01 / Core security operations

The Security
Baseline™

"We secure your environment and keep it running." Core endpoint management, identity operations, backup management, and automated onboarding & offboarding — on a predictable monthly fee.

Book a Fit Call From €85/user/month

Our SLA guarantee

Miss any SLA commitment in a given month, and that month is free. We tie our revenue to our performance.

What it covers

Your security environment,
continuously managed.

The Security Baseline™ is for companies that have completed the Sprint and need their security program run — without adding a full-time internal security function.

Every endpoint is managed, every identity is monitored, every onboarding and offboarding is automated and documented. Monthly, you receive a security posture report showing the state of your environment. No surprises, no gaps falling through the cracks.

This is the right tier if you handle strategic security decisions internally (CTO-led) and need us to run the operational layer reliably.

Tier details

Pricing From €85/user/month
Minimum seats 30 users
Commitment 12-month minimum
Helpdesk SLA 8 business hours
Prerequisite Assessment or Sprint
Book a Fit Call Need compliance coverage? See The Compliance Engine™ →

Full scope

Everything included
in The Security Baseline™.

Identity & access

  • SSO & MFA enforcement (Entra ID / JumpCloud)
  • JML (joiner-mover-leaver) workflow management
  • Privileged access monitoring
  • Automated user onboarding & offboarding
  • Password manager management (1Password)

Endpoint & device

  • MDM — endpoint hardening & patching
  • Full disk encryption enforcement and monitoring
  • EDR monitoring & response (Huntress 24/7)
  • Asset lifecycle tracking
  • Software inventory and unauthorized app flagging

Network & email security

  • Network security & firewall management
  • DNS security & email protection
  • DMARC, DKIM & SPF configuration and monitoring

Backup & operations

  • Cloud backup management + monthly test restores
  • Security awareness training + quarterly phishing simulations
  • Helpdesk SLA — 8 business hours

Reporting & advisory

  • Monthly security posture report
  • Monthly CTO briefing call (15 min)
  • Annual security posture re-assessment
  • Patch compliance status
  • Endpoint coverage overview
  • Identity and access summary

When to upgrade

Move to The Compliance Engine™ when…

Trigger 01

You begin ISO 27001 or SOC 2

Certification requires evidence packs, access reviews, and audit support — none of which are in this tier.

Trigger 02

Security questionnaires arrive frequently

More than 2 questionnaires per quarter means you need structured compliance support, not ad-hoc responses.

Trigger 03

A security incident requires a post-mortem

Post-incident investigations, playbook updates, and formal incident response are included in The Compliance Engine™.

See The Compliance Engine™ →

Start with a
Security Assessment.

All managed engagements begin with a Security Assessment. Book a Fit Call — we'll confirm fit and scope the Assessment within one week.

Book a Fit Call
or
Take the free Security Snapshot

2 minutes · Zero commitment · Instant security grade