Intelligence Center
Operational Knowledge Base
Detailed intelligence regarding our operational doctrine, engagement protocols, and security standards. Understand how we protect critical assets before you initiate contact.
Operational Doctrine & Strategy
How does Intarmour differ from a standard MSP or IT firm?
We do not manage helpdesks, we do not sell hardware, and we do not fix printers. Intarmour is a Strategic Risk Advisory firm. We operate at the intersection of finance, geopolitics, and cybersecurity. While an MSP focuses on 'keeping the lights on,' our mandate is the protection of asset valuation, legal defensibility, and operational continuity in high-threat environments.
What is the 'Sovereign Architecture' philosophy?
Sovereignty means total control. In a fragmented geopolitical landscape, data location is a legal risk. We utilize infrastructure hosted exclusively in Switzerland or on-premise air-gapped systems. This places your sensitive M&A intelligence, private family records, and IP outside the jurisdiction of the US CLOUD Act and EU data sharing mandates, ensuring immunity from foreign subpoenas.
Do you only work with large corporations?
Our client base is defined by risk profile, not just size. We serve Mid-Market Industrial firms (Revenue 50M-500M EUR) requiring NIS2 governance, Private Equity funds needing transaction assurance, and select Ultra-High-Net-Worth Individuals (UHNWI) requiring privacy defense. If you have critical assets to lose, we are the correct partner.
How do you handle NIS2 and Regulatory Compliance?
We view compliance as a byproduct of security, not the goal. However, for 'Essential Entities' under NIS2, we deploy a specific Governance Framework that documents 'Due Care.' We prepare the Board of Directors to withstand regulatory scrutiny, ensuring that personal liability is mitigated through rigorous, documented defense protocols.
Engagement & Response Protocols
How fast can you deploy a 'Red Flag' M&A Audit?
In deal-making, time is the most expensive commodity. We can deploy our 'Red Team' reconnaissance and OSINT protocols within 24 hours of a signed engagement. Our standard 'Red Flag' Deal Memo - highlighting critical technical debt and liabilities - is delivered within 5 business days, providing your Investment Committee with immediate leverage for price negotiation.
What is the scope of a 'Fractional CISO' retainer?
We integrate a Senior Commander into your executive structure. We do not act as an external consultant; we act as an officer of the company. Scope includes: Board-level reporting, Vendor Risk Management (Supply Chain), Incident Response planning, and Budget optimization. You gain the authority of a Tier-1 CISO without the overhead of a full-time executive salary.
Is the Private Asset Defense service available 24/7?
Yes. Threats do not respect office hours. Our Private Client retainers include direct access to our Crisis Command protocols. Whether it is a device compromise while traveling in a high-risk zone, a 'Deepfake' extortion attempt, or a lost laptop containing sensitive data, we provide immediate containment and remediation capability.
Financial Structure & Logistics
How are your advisory services priced?
We operate on transparent, flat-fee models to align incentives. M&A Due Diligence is priced per deal (scaled by target complexity). Fractional CISO services are billed as a fixed monthly retainer. We do not sell hours; we sell outcomes, availability, and risk reduction.
Do you require long-term contracts?
For Governance roles (vCISO), we require a minimum 6-month engagement to ensure the strategy is effectively implemented and culturally adopted. M&A Audits, Forensic Investigations, and specific Remediation projects are engaged on a project basis (SOW) with no long-term commitment required.
Can we transact in multi-currency?
We accept payments in EUR and CHF (Swiss Francs). For international holding groups, we can structure invoicing to align with your specific jurisdictional tax requirements.
Confidentiality & Operational Security
How do you handle sensitive client data?
We practice what we preach. We do not use commercial email (O365/Gmail) for sensitive client exchanges. All communication is conducted via encrypted channels (Signal/Threema/Proton). Client documentation is stored in zero-knowledge, Swiss-hosted Virtual Data Rooms (VDR) with granular access logs. We minimize data retention to the absolute operational necessity.
What is the onboarding process for a new mandate?
Trust is verified, not assumed. The process begins with a rigorous mutual Non-Disclosure Agreement (NDA). Once signed, we establish a secure, out-of-band communication channel for your team. We then proceed to a 'Threat Modeling' session to understand your specific adversaries before we deploy any technical controls.
Do you outsource your operations?
Strategic advisory, architecture, and crisis command are never outsourced. Intarmour maintains strict control over the strategy. For specific kinetic tasks (e.g., physical security sweeps) or specialized legal forensics, we coordinate with a vetted network of trusted partners, but Intarmour remains your single point of accountability and contact.
Unlisted Operational Requirement?
If your risk profile or architecture falls outside standard engagement parameters, request a secure briefing with our tactical team.