Productised Security Services

Practical security reviews for NZ businesses that need clear priorities.

Koru Security offers fixed-scope security reviews and advisory services for SMEs and technical teams. Get clear findings, practical recommendations, and a realistic path forward across Microsoft 365, architecture, and security planning.

Independent advice from a CISSP-certified security consultant.

Featured Offers

Focused services with a clear buying decision

Choose a review based on the problem you need solved, not a vague consulting category.

SME Security Health Check

A fast, low-friction review for NZ businesses that want to understand their biggest security gaps and what to do next.

From NZ$3,250 + GST
Best for: NZ SMEs with limited internal security capability
Typical timeframe: 1 week

Microsoft 365 Security Review

A focused review of identity, email, access, and tenant security for organisations that rely on Microsoft 365 every day.

From NZ$4,900 + GST
Best for: Businesses using M365 as a core platform
Typical timeframe: 1 to 2 weeks

Security Architecture Review

Independent security input on important cloud, network, SaaS, and platform decisions before risk gets locked into implementation.

From NZ$5,900 + GST
Best for: Technical teams making high-impact design decisions
Typical timeframe: 1 to 2 weeks

Security Roadmap Sprint

A short, structured engagement that turns broad security concerns into a practical, prioritised plan.

From NZ$4,250 + GST
Best for: Businesses that need clarity on what to do first
Typical timeframe: 1 to 2 weeks
Why This Model

Clear scope. Practical outputs. No heavyweight consulting.

Most organisations do not need a vague advisory engagement to make progress. They need a well-scoped review, a clear picture of risk, and practical next steps they can actually execute.

  • Fixed-scope engagements with clear outputs
  • Pragmatic recommendations, not audit theatre
  • Independent advice tailored to NZ business realities
  • CISSP-certified expertise across cloud, infrastructure, and enterprise security
How It Works

Simple engagement flow from scope to next steps

Step 1

Choose the right review

Select a focused service based on your environment, risks, and immediate priorities.

Step 2

Share context and access

A short discovery call confirms scope, inputs, and the systems or decisions to review.

Step 3

Get findings and next steps

You receive concise outputs with prioritised recommendations and clear follow-up actions.

Background

Independent security guidance grounded in delivery reality

My background spans engineering, technical leadership, consulting, architecture, and security strategy. I am CISSP certified, with hands-on experience across infrastructure, cloud, and enterprise security.

Start Here

Start with a focused security review

If you want clear priorities without a heavyweight engagement, start with a short conversation about the service that fits best.

Latest Insights

Recent field notes