Company
About Battice Systems
Independent managed security for small businesses and MSPs. We deliver documented, tested controls — not advice.
Mission
Small businesses deserve enterprise-grade security evidence
The gap in the market is not tooling. There are dozens of documentation platforms and monitoring solutions. The gap is the service layer — someone who actually does the work.
MSPs tell their clients to document their environments. Internal IT teams know they should be running phishing simulations. Small businesses buy cyber insurance without knowing whether their controls satisfy the questionnaire they just signed.
Battice Systems exists to close that gap with a predictable, remote service that produces written evidence a client can put in front of an insurer, an auditor, or an acquiring firm.
“Every small business deserves the same security controls that enterprise firms take for granted — documented, tested, and verifiable.”
Battice Systems — founding position
Methodology
Operating principles
Evidence over assertion
Security controls only matter when they can be demonstrated. Every Battice Systems engagement produces written, dated, verifiable evidence — not policy documents that describe what should happen.
Documentation is the foundation
No security program survives a key person departure if nothing is written down. IT documentation is the prerequisite for every other control. We build it first.
Remote delivery, no installation theater
Managed security does not require an agent on every device to start. Tier 1 delivers meaningful improvement with no software deployment. Complexity is added when it is justified by client size and risk.
Tooling
What we use
All primary tooling is open-source or commodity software with no proprietary lock-in. Clients retain full access to their data.
Wazuh
SIEM / EDR
Open-source endpoint detection and threat intelligence
GoPhish
Phishing Simulation
Phishing campaign management and reporting
OpenVAS / Greenbone
Vulnerability Scanning
Authenticated vulnerability scanning
ITGlue / Hudu
Documentation Platform
Structured IT documentation with client portals
Microsoft 365 Admin
Identity & Access
2FA enforcement and conditional access configuration
Google Workspace Admin
Identity & Access
2FA enforcement and security posture review
Policy
Responsible disclosure
If you discover a security vulnerability in Battice Systems infrastructure or client-facing systems, please report it to us privately before public disclosure.
We commit to acknowledging receipt within 48 hours, maintaining communication throughout the investigation, and crediting researchers who report valid findings (if desired).
Contact: security [at] batticesystems [dot] com
Ready to work together?
A 30-minute consultation determines fit and scopes the initial engagement.
Schedule a call