How we work: Discover. Assess. Architect. Implement. Operate.
A structured methodology that reduces risk, delivers clarity, and ensures nothing is missed.
Discover
Understand your goals, pain points, and constraints
Key Activities
- Stakeholder interviews with leadership, IT staff, and end users
- Document current state: devices, apps, network, security posture
- Identify compliance and regulatory requirements
- Map user workflows and critical dependencies
- Define success criteria and constraints (budget, timeline, risk tolerance)
Deliverable: Discovery report with findings, risks, and initial recommendations
Assess
Evaluate current architecture and identify gaps
Key Activities
- Technical audit of network, identity, MDM, backups, and security controls
- Vulnerability assessment and threat modeling
- Performance and capacity analysis
- Compliance gap analysis (ISO 27001, NIST, Privacy Act, etc.)
- Review of vendor contracts, licensing, and support agreements
Deliverable: Assessment report with prioritised gaps, risks, and remediation roadmap
Architect
Design the target state and migration path
Key Activities
- Design unified identity platform (cloud-based or open-source)
- Plan Apple MDM architecture (ABM/ASM, Jamf, ADE)
- Network and Wi-Fi design with segmentation and NAC
- Backup and disaster recovery architecture
- Security controls: MFA, device posture, conditional access, encryption
- Phased implementation plan with dependencies and rollback procedures
Deliverable: Architecture documents, network diagrams, and implementation plan
Implement
Build, configure, and deploy the solution
Key Activities
- Provision infrastructure (servers, network, cloud accounts)
- Configure identity platform and migrate users/groups
- Deploy MDM and enroll pilot devices
- Configure Wi-Fi, VLANs, and firewall rules
- Set up backup jobs and test restores
- Pilot with small user group, gather feedback, refine configuration
- Production rollout in phases with cutover checklists
Deliverable: Deployed system with documentation, runbooks, and user guides
Operate
Monitor, support, and continuously improve
Key Activities
- 24/7 monitoring of critical services (uptime, performance, security events)
- Incident response and troubleshooting
- Patch management and software updates
- User onboarding/offboarding automation
- Quarterly security reviews and vulnerability scans
- Capacity planning and performance tuning
- Ongoing optimisation based on usage patterns and feedback
Deliverable: Managed service with SLA, incident reports, and quarterly reviews
Our principles
Outcomes, not activity
We measure success by business results—not by hours billed or tickets closed.
Security by default
MFA, encryption, least-privilege access, and compliance should be non-negotiable from day one.
Documentation is delivery
Every implementation includes runbooks, diagrams, and knowledge transfer. No black boxes.
Test before deploy
Pilot groups, rollback plans, and tested disaster recovery—not "hope for the best."
Partnership, not vendor lock-in
We design for your independence. You own your systems, data, and decisions.
Engagement models
Ad-Hoc / Hourly
Pay-as-you-go consulting for troubleshooting, architecture reviews, second opinions, or short-term technical guidance. No long-term commitment required.
Rate: $165/hour + GST
Billing: Invoiced once job is complete
Project-Based
Fixed scope, timeline, and deliverables. Best for well-defined initiatives like MDM deployment, network upgrades, or identity migration.
Pricing: Custom quote based on scope
Typical duration: 4–12 weeks
Retainer / Managed Service
Ongoing monitoring, maintenance, and support with defined SLAs. Includes proactive management, patching, and incident response.
From: $2,500/month + GST
Typical commitment: 12-month agreement with monthly billing
Virtual CTO / CIO
Strategic advisory without the overhead of a full-time executive. Regular touchpoints for roadmap planning, vendor evaluation, and technology decisions.
From: $3,000/month + GST
Typical commitment: Quarterly planning sessions + on-call guidance
Hybrid
Combine project delivery with ongoing support. For example: implement a new identity platform (project), then manage it under a retainer.
Example: MDM implementation (custom quote) + Bronze retainer ($2,500/month + GST)
Common structure: Fixed-price project → monthly managed service
Ready to get started?
Let's discuss your goals and determine the right engagement model for your needs.