Frequent questions.
Find answers to common questions about our services, our process, and our approach to enterprise transformation.
Security is designed on day one, not bolted on before audit. Every engagement starts with a threat model, identity-first access design, and a data classification plan — Zero Trust, Purview, DLP, PIM where relevant. Track record on regulated environments: Société Générale DWS, Banque de France, RTE.
Every engagement starts with a fixed-fee Discovery and a fixed-fee Sprint 0. You get a scored backlog, an architecture brief and a firm build quote before the real work begins. Scope changes are priced explicitly, never smuggled in. See the process.
No. Every engagement is delivered by a senior architect who also writes the code. No subcontractor chain, no offshore black box, no handoff losses. The person who scopes the work is the one who ships it.
Scoped migrations (tenant consolidation, Jive → SharePoint Online, SP 2013 → O365) typically span 6–18 months in regulated environments, delivered in phases with rollback checkpoints. Focused implementations (architecture spikes, security redesign, internal product MVP) run 4–12 weeks.
Four models: freelance day rate (plug into an existing team), fixed-scope package (defined deliverable), fractional advisory / fractional CTO (retainer), and managed run (post-delivery SLA). See the engagement models.
Yes — optional managed run with SLA. Governance, upgrades, security audits, performance optimization and incident response. Includes monthly service reports and quarterly roadmap reviews. Your team doesn't inherit an operational unknown.
Didn't find your answer?
Contact us