Why Skales

We have built this
from the inside.

Skales was founded by partners who sat in the IT leader seat at Mollie, Bitvavo, Navan and Metabolics. Every framework we deploy, we've used ourselves at scale, under audit, on a deadline.

Five reasons

Five reasons clients choose Skales.

We're not generalists, and we're not a body-shop. We are a focused, senior IT partner for European companies that need to take security and compliance seriously before their next round, audit, or regulator interaction.

Meet the partners →
01

Partners, not consultants

We've run IT inside Mollie, Bitvavo, Navan and Metabolics. We know what a 200-person hiring spree does to your IT operation — because we lived through it.

02

Apple-native by design

Jamf, Kandji, Apple Business Manager are our primary environment — not a side specialism bolted onto a Microsoft practice. We deploy what we use daily.

03

Identity as the security foundation

IAM and IGA aren't an add-on. They are the operating layer everything else depends on. We architect them in from day one, not after the first audit finding.

04

NIS2-aware from day one

Compliance is baked into our operating model — not sold separately. Every control we put in place produces evidence the regulator and your auditor will accept.

05

Built for the Netherlands

We know the Dutch market, the Cbw, the regulators, the banks, and the local cadence of Series A through C. European focus, native execution.

A clean break

Skales vs. generic IT.

Generic IT support

  • Reactive break-fix work, ticket-driven
  • Windows-first, Apple as an afterthought
  • Identity treated as "Active Directory plus MFA"
  • Compliance answered ad-hoc, audit by audit
  • Junior engineers on the front line
  • Onboarding requires manual provisioning
  • No visibility into shadow IT or SaaS sprawl

Skales

  • Proactive operating model with named owners
  • Apple-native, Jamf / Kandji as primary stack
  • Modern IAM & IGA as the central control plane
  • Continuous compliance evidence, always audit-ready
  • Senior partners leading every engagement
  • Zero-touch, HRIS-triggered onboarding
  • Continuous SaaS discovery and access reviews
Toolstack

Our toolstack.

A focused set of best-of-breed platforms — chosen because we've operated them in production at scale, not because we have a partner discount.

Apple MDM

Jamf Pro / Jamf Now

The deepest Apple device management platform on the market. Our default for fleets above 50 seats.

Apple MDM

Kandji

Modern, automation-first Apple MDM — our preferred choice for fast-moving 20–80 seat scale-ups.

Identity

Okta

Enterprise-grade identity platform. Source of truth for SSO, MFA, lifecycle and access governance.

Identity

JumpCloud

Unified directory and MDM for scale-ups that want a single pane of glass without enterprise complexity.

Productivity

Google Workspace

Hardened tenant baseline with DLP, retention, recoverability and admin role hygiene by default.

Apple

Apple Business Manager

Zero-touch enrollment, volume purchasing, federated identity — the foundation of every Apple deployment.

Security

EDR tooling

Endpoint Detection & Response across SentinelOne, CrowdStrike and Defender — chosen per environment.

Governance

IGA platforms

Identity Governance & Administration tooling for access certification, SoD and lifecycle workflows.

Sectors

Where we operate.

◈ Fintech & Payments

Fintech & Payments

Regulated, audited, investor-watched. IT becomes a board-level concern from Series A onwards.

DORANIS2PSD2
◇ Deeptech & Quantum

Deeptech & Quantum

IP-heavy organisations where leakage is existential. Export control and access governance from day one.

Export controlIP protection
+ Healthtech & MedTech

Healthtech & MedTech

Patient data, EU MDR, hospital procurement — every stakeholder has a security questionnaire.

NIS2GDPREU MDR
▲ Venture-Backed Startups

Venture-Backed Startups

Investor due diligence and SOC2 readiness without breaking velocity. IT that survives the next round.

SOC2Investor DD
⇆ Logistics & Supply Chain

Logistics & Supply Chain

OT and IT converge, suppliers multiply, and the regulator is now watching. Visibility is the asset.

NIS2OT security
▣ Enterprise SaaS

Enterprise SaaS

Selling to enterprises means surviving their procurement gauntlet. Evidence-first IT operating model.

SOC2ISO 27001
Next step

Talk to a partner.

60 minutes, written assessment afterwards.