Skip to main content

About Battice Systems

Independent managed security for small businesses and MSPs. We deliver documented, tested controls — not advice.

Small businesses deserve enterprise-grade security evidence

The gap in the market is not tooling. There are dozens of documentation platforms and monitoring solutions. The gap is the service layer — someone who actually does the work.

MSPs tell their clients to document their environments. Internal IT teams know they should be running phishing simulations. Small businesses buy cyber insurance without knowing whether their controls satisfy the questionnaire they just signed.

Battice Systems exists to close that gap with a predictable, remote service that produces written evidence a client can put in front of an insurer, an auditor, or an acquiring firm.

“Every small business deserves the same security controls that enterprise firms take for granted — documented, tested, and verifiable.”

Battice Systems — founding position

Operating principles

Evidence over assertion

Security controls only matter when they can be demonstrated. Every Battice Systems engagement produces written, dated, verifiable evidence — not policy documents that describe what should happen.

Documentation is the foundation

No security program survives a key person departure if nothing is written down. IT documentation is the prerequisite for every other control. We build it first.

Remote delivery, no installation theater

Managed security does not require an agent on every device to start. Tier 1 delivers meaningful improvement with no software deployment. Complexity is added when it is justified by client size and risk.

What we use

All primary tooling is open-source or commodity software with no proprietary lock-in. Clients retain full access to their data.

Wazuh

SIEM / EDR

Open-source endpoint detection and threat intelligence

GoPhish

Phishing Simulation

Phishing campaign management and reporting

OpenVAS / Greenbone

Vulnerability Scanning

Authenticated vulnerability scanning

ITGlue / Hudu

Documentation Platform

Structured IT documentation with client portals

Microsoft 365 Admin

Identity & Access

2FA enforcement and conditional access configuration

Google Workspace Admin

Identity & Access

2FA enforcement and security posture review

Responsible disclosure

If you discover a security vulnerability in Battice Systems infrastructure or client-facing systems, please report it to us privately before public disclosure.

We commit to acknowledging receipt within 48 hours, maintaining communication throughout the investigation, and crediting researchers who report valid findings (if desired).

Contact: security [at] batticesystems [dot] com

Ready to work together?

A 30-minute consultation determines fit and scopes the initial engagement.

Schedule a call