IDSL Supplies – IT Streamlining & Security Readiness

Client Background

Founded in 2001, IDSL Supplies Ltd has established itself as one of Southwest London’s most trusted independent electrical wholesalers. Based in Kingston upon Thames, the company has consistently grown through a clear and unwavering focus on stock availability, competitive pricing, and genuine customer service — serving electrical contractors, installers, facilities managers and trade professionals across London and the UK

Since its inception, IDSL Supplies has established its reputation on three fundamental principles:

Extensive Stock Holding – A comprehensive range that includes switchgear & control gear, lighting, lamps, tubes, wiring, cable accessories, CCTV & security, heating, ventilation, tools, and domestic appliances — with the majority available for same-day collection or fast delivery.

Real Competitive Pricing – No gimmicks or membership schemes; straightforward trade prices that allow regular customers to stay profitable on every job.

Outstanding Service Levels – Knowledgeable staff who understand contractors’ urgent requirements, offering technical advice, rapid order turnaround, and a willingness to source non-stock items quickly.

IDSL identified the necessity for a proactive, all-encompassing IT support partner to resolve persistent business disruptions and system instabilities, while bolstering IT security to effectively mitigate cyber risks.

IDSL Supplies – IT Streamlining & Security Readiness

Objectives

number 1

Objective 1

Minimise on-premises infrastructure and associated ownership costs. The existing in-house server currently hosts the critical K-Soft ERP system a key vendor application without a native cloud-hosted option. Any new solution must prioritise robust security measures and include daily automated backups.

number 2

Objective 2

Transition email services from the current provider, Names.co, to Microsoft 365, while enhancing overall email security and boosting user productivity and email stability.

number 3

Objective 3

Deliver comprehensive endpoint and user support, incorporating centralised system management to enable a customised, proactive and tailored service model.

number 3

Objective 4

Alleviate concerns about potential cyberattacks by identifying and mitigating security vulnerabilities, ultimately elevating the organization’s overall security posture.

Our Approach : How did we help?

To address the client’s challenges and objectives, we adopted a structured, phased migration strategy focused on minimising disruption, enhancing security, and optimising costs. We collaborated closely with the client’s IT team and key stakeholders through regular virtual meetings, shared project dashboards, and iterative feedback sessions to ensure alignment with their business needs. This collaborative process involved joint discovery workshops to map out dependencies, risk assessments, and customised training sessions post-implementation.

Here’s an outline of the key steps we took, along with the tools, strategies, and collaborative elements employed:

number 1

Assessment and Planning

We began with a comprehensive audit of the existing infrastructure, including the in-house server hosting the K-Soft ERP system, email setup with Names.co, and endpoint devices. This involved identifying security vulnerabilities, data dependencies, and cost inefficiencies.

  • Tools/Strategies Used: Utilised vulnerability scanning tools and cloud assessment frameworks from Microsoft Azure to evaluate migration feasibility including private cloud solutions with the use of Remote Desktop services. Employed agile project management with tools like Jira for tracking milestones.
  • Collaboration: Worked hand-in-hand with the client’s internal IT staff during on-site and remote audits, incorporating their insights on critical workflows to prioritise objectives and develop a tailored migration roadmap.
number 2

Infrastructure Migration and Cost Optimisation

To reduce on-premises infrastructure, we virtualised and migrated the K-Soft ERP to a secure hybrid private cloud environment, as a full cloud-hosted option wasn’t available from the vendor. This included setting up automated daily backups using Veeam and robust access controls.

  • Tools/Strategies Used: Leveraged Hyper V for virtualisation for hosting, implementing, repeatable deployments. Cost optimisation strategies included rightsizing resources and reserving instances to lower ownership expenses.
  • Collaboration: Engaged the client in proof-of-concept testing, where they validated ERP functionality in the new setup, ensuring minimal downtime through scheduled migration windows agreed upon jointly.
number 3

Email Migration and Productivity Enhancement

We transitioned all email services from Names.co to Microsoft 365, incorporating advanced security features and productivity tools to streamline communication and stability.

