Collaborating with the best technologies

Carefully selected solutions for maximum productivity and safety. The technologies are recognized by the community as market leaders or serious challengers. It is very important to us to only recommend tools that offer you clear added value.

Endpoint management technologies

This is how we select

Endpoint Management & Security is not possible without Microsoft. The integration of the products is unbeatable and prevents cobbled together solutions at the expense of your cyber security. Microsoft Intune & MECM, Microsoft Defender and Microsoft Entra are our core technologies.

Our strategy from 15 years of endpoint management: Microsoft adds third-party tools with real added value. We have often added two to three competing tools to our portfolio in order to offer each customer the best individual solution.

Important: There is nothing we would rather prevent customers from buying expensive tools instead of working on their cyber hygiene.

  • Best of Suite and Best of Breed

  • Cyber Hygiene First

  • “Only tools with clear added value” Policy

  • Recognized as a market leader or challenger in the community

  • Carefully selected solutions for maximum productivity and safety

  • All tools

    All ads
    Thank you! Your submission has been received!
    Oops! Something went wrong while submitting the form.
    Case studies

    How Companies profit from our partnership

    01
    MECM+system hardening @ textile manuf.

    Managed MECM and system hardening for manufacturers of innovative textiles

    Manufacturing industry
    |
    >2,500
    staffs

    Challenge:

    • Small IT team needs specialized support to operate MECM
    • The team had recognized the importance of standard system hardening, but could not guarantee it themselves

    The solution:

    • Managed service for MECM with managed UEM and trouble shooting for international locations
    • Adapting the CIS standard to an individual environment
    • Regular system hardening as a service in accordance with CIS standards
    01
    Intune+system hardening @ game developer

    Intune Deployment and Managed Service Plus System Hardening for Game Developers

    Game development
    |
    >100
    staffs

    Challenge:

    • Customer was dissatisfied with the speed and expertise of the old service provider
    • Intune should be introduced and cyber security significantly improved

    The solution:

    • From the 1st Intune workshop to implementation and long-term support
    • Establishment and regular updates of security baselines,
    • Microsoft Defender for Endpoint Implementation and Managed Service
    • SOFTTAILOR as a new go-to partner
    01
    Patch Management @ Law Firm

    Patch Management as a Service for law firm

    Professional Services
    |
    >500
    staffs

    Challenge:

    • Customer wants to migrate to Intune
    • High importance of cybersecurity in a very sensitive environment
    • More than 200 applications must always be patched

    The solution:

    • Managed service for partially automated continuous updating of applications
    • Close integration into the vulnerability management process
    • Migrate software packages to Microsoft Intune
    01
    Software packaging @ Energy provider

    Application packaging aaS for energy suppliers

    energy supply
    |
    >1,500
    staffs

    Challenge:

    • Restructuring should separate the IT department and infrastructure from the existing
    • New IT department is being streamlined
    • The company is therefore unable to manage 350 applications itself

    The solution:

    • Application packaging aaSin close coordination with the internal IT department
    • Provision of a customer portal to view status
    • Considering high safety requirements
    Let's talk Endpoint

    The shortest path path to tools that truly matter

    Secure and productive endpoints in three steps.
    Learn what you need to do and how to get to more structure and secure and productive endpoints in the shortest possible way.
    1
    Free initial consultation

    We'll get to know each other and find out what's currently bothering you. You will get initial ideas on how we can help you.

    2
    Proposed solution & offer

    After the initial discussion, we will present you with a specific proposed solution and the offer for implementation.

    3
    Transposition

    Equipped with automation and best practices, our team implements the proposed solution in record speed.

    Your contact person:

    Your contact person:

    Dorian Garbe
    CEO
    blog

    Expert knowledge to go: 
Our latest blog posts

    Always a step ahead!

    We send IT decision makers and endpoint administrators hand-curated news, technical insights and practical tips about endpoint management & security that are not available anywhere else.