Frequently Asked Questions
General
What is a Managed Services Provider (MSP)?
An MSP is a company that takes over the ongoing management, support, and security of your IT systems, so your business can focus on its core activities.
How does working with an MSP differ from having internal IT staff?
An MSP provides a full team of specialists with broad expertise and proactive monitoring — often at a lower cost than maintaining a full in-house IT department.
What are the benefits of outsourcing IT to a Managed Services Provider?
Outsourcing improves reliability, reduces downtime, strengthens security, ensures compliance, and gives you predictable IT costs with access to experienced professionals.
What services are typically included in a managed IT agreement?
Services usually include IT support, system monitoring, patching, backup, cybersecurity, user management, cloud services, and IT strategy.
Can we choose which services to outsource and which to keep in-house?
Yes. Our services are modular and flexible — you can outsource specific areas to us while keeping other areas in-house or with another provider.
How do you tailor your services to our specific business or industry?
We begin with a detailed discovery process to understand your goals, challenges, and compliance needs, and then customize a service plan accordingly.
Do you support both Windows and macOS environments?
Yes. We provide full support for both Windows and macOS systems, as well as mobile devices and mixed environments.
Are your services suitable for small or medium-sized businesses?
Definitely. We specialize in scalable solutions designed to meet the needs and budgets of small and medium-sized enterprises.
What industries do you have experience working with?
We serve clients in finance, legal, manufacturing, healthcare, tech startups, and more — including those with strict compliance requirements like DORA or GDPR.
How do you stay up to date with the latest security threats and technologies?
We continuously monitor threat intelligence sources, attend industry trainings, and apply the latest best practices to ensure your systems stay protected and up to date.
Onboarding and Transition
What does the customer onboarding process look like?
Onboarding starts with an introductory meeting to understand your business, followed by a detailed discovery phase, technical assessment, and implementation of our services based on a tailored plan. You can find the details here.
How quickly can we transition to you?
Most transitions can begin within a few days, in urgent cases even on the same day. The full process depends on the complexity of your environment but is typically completed within 2–4 weeks with minimal disruption.
Will there be any downtime during the transition?
No — or only minimal, carefully planned downtime. We aim for a seamless transition without disrupting your daily operations.
Can you take over from our current IT provider?
Yes. We manage the handover professionally and can coordinate directly with your existing provider to ensure a smooth and conflict-free transition.
What information do you need from us to get started?
We’ll need basic technical documentation, access credentials, an overview of your infrastructure, and a list of users and systems. We’ll guide you step-by-step through the process.
Service Delivery and Operations
What happens when we submit a support ticket?
Your ticket is immediately logged and triaged by our system. A technician is assigned based on priority and urgency, and you’ll receive updates throughout the resolution process.
Do you offer remote and on-site support?
Yes. Most issues can be resolved remotely, but we also offer on-site support where required — either directly or through local partners.
How fast is your typical response and resolution time?
We respond to most tickets within 15–60 minutes, depending on severity. Resolution time varies, but many issues are resolved the same day.
What are your support hours and do you offer 24/7 service?
Our standard support hours are weekdays from 08:00 to 18:00. 24/7 support is available for customers with premium or critical infrastructure contracts.
What is your process for handling IT incidents or outages?
We prioritize rapid containment, root cause analysis, and communication. A structured incident response plan ensures minimal impact and fast recovery.
Can we escalate critical issues if needed?
Yes. Critical issues can be escalated at any time. We offer dedicated escalation paths and clearly defined SLAs for urgent situations.
How do you monitor our systems and networks?
We use continuous monitoring tools to track system health, availability, and security in real time, allowing us to respond proactively to any issues.
Will we get regular reports or updates on our IT environment?
Yes. In addition to a customer dashboard which provides the most important metrics about your infrastructure in real time, we also provide detailed monthly or quarterly reports with system status, support activity, security posture, and recommendations for improvement.
How do you handle patch management and software updates?
We generally apply security patches and software updates with high priority, balancing risk and stability. Critical patches can be applied immediately when needed. Patches for business critical infrastructure are tested for regressions before they are applied.
Do you provide a single point of contact for our business?
Yes. Each client has a dedicated account manager or primary contact to coordinate service delivery, communication, and strategic planning.
Security
How do you protect our business from cyber threats?
We implement layered security controls including firewalls, endpoint protection, patch management, application whitelisting, principle of least privilege, encryption, threat detection, and continuous monitoring — backed by proactive incident response capabilities.