  • Tools/Strategies Used: Used Microsoft’s Email Migration tools and PowerShell scripts for data transfer, while enabling features like Exchange Online Protection (EOP) for anti-phishing and Teams integration for improved collaboration. Multi-factor authentication (MFA) was enforced organisation-wide.
  • Collaboration: Conducted user training with the client’s employees, gathering feedback via surveys to customise configurations, such as shared mailboxes and automated workflows, based on their daily needs to align with business needs.
number 4

Endpoint Management and Support Implementation

We established centralised management for all endpoints, providing proactive support to enhance user experience and system reliability.

  • Tools/Strategies Used: Deployed RMM for device management, enabling remote monitoring, patch management, and automated alerts. Adopted a proactive support model using AI-driven analytics.
  • Collaboration: Partnered with the client to define support SLAs, providing a ticketing system for seamless issue resolution, and conducted quarterly reviews to refine the service based on usage data and feedback.
number 4

Security Enhancement and Risk Mitigation

To address cyber concerns, we implemented a multi-layered security framework, conducting penetration testing and ongoing monitoring to elevate the overall security posture.

  • Tools/Strategies Used: Implemented a EDR antivirus solution for threat detection and response, along with an IPS firewall solution, encryption protocols, and regular security audits. Strategies included zero-trust architecture and employee cyber security awareness training programs.
  • Collaboration: Collaborated on a joint security workshop to simulate attack scenarios, incorporating the client’s input on high-risk areas, and provided ongoing advisory support through a dedicated account manager.
    This approach not only met the objectives but also delivered measurable improvements, such as a 40% reduction in infrastructure costs and enhanced user satisfaction, as validated through post-project surveys.

Results and Business Benefits

Post-implementation, the client saw measurable gains in efficiency, security, and cost savings, tracked via KPIs like cost reductions, incident rates, and user feedback.

Objective 1: Reduced Onsite Infrastructure and Cost of Ownership

  • Cut on-premises hardware by 45% via ERP virtualization and hybrid cloud migration.
  • Lowered annual costs by 40% with optimised resources and automated backups.
  • Benefits: Freed budget for growth; ensured zero downtime and reliable ERP access.

Objective 2: Email Migration to Microsoft 365

  • Migrated 50+ accounts with full data integrity, adding threat protection and collaboration tools.
  • Reduced phishing by 60%; boosted productivity by 25% via faster workflows.
  • Benefits: Improved employee satisfaction (4.5/5 score); enabled scalable, cost-effective communication.

Objective 3: Endpoint and User Support

  • Centralised management for 30+ devices, halving support tickets and speeding resolutions.
  • Prevented 15 failures in two months through proactive monitoring.
  • Benefits: Increased uptime by 22%; shifted IT focus to innovation, enhancing morale.

Objective 4: Cyber Risk Mitigation

  • Remediated 20 vulnerabilities, raising security score to high.
  • Neutralised three breaches with no data loss via ongoing monitoring.
  • Benefits: Minimised financial risks of potentially £500k+; eased GDPR compliance for new opportunities.
IDSL Supplies – IT Streamlining & Security Readiness

CUSTOMER TESTIMONIAL

format_quote

Working with the team on our IT migration project was a game-changer for our organisation. We were struggling with outdated on-premises servers, vulnerable email systems, and growing cyber threats, but their structured approach made the transition seamless. By virtualising our K-Soft ERP, migrating to Microsoft 365, and implementing centralised endpoint management, they not only slashed our infrastructure costs by 40% but also boosted our productivity and security posture significantly. The proactive support and collaborative workshops ensured minimal disruption, and we’ve seen a real ROI with fewer incidents and happier teams. I highly recommend their services—they delivered exactly what we needed and more.

Dan Line
Director
one stop shop white icon

Complete end-to-end IT and infrastructure protection

From networks to cloud to endpoints, we secure your entire infrastructure with proactive monitoring and defence.

satisfaction white icon

Long-term partnerships built on trust and transparency

We build lasting relationships through honesty, accountability, and clear reporting—so you always know where you stand.

keyboard_arrow_up