— Managed IT / SMB
Wi-Fi that works. Backups you’ve tested. Security that doesn’t rely on hope.
Running a business is hard enough without dead zones, ransomware scares, and printers that only work on Tuesdays. We handle IT so you don’t have to.
— What we cover
8 practice areas
- 01
LAN & Wi-Fi Networking
Reliable, secure networks that just work.
↓ - 02
Backup & Disaster Recovery
Sleep better knowing your data is protected.
↓ - 03
Cybersecurity
Stay ahead of threats with proactive security.
↓ - 04
Endpoint & OS Management
Consistent, secure devices for your team.
↓ - 05
Printers & Peripherals
Printers are terrible. We make them slightly less terrible.
↓ - 06
Helpdesk & Onsite Support
Fast, friendly IT support when you need it.
↓ - 07
Email & Collaboration
Microsoft 365 and Google Workspace done right.
↓ - 08
Licensing & Asset Management
Know what you have, what you pay, and when it expires.
↓
— 01 / LAN & Wi-Fi Networking
Reliable, secure networks that just work.
The pain
- − Slow, unreliable Wi-Fi with dead zones
- − Office moves become IT nightmares
- − No network segmentation (guests on your internal network)
- − Can’t prioritize critical traffic (VoIP, video calls)
The outcome
- + Stable coverage everywhere, including meeting rooms
- + Fewer “Wi-Fi not working” tickets
- + Secure segmentation (guest network isolated)
- + Consistent, fast speeds for all users
Approach
- • Site survey and heat mapping
- • VLAN segmentation and QoS
- • Controller-based Wi-Fi (Ubiquiti, Aruba, etc.)
- • Guest network with captive portal
- • Mesh/wireless backhaul where needed
- • Config backups and documentation
Deliverables Network map, device inventory, VLAN design, config backups, handover documentation
— 02 / Backup & Disaster Recovery
Sleep better knowing your data is protected.
The pain
- − Ransomware could wipe out everything
- − Accidental deletions with no way to recover
- − Backups that have never been tested
- − Don’t know how long recovery would take
The outcome
- + Fast RTO/RPO (back up in hours, not days)
- + Verifiable restores (we test quarterly)
- + Ransomware-resistant backups
- + Compliance-ready retention policies
Approach
- • 3-2-1 backup strategy
- • On-site NAS + cloud object storage
- • Immutable backups (ransomware-proof)
- • Scheduled restore tests (quarterly)
- • RTO/RPO planning per workload
- • Disaster recovery runbooks
Deliverables Backup policy document, runbooks, test logs, retention plan, recovery SLA targets
— 03 / Cybersecurity
Stay ahead of threats with proactive security.
The pain
- − Phishing attacks landing in inboxes daily
- − No MFA, shared admin passwords
- − Patches falling months behind
- − No idea what a breach would cost you
The outcome
- + Fewer incidents (phishing, malware)
- + Rapid containment when issues arise
- + Audit-ready posture (ISO 27001, SOC 2)
- + Team knows how to spot threats
Approach
- • EDR/antivirus deployment and monitoring
- • Patching SLAs (critical patches within 48h)
- • Email security (anti-phishing, SPF/DKIM/DMARC)
- • MFA/SSO rollout (Azure AD, Google, Okta)
- • Vulnerability scans and remediation
- • Security awareness training
Deliverables Baseline hardening checklist, incident response playbooks, monthly security reports
— 04 / Endpoint & OS Management
Consistent, secure devices for your team.
The pain
- − Every laptop is set up differently
- − Onboarding takes days, not hours
- − No central way to push updates or wipe a lost device
- − “My laptop is slow” tickets never end
The outcome
- + Consistent, secure device builds
- + Faster onboarding (hours, not days)
- + Fewer helpdesk tickets
- + Remote wipe if device is lost or stolen
Approach
- • Windows, macOS, Linux management
- • OS imaging and deployment automation
- • Mobile Device Management (MDM)
- • Patch management (OS and apps)
- • Disk encryption (BitLocker, FileVault)
- • Local admin controls and least privilege
Deliverables Golden image profiles, MDM configuration docs, device posture reports, onboarding checklists
— 05 / Printers & Peripherals
Printers are terrible. We make them slightly less terrible.
The pain
- − Jams, driver issues, mystery offline printers
- − No usage tracking or cost visibility
- − Scan-to-email never actually works
The outcome
- + Fewer “printer not working” tickets
- + Predictable printing costs
- + Print from anywhere (cloud printing)
- + Secure printing (release codes)
Approach
- • Network printer setup and configuration
- • Scan-to-email and scan-to-cloud
- • Print quotas and usage tracking
- • Driver management and updates
- • Maintenance scheduling (toner, repairs)
Deliverables Printer map, usage reports, maintenance schedule, driver packages
— 06 / Helpdesk & Onsite Support
Fast, friendly IT support when you need it.
The pain
- − “Who do I email when something breaks?”
- − No visibility into ticket backlog
- − Critical issues treated the same as password resets
The outcome
- + Clear expectations (no more “when will this be fixed?”)