Do you offer cybersecurity awareness training for staff?
Yes. We provide structured training programs to help your staff recognize phishing, social engineering, and other common cyber threats — available in multiple languages.
Can you help us with GDPR or other regulatory compliance?
Absolutely. We support GDPR, DORA, ISO 27001, and industry-specific regulations through technical measures, documentation, data mapping, and risk-based controls.
Do you provide vulnerability assessments or penetration testing?
Yes. We offer scheduled vulnerability scans and work with specialized partners to deliver in-depth penetration testing where required.
Our business falls under the DORA regulation — do you offer ICT-supplier contract amendments?
Yes. We provide DORA-aligned contractual language and can include specific ICT third-party provisions tailored to your compliance requirements. We will assist you with determining whether the service we provide to you is classified as critical/important under DORA.
How do you handle data privacy and confidentiality?
We apply strict access controls, encryption, logging, and internal policies to ensure all customer data is protected in line with legal and contractual obligations.
Can you help with ISO 27001 implementation or certification?
Yes. We assist with implementation, documentation, risk assessments, SoA development, and audit preparation.
What is your incident response process in case of a data breach?
We follow a documented process that includes detection, containment, analysis, notification (To internal and external stakeholders) and remediation — ensuring quick recovery and minimal business impact.
Infrastructure and Cloud Services
Do you manage on-premise servers, cloud infrastructure, or both?
We support both on-premise and cloud-based infrastructure, including hybrid setups. Our team can manage and optimize whichever environment best suits your needs.
Do you offer private cloud solutions?
Yes. Our Private Cloud services are hosted in ISO 27001–certified data centers located in Luxembourg, offering full data sovereignty and tailored infrastructure for your needs.
Can you support hybrid IT environments?
Absolutely. We specialize in hybrid setups that combine on-premise systems with cloud services, ensuring seamless integration and unified management.
Do you help with Microsoft 365 or Google Workspace setup and management?
Yes. We provide full support for both Microsoft 365 and Google Workspace — including setup, migration, user management, licensing, and security.
What kind of backup and disaster recovery solutions do you offer?
We offer secure, automated backups and tailored disaster recovery plans — whether for on-premise servers, cloud infrastructure, or hybrid environments.
Do you support virtualization and remote desktop environments?
Yes. We support and manage virtualized environments using platforms like Proxmox, Hyper-V, and VMware, as well as secure remote desktop solutions.
Can you migrate us from our existing IT infrastructure?
Yes. We handle migrations from legacy systems, other providers, or cloud platforms — carefully planned to minimize downtime and avoid data loss.
Private Cloud
What is a Private Cloud and how is it different from Public Cloud?
A Private Cloud is a dedicated IT environment exclusively for your organization — offering more control, security, and data sovereignty compared to shared Public Cloud platforms.
Where is your Private Cloud infrastructure located?
Our Private Cloud is fully hosted in ISO 27001–certified data centers in Luxembourg, ensuring compliance with EU regulations and protection from non-EU data access laws.
What are the benefits of using your Private Cloud?
You get guaranteed data residency, full control over your environment, tailored performance, and enhanced security — ideal for regulated industries and privacy-focused businesses.
Can we run our own software or workloads in your Private Cloud?
Yes. You can host custom applications, virtual desktops, file servers, or even AI models — fully managed or self-managed, depending on your needs.
Is your Private Cloud scalable as we grow?
Absolutely. We scale resources quickly based on your growth, whether you need more CPU, RAM, storage, or high-availability clusters.
Private AI
What is Private AI and how does it work?
Private AI allows you to use powerful AI tools — such as large language models and document automation — within a secure, self-hosted environment that keeps all data under your control.
Why choose Private AI instead of public AI platforms?
With Private AI, none of your data is sent to external providers. This ensures full confidentiality, GDPR compliance, and better control over how AI is used within your business.
What types of AI services do you offer?
We offer document processing, summarization, workflow automation, and custom model integration — all hosted in our Luxembourg-based Private Cloud.
Can you integrate Private AI into our existing systems?
Not at all. We handle setup, integration, and training. You’ll get user-friendly tools and guidance on how to benefit from AI safely and effectively.
Workflow Automation
What is Workflow Automation?
Workflow Automation uses software to streamline repetitive tasks — such as approvals, email routing, data entry, or reporting — so your team can focus on what really matters.
