Sign in Register
// ARCHITECTURE

FIVE LAYERS. ONE PLATFORM.

The full technical breakdown of how we design, deploy, and operate the infrastructure that keeps your business online.

Designed to fail gracefully

Every component on this page is in place because of one design rule: no single failure should take you offline. That rule is applied at every layer — circuit, hardware, datacentre, region, vendor, and process. The result is an environment where individual failures are routine and recoverable, and end-users see them as a brief metric blip rather than an outage.

Below is each layer in detail: what we deploy, why, and how it interacts with the layers above and below it.

// OVERVIEW

OFFICE TO ARCHIVE.

Five layers. Each one independently monitored, redundant, and recoverable.

Edge & Access
Office and branch networks
Security
Identity, endpoint, detection
Private Core
Compute, storage, virtualisation
Replication
Multi-region, continuous
Air-Gap
Offline, immutable archive

Layer 1: Edge & access network

Every site — head office, branch, plant floor, retail location — is connected the same way: a managed firewall, a managed switching stack, and a managed wireless layer, all monitored and operated from a single 24/7 NOC.

What we deploy

  • Firewalls. FortiGate (most common) or Cisco — sized to the site, configured to a documented baseline. SD-WAN overlay where multiple circuits or remote sites are involved.
  • Switching. Cisco Catalyst, Meraki MS-series, or Aruba CX. VLAN-segmented by function (voice, data, guest, OT, IoT) with consistent naming across the estate.
  • Wireless. Cisco Meraki, Aruba Instant On, or Juniper Mist. RF surveys before deployment. Per-SSID policy mapped to the VLAN model.
  • Carriers. Carrier-neutral by default. Two diverse providers per critical site, with automatic failover.

Why this matters

The edge is where most incidents start — a circuit drops, an AP hangs, a switch port goes dirty. With a documented baseline and uniform vendor stack across sites, the NOC reproduces fixes once and applies them everywhere, instead of relearning each site individually.

Layer 2: Security

Security is not a layer you bolt on. It runs alongside every other layer, with controls at the perimeter, at identity, at the endpoint, and inside the network.

What we deploy

  • Endpoint detection & response. SentinelOne or CrowdStrike on every Windows, macOS, and Linux endpoint. Baseline policies tuned per environment; anomalies escalated to the SOC.
  • Identity protection. Conditional access, phishing-resistant MFA, privileged-access workstations for sensitive admin work, and continuous identity-risk evaluation against Microsoft Entra ID or Okta.
  • SIEM & log aggregation. Microsoft Sentinel or a hosted Elastic stack. Retention windows sized per the framework you are aligning to (90 days standard; 12 months for SOC 2 / HIPAA / CJIS environments).
  • Vulnerability management. Authenticated monthly scans, risk-ranked remediation, and patch orchestration with maintenance windows that do not collide with operations.
  • Email security. Microsoft Defender for Office or Proofpoint, layered with phishing-resistant MFA and quarterly simulated phishing.

Why this matters

Most organisations have most of these tools. What they do not have is the operational discipline to run them as a single program: alerts triaged in the same place, patches scheduled around real maintenance windows, identity policy actually applied, simulated phishing followed up. We provide that discipline.

Layer 3: Private compute & storage core

Workloads that benefit from private hosting — compliance-driven, latency-sensitive, cost-stable, or sovereignty-bound — run on our private infrastructure rather than in public cloud.

What we deploy

  • Virtualisation. VMware vSphere or Microsoft Hyper-V, sized with N+1 hardware redundancy. Hosts span multiple racks per cluster.
  • Storage. Enterprise SAN with synchronous replication between racks, snapshot retention sized to the workload's RPO target.
  • Datacentres. Carrier-neutral facilities. Locations are not published. N+1 power (UPS + diesel generators with 48-hour fuel), N+1 cooling, biometric access, 24/7 on-site engineering.
  • Hybrid. Site-to-site VPN or private interconnect into Azure, AWS, and Microsoft 365 tenants when the workload mix is hybrid.

Why this matters

Public cloud is the right answer for many workloads — but not all. Workloads with predictable utilisation, strict data sovereignty, or sustained high egress are routinely cheaper and more controllable on private infrastructure. We do not push you to one or the other; we run both.

Layer 4: Multi-region replication

Every production workload is replicated to a geographically diverse facility, on a schedule that matches its recovery-point target.

What we deploy

  • Continuous replication for tier-1 systems (the ones whose outage stops the business). RPO measured in minutes; failover measured in single-digit minutes.
  • Scheduled replication for tier-2 systems (important but not minute-by-minute). Hourly or daily, depending on the workload.
  • Cross-cloud replication for cloud-resident workloads. We do not assume one cloud's region failures cannot happen.
  • Failover testing. Quarterly. Tabletop, functional, and full failover exercises depending on the engagement tier. Reports go to your audit committee.

Why this matters

Replication you have never tested is just a pile of files. Documented quarterly tests are what turn the pile into a recovery plan you can defend to an auditor or insurer.

Layer 5: Air-gap archive

The last line of defence. A copy of your data that cannot be reached over the network — by ransomware, by a compromised admin account, or by us.

What we deploy

  • Immutable backup tier. Veeam-based, write-once-read-many at the storage layer. Cannot be modified or deleted within its retention window.
  • Optional offline media. Monthly encrypted snapshot shipped to your vault. A genuine air-gap copy you can produce in a courtroom if needed.
  • Documented retention windows. Per workload, signed off annually. No ambiguity about what exists, where, and for how long.

Why this matters

Modern ransomware attacks the backups before encrypting production. An immutable tier, plus an offline media option, plus tested restore procedures, is what separates a recoverable incident from a public breach disclosure.

Cross-cutting: 24/7 operations

All five layers above are operated, monitored, and reviewed by the same team — a US-based NOC and SOC, on rotation, with documented runbooks for the most common incident types and a quarterly review cycle for the documentation itself.

The combined effect is what we mean by "always on": individual components fail routinely and recoverably, the system as a whole stays available, and the documentation stays current to the day a control was last changed.

// WALKTHROUGH

WANT THIS MAPPED TO YOUR ENVIRONMENT?

A 30-minute scoping call. We sketch how each layer would look in your environment, with rough cost ranges. Under mutual NDA when it includes specifics.