A full stack of technical services
Everything Vexis delivers, grouped by discipline. Every engagement is scoped and quoted before work begins, delivered directly by a partner.
Forensics & Recovery
Drive forensics, data recovery, and incident work
Deleted file recovery
Recovery of accidentally deleted, formatted, or lost files from HDD, SSD, USB, and memory cards.
Corrupted drive recovery
Data extraction from drives with logical corruption, bad sectors, or unreadable partitions.
Forensic imaging
Bit-for-bit disk imaging for investigation, preservation, or archival, using write-blocked acquisition.
File system analysis
NTFS, APFS, ext4, and FAT forensic examination — timelines, artefacts, and deleted record carving.
Incident investigation
Scoped technical investigation into unauthorised access, insider incidents, or suspicious activity.
Malware removal & analysis
Identification, containment, and removal of malware, plus root-cause analysis to prevent recurrence.
Password recovery
Credential recovery for accessible accounts, archives, and documents where ownership is established.
Secure data destruction
Certified wiping and disposal of drives and devices containing sensitive information.
Web & Database
Web development, database engineering, and data work
Web development
Marketing sites, landing pages, and custom web applications built for performance and maintainability.
CMS builds
WordPress, Ghost, and headless CMS implementations with clean themes and editor-friendly structure.
E-commerce
Shopify, WooCommerce, and custom storefront builds with payment, tax, and shipping integration.
Database development
Schema design, migrations, and query optimisation across PostgreSQL, MySQL, SQL Server, and SQLite.
Data cleaning & migration
De-duplication, normalisation, and cross-system data migration with validation and rollback planning.
Analytics dashboards
Metabase, Power BI, and custom dashboards connecting directly to operational databases and SaaS APIs.
Form-to-sheet pipelines
Automated pipelines from web forms through validation into sheets, databases, or downstream systems.
API integration
Integration of third-party APIs — payment, accounting, CRM, messaging — into web and internal systems.
SEO fundamentals
Technical SEO baseline: metadata, structured data, sitemap, performance, and indexability audits.
Hosting & Infrastructure
Hosting, domains, and network services
Web hosting
Managed hosting with monitoring, backups, and performance tuning on dedicated or cloud infrastructure.
Domain & DNS management
Domain registration, DNS configuration, and record management across major registrars and providers.
Email & domain setup
Custom domain email, SPF, DKIM, and DMARC configuration to ensure reliable, authenticated delivery.
SSL & certificate setup
TLS certificate provisioning, renewal, and enforcement across web, mail, and internal services.
Cloud setup & migration
Infrastructure provisioning and migration across AWS, Azure, DigitalOcean, and Hetzner environments.
VPN & remote access
Site-to-site and client VPN configuration using WireGuard, OpenVPN, or vendor appliances.
Network setup
Small-office network design, router and switch configuration, VLAN segmentation, and Wi-Fi planning.
Backup solutions
On-site, off-site, and cloud backup strategies with tested restore procedures and retention policies.
IT Support & Endpoint
Service desk, endpoint, and hardware support
IT service desk
Remote and on-site support for end-users, ticketed and tracked with clear response expectations.
Remote support
Secure remote-assistance sessions for troubleshooting, configuration, and software deployment.
Hardware diagnostics
Fault isolation across desktops, laptops, and peripherals, with component-level diagnosis and repair options.
OS reinstall & recovery
Clean installation, imaging, and recovery of Windows, macOS, and Linux systems with data preservation.
Device tune-ups
Performance review, cleanup, driver and firmware updates, and configuration hardening for ageing hardware.
Printer & peripheral support
Network printer setup, driver configuration, and troubleshooting for shared and managed devices.
File migration
Structured migration of files, mailboxes, and user profiles between devices, accounts, or platforms.
Security audits
Review of endpoints, accounts, network exposure, and backup posture with a prioritised remediation plan.
Consulting & Training
Technical consulting and knowledge transfer
Technical consulting
Architecture reviews, vendor evaluation, and technical input on projects already in flight.
Training sessions
Practical, scoped training for small teams on the tools and systems they actually use day-to-day.
Documentation & runbooks
Written runbooks, internal documentation, and handover material so institutional knowledge doesn't walk out the door.