What tools or platforms do you use for automation?
We work with tools like n8n, Activepieces, Microsoft Power Automate, and custom scripts — hosted securely and fully integrated with your existing systems.
Can you automate processes in our industry-specific applications?
Usually yes. Whether you’re using industry ERPs, CRM tools, or legacy systems, we can often build custom connectors to automate critical workflows.
How do you ensure security in automated workflows?
We follow secure-by-design principles — ensuring all workflows are logged, access-controlled, encrypted, and hosted within our secure infrastructure.
What are common use cases for automation?
Examples include automated invoice processing, employee onboarding, data syncing between apps, scheduled reports, and AI-assisted document review.
Strategic IT and Projects
Can you help us with IT strategy and planning?
Yes. We work closely with your leadership team to align IT with your business goals — covering infrastructure, budgeting, scalability, risk, and compliance planning.
Do you offer project-based services like migrations or upgrades?
Absolutely. We handle one-off projects such as cloud migrations, system upgrades, infrastructure redesigns, and office moves — either standalone or as part of a broader managed service.
Can you act as our virtual CTO or CISO?
Yes. Our Virtual CTO/CISO services provide strategic guidance, risk management, and security leadership — ideal for organizations that need executive-level expertise without a full-time hire.
Do you provide IT audits or assessments?
Yes. We offer comprehensive IT assessments, covering infrastructure, cybersecurity, compliance gaps, and operational risks — with clear recommendations and executive reporting.
How do you support our business as we grow or scale?
We design scalable solutions that grow with you — adding capacity, automating workflows, and ensuring your IT strategy evolves to meet new demands and regulatory requirements.
Compliance
Can you help us meet our regulatory compliance obligations?
Yes. We support compliance with GDPR, ISO 27001, DORA, and other frameworks by providing the technical implementation and controls, documentation, and advisory needed to meet regulatory expectations.
Can you help prepare for an ISO 27001 or SOC 2 audit?
Yes. We assist with readiness assessments, gap analysis, risk registers, SoA documentation, and implementation of necessary controls — based on real certification experience.
Do you provide data protection support under GDPR?
Yes. We help with data mapping, processor agreements, ROPA documentation, technical measures, and secure data handling practices to support full GDPR compliance.
Can you support compliance reporting and documentation?
Yes. We maintain structured documentation for you and generate compliance reports, audit logs, and registers needed for internal and external reviews.
Can you help assess the compliance of our IT suppliers?
Yes. We evaluate your third-party providers from a compliance and risk perspective and can support due diligence and contract reviews.
Governance
What does IT governance mean in the context of your services?
IT governance ensures your IT aligns with business objectives, regulatory requirements, and risk appetite — supporting strategic decision-making and accountability.
Do you help define roles and responsibilities within IT?
Yes. We help establish clear responsibilities for IT operations, security, and compliance—aligned with ISO 27001 and other best practices.
Can you provide governance policies or frameworks?
Yes. We offer templates and advisory for policies such as Acceptable Use, Incident Response, Vendor Management, and Change Control — customized to your context.
Do you help with risk management and reporting?
Yes. We assist with identifying, documenting, and tracking IT-related risks in structured registers, and we provide regular reporting to stakeholders and auditors.
Can you help us set up an internal control system for IT?
Absolutely. We design and help implement internal controls for change management, access control, asset tracking, and other key governance functions.
Do you work with Boards or Management on IT governance topics?
Yes. We can brief your leadership team, contribute to governance committee discussions, and support alignment between IT strategy and corporate oversight.
Contracts and Pricing
How is your pricing structured?
Our pricing is modular and based on the services you need — typically per user, per device, or per infrastructure component. We offer transparent, all-inclusive monthly rates.
Are your services billed monthly?
Most services are billed monthly, but we also offer quarterly plans or hybrid models, depending on your preferences and contract terms.
Do we need to sign a long-term contract?
No long-term commitment is required by default. However, discounted rates may be available for customers who opt for longer-term agreements.
What happens if we want to change or cancel our services?
We’re flexible. Services can be adjusted as your needs evolve, and cancellations can be made with notice in line with the agreement — typically 30 to 90 days.
Can you work under an SLA (Service Level Agreement) tailored to our needs?
Yes. We offer customizable SLAs that reflect your specific uptime, response, and resolution time requirements, especially for regulated or high-availability environments.
