§ 02 · Services · Five pillars · One root
05 / SEC

Digital
Security.

The basics, done right. Logins, backups, access, posture. The boring stuff that costs you the deal when the next buyer looks at it first.

§ 03 · What this is, concretely
FOUR WORKED PATTERNS
  1. 01
    Identity + access posture

    SSO across the stack. MFA enforced. Roles audited. Offboarding is a single action, not a checklist passed around by email.

  2. 02
    Backups that restore

    Backed up isn’t the same as restorable. We test the restore quarterly. The runbook is written. The recovery time is named, not assumed.

  3. 03
    Vendor + SaaS access review

    Who has the keys to what. Every quarter. Including the contractor you stopped working with eight months ago.

  4. 04
    Posture report for buyers

    The one-pager you hand to a buyer’s diligence team. Written before they ask. Updated when something changes.

§03B Pricing

TWO DOORS. NO LOCK-IN.

Build a hardening project outright, or run security as a managed service. Same posture, same playbook, two commercial shapes.

Same pricing on every pillar
01 / Custom Products You own it
From $1,500

Fixed-scope build. You own the code, the data, and the infrastructure. 50/50 deposit and delivery. One-time engagement. No upper band. A discovery call defines the scope.

What you walk away with
  • Source codeIn your repo. Your name on the license.
  • InfrastructureIn your cloud account. Your billing, your control.
  • Handoff docA runbook your next dev can read on day one.
  • Off-rampWritten before the on-ramp. No exit fees.
Let’s get you fitted
02 / Managed Services We run it
From $150 / mo

We run it. You don’t. Monitoring, sync, dashboards, reporting, and the patches when a vendor changes an API. Month to month. Cancel any month.

What runs while you sleep
  • MonitoringIf it breaks, you hear it from us first.
  • Patches & upgradesVendor API changes, library bumps, kept current.
  • Monthly digestWhat ran, what changed, what to watch.
  • CancellationOne month notice. No claw-back. Code stays yours.
Let’s get you fitted

Both doors include scoping. Neither requires a multi-year commitment. Same operators behind both.

§ 04 · The number that governs this pillar
512mo

to recover from a single key-person departure — and they take their access with them.

Source SHRM Society for Human Resource Management · 5–12 month recovery range
Why this pillar exists

Key-person risk is a security frame, not just a knowledge frame. When the person leaves, three things walk out with them: the knowledge, the credentials, and the approvals. Two of those are ours to fix.

See the full research picture
§ 05 · Proof in the field
ONE ENGAGEMENT · SAME ROOT
Commercial Real Estate

Six systems, one access map.

Before consolidation, access lived in six different admin panels and a shared spreadsheet of passwords. After: one identity layer, role-based, audited monthly.

This engagement addressed 5–12 months to recover from a single key-person departure — SHRM
6 → 1
Identity surfaces
30 d
Access review cadence
Engagement3G Healthcare Real Estate
PillarsSecurity · Integration
§ 06 · Frequently asked
FOUR QUESTIONS · STRAIGHT ANSWERS
Q.01 Is this SOC 2?

We’ll get you ready for it if that’s where you’re going. Most mid-market businesses we work with need the underlying posture first — identity, backups, access — before they spend on the audit. We do the posture; the audit is its own line item.

Q.02 What if our key person is the founder?

That’s the most common case. The fix is the same: we document the access, the approvals, and the institutional context, and we put it somewhere the next person can read. The founder stays. The risk leaves.

Q.03 Do you do incident response?

We do the prep. We don’t do live IR. We make sure that if something happens, the runbook is written, the backups restore, and you know who to call. We can recommend the people to call.

Q.04 How fast can a buyer see the posture?

After the first eight weeks, you have a one-pager that satisfies most mid-market diligence. After the second quarter, you have the artifacts behind it.

Why this matters See the cost of knowledge loss →

If this is the pillar that fits the symptom, we should talk before the next quarter starts.