)
- Network and Wi-Fi design with segmentation and access controls
- Backup and disaster recovery architecture
- Security controls: MFA, device posture, conditional access, encryption
- Phased implementation plan with dependencies and rollback procedures
Deliverable: Architecture documents, network diagrams, and detailed implementation plan
Implement
Deploy with confidence using tested plans, pilots, and rollback pathways.
Key Activities
- Provision servers, network equipment, and cloud services
- Configure identity platform and migrate users/groups
- Deploy MDM and enroll pilot devices
- Configure Wi-Fi, VLANs, firewall rules, access controls
- Set up backup jobs and test restores
- Pilot rollout → feedback → refine configuration
- Phased production rollout with cutover checklists
- On-site in Christchurch and Canterbury when hands-on work makes the difference, with remote support for the rest
Deliverable: Fully deployed system with documentation, runbooks, and user guides
Operate
Keep everything running smoothly with proactive monitoring and ongoing improvements.
Key Activities
- Continuous monitoring of critical services (uptime, performance, security events)
- Incident response and troubleshooting
- Patch management and updates
- Automated user onboarding/offboarding
- Quarterly security reviews and vulnerability scans
- Capacity planning and performance tuning
- Ongoing optimisation based on real usage
Deliverable: Managed service with SLA, incident reporting, and quarterly reviews
Our principles
Outcomes, not activity
We measure success by business results—not by hours billed or tickets closed.
Security by default
MFA, encryption, least-privilege access, and compliance should be non-negotiable from day one.
Documentation is delivery
Every implementation includes runbooks, diagrams, and knowledge transfer. No black boxes.
Test before deploy
Pilot groups, rollback plans, and tested disaster recovery—not "hope for the best."
Partnership, not vendor lock-in
We design for your independence. You own your systems, data, and decisions.
Engagement models
Project-Based
Fixed scope, timeline, and deliverables. Ideal for MDM deployments, network upgrades, identity migrations, and similar initiatives.
- • Transparent fixed-price quote
- • Typical duration: 2–8 weeks depending on complexity
Retainer / Managed Service
Ongoing monitoring, maintenance, and support with defined SLAs.
- • Proactive patching, monitoring, incident response
- • Simplified monthly cost
- • Month-to-month with 30 days\' notice
Best for: organisations that want ongoing care after a successful project.
Virtual CTO / CIO / CSO
Strategic technology leadership without full-time executive cost.
- • Monthly strategic sessions
- • On-call advisory
- • Roadmaps, vendor assessments, board-ready reporting
Hybrid Engagement
Combine project delivery with ongoing support.
Example: implement a new identity platform → transition to retainer.
Ready to get started?
Let's talk through your current environment, goals, and constraints, and recommend the right engagement model for your school or business—with clear next steps and no obligation.