FAQ

Frequently Asked Questions

Everything you want to know about our support, security and delivery approach. Click a question to expand—or search below.

What makes Tech2 different from other IT providers?
We focus on outcomes, not just tools. Every engagement starts with your goals, risks and compliance needs, then we design a simple plan with success metrics, clear ownership and predictable costs. We’re vendor-agnostic—happy to work with what you already have—and we build security, documentation and handover into day one, so you’re never locked in. Our managed options include regular reporting and continuous improvement, not just break/fix. The result is a quieter estate, faster delivery and evidence that stands up to audit and the board.
Outcome-drivenSecurity-firstVendor-agnostic
How do you price your services?
We offer fixed-fee projects with clearly defined outcomes, time-and-materials for flexible tasks, and per-device or per-user pricing for managed services. During discovery we confirm scope, assumptions and risks, then provide a transparent quote with milestones, acceptance criteria and any optional add-ons (e.g., MDR, backup, EDR). No surprise invoices—changes follow a lightweight, pre-agreed process so you stay in control.
Fixed-feeT&MManaged
What response times do you guarantee?
SLAs are aligned to your operating hours and risk profile. We define priorities (P1–P4), target response and resolution windows, and communication standards. Our 24/7 option covers critical incidents outside business hours. You’ll receive monthly reports showing ticket volume, mean time to respond/resolve and user satisfaction—plus trend analysis and recommended improvements.
SLA24/7MTTR
How do you handle onboarding and handover from a current provider?
We run a structured transition: asset and access audit, critical service mapping, risk register, and communication plan. Where documentation is thin, we stabilise first (backups, monitoring, patching), then improve. Admin access is split with least privilege and break-glass controls. You’ll get a living runbook, credentials escrowed securely, and a clear RACI so everyone knows roles from day one.
PlaybooksRunbooksLeast-Privilege
Do you manage Fortinet and SonicWall firewalls?
Yes. We design HA architecture, implement IPS/AV/web filtering, tune policies to least privilege, and configure VPN (IPSec/SSL) with MFA. SD-WAN keeps branches responsive, while logs stream to SIEM for visibility. Firmware upgrades and rule reviews follow a maintenance schedule with back-out plans. Monthly reports highlight top talkers, blocked threats and recommended improvements.
FortinetSonicWallSIEM
How do you implement Microsoft Intune (MDM) without disrupting users?
We design your Intune tenant with role-based admin, then roll out Autopilot/ABM for zero-touch builds. Compliance policies and baselines harden devices; app packaging and update rings deliver software with minimal downtime. Conditional Access ties device health to identity, and Defender integration adds EDR. We pilot with a champion group, refine, then scale—backed by clear guides and handover.
Zero-touchComplianceDefender
What does your RMM (N-able) include—and will it slow down devices?
We deploy lightweight agents for health telemetry, proactive alerts and automated fixes. Policies by role ensure consistent patching for OS and third-party apps, with maintenance windows to avoid disruption. Remote support is secure and consent-based. We tune thresholds to reduce noise and measure impact during rollout; typical resource use is minimal and benefits (fewer incidents, faster MTTR) outweigh overhead.
PatchingAutomationRemote
How do you migrate to cloud without downtime or surprises?
We start with a landing zone (identity, networking, policies, logging, backup), then build a wave plan based on dependencies and business windows. Where possible we use blue/green or canary patterns; for lift-and-shift we schedule cutovers with back-out plans and DR coverage. Cost is managed via right-sizing, schedules for non-prod and tagging. If on-prem fits a workload better, we’ll recommend it.
AzureAWSGoogle Cloud
Which accreditations can you help us achieve?
We prepare you for ISO/IEC 27001, ISO/IEC 20000-1, ISO 22301, SOC 2 Type II, Cyber Essentials Plus and PCI DSS. That includes gap analysis, control design, documentation (policies, SoA, registers), evidence capture, internal audits and liaison with assessors. Our aim is practical controls that improve security day-to-day, with predictable audits and no last-minute scramble.
ISO 27001SOC 2PCI DSS
How do you protect data privacy and comply with GDPR?
We apply least-privilege access, MFA and logging across admin actions; encrypt data in transit and at rest; and follow documented change and incident processes. As a processor, we sign appropriate DPAs, respect data residency where required and minimise retention. We help you maintain RoPA, DPIAs and breach procedures, and we provide audit-ready evidence for your assessments.
GDPRMFAEncryption
No matching questions. Try “Intune”, “firewall”, “pricing”, “SLA”…
Still have questions? Let’s talk

Important links

Digital Transformation

Cyber Security

Software Development

Company

About Us

Career

Contact

hello@tech2consultants.co.uk

+44 7939 335697

© 2025 All rights reserved

This website uses cookies to provide you with the best browsing experience.

Accept
Decline