Services

Mason Advisory's independent consultants solve complex business challenges through intelligent use of IT

IT Strategy & Transformation

Realigning your IT strategy with your business vision by collaborating with both users and technical teams.

Sourcing

Providing independent insight that cuts through technical jargon to get to the best, most cost-effective solution for your needs.

Architecture & Technology

Developing strategies, designs and technical roadmaps to help you create innovative, resilient IT software, systems and services.

Cybersecurity

Helping organisations to understand the business impact of their cybersecurity risks

IT Delivery

Advising you on the best possible IT delivery programmes and approaches, leaving your in-house staff to focus on what they do best.

Assurance

Providing independent health checks and risk assessments on critical IT projects, at any stage.

IT Operational Excellence

Working with you to establish strong processes, cost-effective technologies and dynamic leadership to deliver continuous improvement.

Read More
Case Study

Protecting a major retailer’s digital future

Industries & Services
Retail & FMCG
IT Strategy & Transformation
Assurance
Cybersecurity

Providing board-level advice to address the business’s number one corporate risk: data security

Read More
Case Study

Supporting a pharmaceutical multinational to improve its IT services and delivery

Industries & Services
Life Sciences
IT Operational Excellence
IT Delivery

Supporting process improvements to drive quick and cost-effective delivery of infrastructure to meet business needs.

Read More
Case Study

Supporting IT transition and outsourcing at leadership level for The Football Association

Industries & Services
Infrastructure Services
IT Strategy & Transformation
IT Delivery
Sourcing

Working with the senior management team to develop a future strategy for IT

Read More
Case Study

Strategic insight and expert advice on National Grid’s operational telecoms network

Industries & Services
Energy & Water
Sourcing
Architecture & Technology

Providing advice and support on the modernisation of a network that forms part of the UK’s critical national infrastructure.

Read More
Business Challenge

Digital: using IT to support a more customer-focused approach

Adapting to meet the ever-changing needs of customers, namely, offering greater flexibility with respect to how and when data and services can be accessed.

Read More
Business Challenge

Cloud: considering new models for software and storage

Making data and software accessible from a range of devices and locations, without raising costs or compromising in terms of solution flexibility.

Read More
Business Challenge

Driving value for money: getting the best from IT investments

Guaranteeing that IT services deliver sufficient benefits to your business for the lowest possible costs.

Read More
Latest News

Bull-Mastiff or Toy Poodle: What’s Guarding your Front Door?

Authentication is one of the first lines of defence for protecting your company’s assets, but not all authentication schemes are equally capable of withstanding assault – and the sense of security offered by a poor one is false. A weak authentication system can make it relatively easy for adversaries to push past your guard dog. An attacker armed with the correct authentication credentials, or with a way of bypassing them, will be able to get in. The C-suite really needs to know whether the company’s networks, computer systems, and data are guarded by a mighty bull-mastiff or a relatively powerless poodle. The good news is that securing your organisation, by putting in place a formidable but user-friendly authentication process, stands up to the scrutiny of a cost-benefit analysis, and is within reach of most organisations....

Read More

Bull-Mastiff or Toy Poodle: What’s Guarding your Front Door?

Authentication is one of the first lines of defence for protecting your...

Read More

Raising money for Sport relief – Leaderboard Triathlon Challenge 2017

Mason Advisory was part of Cisco’s Leaderboard Team Relay Triathlon Challenge 2017...

Read More

How to turn Cybersecurity into a Business Asset

World-class organisations recognise that cybersecurity can, and should, be a powerful enabler...

Read More

Leaderboard Triathlon 2017 in aid of Sport Relief

We are delighted to be involved once again with Cisco and Sport...

Read More
White Papers

Securing the cloud

Considering a new model for managing risk

Key Points
  • Highlighting the impact of the move away from direct ownership of data
  • Explaining the subsequent changes required to security models
  • Working through five key questions that all businesses should consider when migrating to cloud-based services
Read More Download Paper

To download the PDF please provide your email address below

Download Paper

Joining the dots

Using value chain mapping to understand the links between IT and the business

Key Points
  • Helping to demonstrate the criticality and relevance of IT to the business
  • Showing how to identify and visually present links between IT and business outcome
  • Highlighting key considerations for value chain mapping in your business
Read More Download Paper

To download the PDF please provide your email address below

Download Paper