Remote IT and cyber control for UK SMEs, with clear monthly pricing.
Secure devices, support users, manage joiners and leavers, and build Cyber Essentials-ready foundations without onsite overhead or enterprise complexity.
What is included
The core components of our managed service. No bloated add-ons, just the essentials for a secure, operating business.
Managed Devices
Clear visibility of every device in your company. Machines are configured, encrypted, and tracked from the day they are issued to the day they are returned.
Endpoint Security & Patching
Secure by default. OS and application updates stay visible so you do not have to chase people to restart their machines.
Onboarding & Offboarding
A consistent, documented process for movers, joiners, and leavers. Access is granted properly on day one and revoked when someone moves on.
M365 / Google Workspace
Practical support for your core productivity suite, including role-aware access, MFA support, mailbox hygiene, and admin boundaries.
Monthly Security Reporting
Simple monthly reporting that shows actions closed, items to review, and the overall operating picture in plain English.
Helpdesk Support
Practical support for everyday IT issues. No ticketing black holes, just a clear pathway to help the team keep moving.
Clear commercial packages
Choose the plan that matches your current risk and support needs. Pricing scales by team size, includes built-in volume discounts, and is shown ex VAT.
Secure Device
For SMEs that want devices managed, patched, monitored, and reported on without bundled helpdesk.
Device management and monthly visibility without bundled helpdesk.
- Device inventory
- Patch management
- Endpoint protection status
- Encryption checks
- Monthly device report
- Joiner/leaver checklist
- No bundled helpdesk
- Support can be purchased through add-ons or hourly remote support.
Secure Support
For SMEs that want secure devices plus fair-use remote IT support.
The main plan for secure devices and practical remote IT support.
- Everything in Secure Device
- Fair-use remote IT support
- M365 / Google Workspace user support
- Joiner/leaver support
- Monthly support summary
- Quarterly review for 20+ users
- Project work, complex migrations, major incidents, specialist software support, and out-of-hours work are billed separately.
Secure Complete
For SMEs that want Cyber Essentials-aligned foundations, stronger evidence, and quarterly security review.
Secure Support plus Cyber Essentials readiness, evidence, and review rhythm.
- Everything in Secure Support
- Cyber Essentials readiness tracker
- Five-control mapping
- M365 / Google hardening review
- Baseline vulnerability review
- Backup visibility where tooling supports it
- Quarterly security review
- Certification fees and formal assessment are separate unless explicitly included in a proposal.
How it works
A structured onboarding process that brings order to your IT without disrupting your business.
Setup & Alignment
We agree on your package, set up the billing, and understand your current devices and access points.
Baseline
We deploy management tooling, bring devices toward a known standard, and enable the essential protections agreed in your plan.
Onboarding
We map your new starter and leaver processes so access is handled smoothly without slowing operations.
Monthly Rhythm
Devices are reviewed, updates are monitored, and issues are handled. Every month, you receive a clear IT health report.
Support without giving up control.
We believe in clear administrative boundaries. You own your systems; we provide the support, visibility, and tooling to keep them secure. Every change is documented, and offboarding is always simple.
Client-owned systems
You retain ownership of your tenant and primary admin accounts.
Agreed access boundaries
We only access what is necessary to support and secure your team.
Documented changes
Every configuration change is logged and reported.
Clear offboarding pathway
If you leave us, we hand over cleanly. No lock-in.
The IT Health Command Centre
We monitor your fleet, queue patch actions, and handle access changes from a single, calm viewpoint. No messy spreadsheets or unmanaged sprawl.
Lifecycle Rail
Current month activity
October Review
- Reviewed operating system updates across the fleet
- Completed two standard offboarding actions
Evidence Notes
Administrative actions are logged and ready to review
FAQ
Questions before you hand over the IT noise.
Clear answers for teams comparing managed IT support, setup control, and commercial fit before booking a call.
Still checking fit? Book a call.Service & support
Managed IT support usually covers the day-to-day running of your business IT: user support, device visibility, Microsoft 365 or Google Workspace administration, onboarding, offboarding, patching oversight, access management, and regular reporting. The exact scope should be confirmed in your package before work starts.
Kindura can support businesses using Microsoft 365 or Google Workspace for everyday administration, access, security settings, and user changes. The setup process confirms which platform you use, how it is currently configured, and what level of administration is included in your package.
Kindura helps make onboarding and offboarding more consistent. That can include setting up accounts, assigning access, preparing devices, removing access when someone leaves, and documenting the process so it does not rely on memory. The exact steps depend on your systems and agreed package.
In many cases, yes. Kindura first reviews your current tools, licences, devices, and workflows before recommending changes. Some tools may be kept, some may need better configuration, and some may be replaced if they create risk or unnecessary complexity.
Kindura is remote-only by design. Onsite visits, cabling, office fit-outs, physical printer installation, hardware repair, licence costs, deep forensic incident response, major projects, specialist software support, and out-of-hours work sit outside the standard package unless agreed separately.
Secure Complete supports Cyber Essentials readiness across the five controls: firewalls, secure configuration, user access control, malware protection, and security update management. Certification fees, formal assessment, Cyber Essentials Plus, and pass outcomes are separate from readiness work.
Setup & control
Yes. Your business should keep ownership of its tenant, data, domains, devices, and primary admin accounts. Kindura works through agreed access boundaries so support is practical without taking control away from the business.
Setup starts by understanding your users, devices, Microsoft 365 or Google Workspace tenant, access points, and current IT process. From there, Kindura can agree the baseline, document the setup route, configure agreed tooling, and bring users and devices into a clearer operating rhythm.
Start with a setup call. Kindura will confirm how many people you have, what devices they use, whether you run Microsoft 365 or Google Workspace, what problems you want solved, and whether you need a light baseline or fuller managed support.
Commercials & fit
Pricing is per named user/month, ex VAT, with Secure Device, Secure Support, and Secure Complete tiers. One primary laptop or desktop is included per named user. Extra devices, remote onboarding, add-ons, VAT, and exclusions are confirmed before work starts.
A good managed IT service should include a clean handover route. That means documenting key admin information, removing Kindura access where appropriate, handing back relevant records, and helping avoid unnecessary lock-in. Commercial notice periods and handover tasks should be confirmed in the agreement.
Kindura may suit very small businesses that have outgrown informal IT, especially where the team has several devices, shared systems, remote working, or regular joiners and leavers. If the business has one or two people and simple needs, a lighter setup or one-off advice may be more appropriate.