Frequently Asked Questions

    Common questions about our services, how we work, and what to expect.

    General

    What does Volobyte do?

    We are an enterprise IT consultancy and Apple Technical Partner. We design, deploy, and manage IT infrastructure across five pillars: Identity & Access Management, Device Management, SaaS Procurement, Workflow Automation & IT Support, and Fractional CIO Services.

    How quickly can you start?

    Most engagements begin within 2 weeks. We send a scoping proposal within 48 hours of our first call and delivery starts the following week. If you can move fast, so can we. No drawn-out procurement cycles.

    Is Volobyte an Apple reseller?

    No. We are an Apple Technical Partner. We configure, secure, and manage Mac fleets using Kandji, Jamf, and Mosyle. We also manage Windows devices with Microsoft Intune. We do not sell hardware.

    Do we need to replace our existing tools?

    Almost never. We do not force migrations from Google Workspace to Microsoft 365 or push proprietary MSP software onto your team. We work with what you already use: Okta, Entra ID, Jamf, Intune, Google Workspace, Slack, and 200+ other vendors. If a change genuinely makes sense, we explain why first.

    What makes you different from a traditional MSP?

    Traditional MSPs lock you into their software stack, route everything through ticket queues, and rotate anonymous L1 engineers who do not know your environment. We work like an in-house IT professional you hired directly. Same engineers every engagement, tools chosen to suit your business rather than ours, and a focus on ticket reduction by sourcing simple, effective solutions rather than unnecessarily complex platforms that create more problems than they solve.

    What does a typical engagement look like?

    A 20-minute scoping call, a written proposal within 48 hours, and delivery starts the following week. We keep procurement cycles short, but you need to be ready to move quickly on your side too. No drawn-out vendor evaluations or months of back-and-forth.

    Do you only work with large companies?

    No. We work with companies of all sizes, from early-stage startups to enterprises with thousands of employees. For some services there are minimum engagement sizes, and we are always upfront about whether something is cost-effective at your scale. We would rather point you to a better-fit solution than sell you something you do not need.

    How much does it cost to work with Volobyte?

    It depends on scope. Device management starts from a few hundred pounds per month for small fleets. IAM projects are typically scoped as fixed-fee engagements. Fractional CIO services run on a monthly retainer. We publish transparent pricing on our services pages and always give you a clear quote before any work begins. No hidden fees, no surprise invoices.

    Should we choose Apple or Windows for our company?

    For most companies, Mac is the simpler, more scalable choice. macOS has a built-in security model that does not rely on complex Group Policy configurations, fewer driver compatibility issues, and a UNIX-based architecture that is inherently more stable for modern cloud-native workflows. Apple Business Manager combined with MDM tools like Kandji or Jamf makes fleet management straightforward at any scale. That said, we manage Windows fleets with Microsoft Intune too and never force a platform switch. If your team runs specialist software that requires Windows, we build around that. The right answer depends on your workflows, your team, and your existing infrastructure.

    Can't find your answer?

    Book a 20-minute call

    IAM & Access Management

    How long does a typical IAM rollout take?

    Most implementations take 4 to 8 weeks depending on the number of applications and complexity. We start with your most critical apps and expand from there.

    Do we need to replace our existing identity provider?

    Usually not. We implement and optimize Okta, Microsoft Entra ID, and Google Workspace identity. We never force a migration from one identity provider to another. If consolidation saves you money or reduces risk, we explain the trade-offs first.

    What happens when someone leaves the company?

    With proper lifecycle automation, access is revoked automatically when HR updates their system. No manual chasing, no orphaned accounts.

    Will this help us pass security audits?

    Yes. We deliver the controls and evidence documentation that auditors look for: access policies, admin registers, JML runbooks, and architecture diagrams.

    Device Management & Security

    What is MDM and why do I need it?

    Mobile Device Management (MDM) secures and manages all company devices centrally. Without it, you have no visibility into device security, can't enforce policies, and risk data breaches from lost or compromised devices.

    How does zero-touch deployment work?

    Devices ship directly to employees pre-configured through Apple Business Manager or Windows Autopilot. When they power on and sign in, policies, apps, and security settings apply automatically. No IT intervention needed. This works especially well with Mac, where Apple Business Manager ensures every device is enrolled before it even reaches the employee.

    Can you manage both Mac and Windows?