- + Visible ticket backlog and status
- + Monthly reports (volume, resolution time, CSAT)
- + Fast escalation for critical issues
Approach
- • Channels: web portal, email, phone
- • P1 / P2 / P3 / P4 priority routing
- • SLA: P1 response in 15–30 min, resolution < 4h
- • Onsite visits in Romania and nearby regions
Deliverables Helpdesk onboarding guide, monthly ticket reports, CSAT surveys, escalation procedures
— 07 / Email & Collaboration
Microsoft 365 and Google Workspace done right.
The pain
- − Emails landing in spam folders
- − External sharing is a free-for-all
- − No retention policy, no legal hold capability
The outcome
- + Reliable email (no more “sent to spam” complaints)
- + Governed data (retention, legal holds)
- + Secure collaboration (external sharing controls)
- + Happy users (training and documentation)
Approach
- • Microsoft 365 and Google Workspace setup
- • Email migrations (on-prem or cloud-to-cloud)
- • Security baselines (SPF, DKIM, DMARC, MFA)
- • Retention policies and eDiscovery setup
- • DLP (Data Loss Prevention) rules
- • Teams / Meet / Zoom rollout and training
Deliverables Tenant configuration sheet, retention policies, security baseline checklist, training materials
— 08 / Licensing & Asset Management
Know what you have, what you pay, and when it expires.
The pain
- − Paying for seats nobody uses
- − Surprise license renewals and audits
- − No idea what hardware is out there
The outcome
- + Lower spend (stop paying for unused licenses)
- + Compliance-ready for audits
- + Proactive renewals (no surprise expirations)
- + Know what you have, where it is, who uses it
Approach
- • Hardware inventory (laptops, desktops, phones, tablets)
- • Software licenses (Microsoft, Adobe, Slack, etc.)
- • Warranty and support contract expiration tracking
- • End-of-Life and End-of-Support tracking
- • License optimization (unused seats, downgrades)
Deliverables Asset register, EoL/EoS reports, optimization recommendations, renewal calendar
— Pricing
Simple. Transparent.
No hidden fees. No surprise bills. Choose a tier that fits your team size and support needs.
Starter
Remote-first
€500+ /mo
- + Up to 10 users
- + Email & phone support
- + Business hours (9–5 CET)
- + Response: 4 hours
- + Remote troubleshooting
- + Basic security monitoring
- + Monthly reporting
★ Popular
Growth
Hybrid support
€1,500+ /mo
- + Up to 50 users
- + Priority support
- + Extended hours (8–6 CET)
- + Response: 2 hours
- + Quarterly onsite visits (Romania)
- + MDM & patch management
- + Security awareness training
- + Asset tracking
Business
Fully managed
€4,000+ /mo
- + Up to 200 users
- + 24/7 critical support
- + Response: 30 minutes
- + Monthly onsite visits
- + Dedicated account manager
- + Full endpoint management
- + Advanced security (EDR, MFA)
- + Backup & DR included
- + License optimization
All prices are starting points and depend on team size, complexity, and services included. Remote support across EU/UK; onsite available in Romania and nearby regions.
— FAQ
Frequently asked questions
01 What are your SLA response times?
What are your SLA response times?
Response times depend on priority and tier: • P1 (Critical): 15–30 minutes • P2 (High): 2–4 hours • P3 (Normal): Same business day • P4 (Low): 2 business days Resolution times vary by issue complexity but are tracked and reported monthly.
02 Do you only work with specific vendors?
Do you only work with specific vendors?
No. We’re vendor-neutral and work with your existing infrastructure (Microsoft, Google, Ubiquiti, Synology, etc.). We recommend solutions based on your needs, not vendor kickbacks.
03 Where do you provide onsite support?
Where do you provide onsite support?
We provide remote support across the EU and UK. Onsite visits are available in Romania and nearby regions (Hungary, Bulgaria, Moldova). For other locations, we can coordinate with trusted local partners.
04 What security standards do you follow?
What security standards do you follow?
We follow industry best practices including CIS Benchmarks, NIST frameworks, and GDPR compliance requirements. All our consultants are trained in security fundamentals, and we can help you meet compliance requirements (ISO 27001, SOC 2, etc.).
05 Who owns the data and credentials?
Who owns the data and credentials?
You do. Always. We document everything, use your credential vaults, and provide full handover docs. If you leave, you get everything — configs, passwords, runbooks, the works.
06 How long does onboarding take?
How long does onboarding take?
Typically 1–2 weeks. We audit your current setup, document everything, set up monitoring and ticketing, and train your team. You’ll have a dedicated onboarding call and a written runbook by week two.
07 What happens if we want to leave?
What happens if we want to leave?
No lock-in. Give us 30 days’ notice. We’ll do a clean handover: export all documentation, transfer credentials, train your replacement team or MSP, and ensure zero disruption.
08 Can you help with one-off projects?
Can you help with one-off projects?
Absolutely. Not ready for a monthly retainer? We offer project-based engagements for office moves, network refreshes, security audits, M365 migrations, and more. See our Solutions page for fixed-price packages.
— Next step
Stop worrying about IT.
Schedule a free 30-minute consultation. We’ll audit your current setup, identify quick wins, and show you exactly how we can help.