    Yes. We use the right MDM tool for each platform: Kandji, Jamf, or Mosyle for Mac, Microsoft Intune for Windows. Mac fleets are inherently simpler to manage at scale because macOS ships with strong default security, consistent hardware, and native MDM support through Apple Business Manager. Windows environments require more layered tooling to achieve the same level of control. We support both, but we are honest about where the operational efficiencies lie.

    Do you support both Apple and Windows devices?

    Yes. We manage Mac fleets with Kandji, Jamf, or Mosyle, and Windows devices with Microsoft Intune. That said, for most growing companies we recommend Mac. macOS requires significantly less endpoint management overhead than Windows: no complex Group Policy inheritance chains, no fragmented driver ecosystems, and Apple Business Manager makes zero-touch deployment seamless at scale. Whether you are 90% Mac or a mixed fleet, we build a unified device strategy around your actual needs.

    What happens when devices are lost or stolen?

    With MDM, you can remotely wipe company data within minutes. No more days of panic wondering what data was exposed.

    SaaS, Licensing & Vendor Control

    What exactly is SaaS management?

    SaaS management is the practice of discovering, tracking, and optimizing all the software subscriptions in your organization. It includes knowing what you have, who uses it, how much you spend, and eliminating waste from unused licenses, duplicates, and overprovisioned seats.

    Can you actually negotiate better rates?

    Yes. We negotiate with 200+ SaaS vendors regularly and know the discount structures, enterprise tiers, and timing strategies that work. Most companies pay sticker price because they don't know what's possible. We pass our rates through to you.

    How long does a SaaS audit take?

    A typical audit takes 2-4 weeks depending on the size of your organization and how your subscriptions are managed. We'll give you a complete inventory, savings opportunities, and a prioritized action plan.

    What about shadow IT and rogue purchases?

    Shadow IT (tools bought without IT approval) is one of the biggest sources of SaaS waste. We identify it during discovery and help you implement a procurement workflow that captures future purchases without slowing teams down.

    Workflow Automation & IT Support

    What does 'embedded IT support' mean?

    Embedded support means we work like an in-house IT professional your team hired directly. We attend your standups, learn your systems, and handle day-to-day IT without you needing to re-explain context. No ticket queues, no anonymous support agents, no offshore escalation.

    How quickly do you respond to issues?

    Critical issues get immediate response. Standard requests are typically handled within hours, not days. We agree SLAs upfront and stick to them.

    What can you automate with n8n?

    Common automations include user onboarding/offboarding, ticket routing, alert escalation, report generation, and integrations between tools that don't natively connect.

    How do you reduce IT tickets?

    Most IT tickets exist because of poor tool choices, missing automation, or overly complex setups. We source simple, effective tools that your team can actually use, automate repetitive requests like access provisioning and device setup, and fix root causes rather than just responding to symptoms. Our clients typically see ticket volumes drop significantly within the first few months.

    Can you support hybrid/remote teams?

    Absolutely. Most of our clients have distributed teams and we handle the majority of support remotely for speed. For hands-on work like office setups, hardware refreshes, or infrastructure projects, we provide onsite engineers in London at day rates. Both models work together.

    Fractional CIO & IT Strategy

    What exactly is a fractional CIO?

    A fractional CIO is a senior technology leader who works with your company part-time or on a project basis. You get executive-level strategic guidance without the cost of a full-time hire.

    Can you help us achieve SOC 2 or ISO 27001 compliance?

    Yes. We build the roadmap and implement the technical controls through our Access Management, Device Management, and IT Operations services. We prepare you for audit with gap analysis, control implementation, and evidence collection.

    How long does it take to become audit-ready?

    For SOC 2 Type I, typically 8-12 weeks if you're starting from scratch. Type II requires 6-12 months of operating controls. ISO 27001 varies by scope but usually 3-6 months to initial certification.

    Can you help with investor due diligence?

    Yes, this is a common use case. We prepare technology assessments for fundraising, help you answer investor questions about your tech stack, and can represent your company's technology capabilities in due diligence processes.

    Still have questions?

    Book a 20-minute call. We'll tell you what's broken and whether we can fix it.

    Book Free Call

    Or email us at hello@volobyte.com

    Cookie Preferences

    This site uses cookies for bookings and core features. Optional cookies help us improve your experience.

    Privacy Policy