Location Cape Town, ZA · 33.9°S
Discipline Managed IT & Automation
Status Onboarding Q2 '26
Index 01 / 09

Managed IT, quietly engineered for businesses that refuse to settle.

We replace the need for an internal IT team. AI-driven helpdesk on WhatsApp, proprietary device monitoring, on-site dispatch inside an hour. No tickets, no portals, no pretending to care.

AI Helpdesk Greyline Monitor Cybersecurity Software Monitoring On-site Response Cape Town
§02  /  Principle

The best managed IT is the IT you never notice. Nobody thanks the electrician for keeping the lights on. They just get on with their day. That is the standard we build toward, and the reason we started.

Proactive, not reactive Radical simplicity Skin in the game No three-year lock-ins Local team, Cape Town Built in-house, not resold

§03 The alternative

What you'd otherwise
have to choose between.

Most growing businesses are stuck between three bad options. We built a fourth.

 
Freelance Tech
In-house IT Hire
Greyline
24/7 helpdesk
No
Business hours
Yes
Proactive monitoring
Reactive only
Depends on skill
Built in
Predictable cost
Hourly surprises
Salary + overhead
Flat monthly
On-site response
Eventually
Already there
Under 60 min
Cybersecurity coverage
Not their job
Limited by role
Layered stack
Scales with growth
Becomes bottleneck
Needs more hires
Automatically

§04 Why Greyline

Built for businesses
that can't afford downtime.

24/7
AI helpdesk availability
<60min
On-site response
100%
Device visibility
3hrs
Full onboarding
Your IT should be something you never have to think about.
The Greyline Principle

§05 How it works

Onboarded in hours,
not weeks.

One session. Two to three hours. By the end of it, you are fully covered.

1

Discovery

We audit your current setup, understand your needs, and identify quick wins.

2

Onboarding

Monitoring agents deployed. WhatsApp helpdesk connected. Your team briefed.

3

Go Live

Full coverage active from day one. Every device, every ticket, every alert.

4

Partnership

We run as your outsourced IT department. Transparent pricing, no surprises.

Start here

Let's make your IT
disappear.

Tell us about your business. We will walk you through exactly how Greyline would fit, with no pressure and no obligation.

Services

Five disciplines. One partner.

Every layer of your IT, under one roof. Each service stands on its own. Together, they replace the need for an internal IT department.

§01 AI Helpdesk

Support on the app your team already uses.

No tickets. No portals. No waiting. Your staff sends a WhatsApp message and gets instant, intelligent IT support. Complex issues are seamlessly routed to our technicians.

Instant AI responses, 24/7, no queue
Automatic escalation to human technicians
Full ticket tracking and resolution history
G
Greyline IT Support
online
Outlook keeps crashing
09:14
Hi Sarah! Your Outlook version is outdated. Pushing the update now. Fixed in 2 min.
09:14
That was fast. Thank you!
09:17

§02 Greyline Monitor

Our platform.
Your peace of mind.

We built our own monitoring software from the ground up. A lightweight agent on every device gives us deeper visibility and faster response than off-the-shelf tools ever could.

Proprietary platform, built and maintained in-house
Real-time health, performance, and security telemetry
Automated remediation before issues reach your team
Complete asset inventory and fleet reporting
Greyline Monitor
All Systems
12
Devices
99.8%
Uptime
0
Threats
MBP-Sarah
CPU 12% · RAM 4.2GB
PC-Accounts
CPU 34% · RAM 6.1GB
PC-Reception
Patch queued
SRV-Backup
Last backup 02:00

§03 Private Software Monitoring

Your software.
Our eyes on it.

Your business runs on proprietary or custom-built software. We monitor its health and performance without requiring full access. Our AI identifies issues in real time. Your team stays in complete control of what gets actioned.

Monitor in-house software without granting full access
AI-powered issue detection and diagnostics
Your team chooses what gets fixed, escalated, or deferred
Software Monitor
3 Apps
Inventory Manager v4.2
Healthy
42ms · 0 errors · 2min ago
Client Portal v2.1
Issue
Memory leak in session handler
Approve Defer
Payroll Engine v3.0
Healthy
28ms · 0 errors · 1min ago

§04 Cybersecurity

Layered protection,
quietly running.

South African SMBs are among the most targeted in the world. We implement defence in depth that protects your data, your devices, and your reputation. No security theatre, just working controls.

Endpoint protection and threat detection
Email security and phishing prevention
Automated backup and disaster recovery
Endpoint Protection Active
Email Filtering Active
Backup Verified 02:00
Firewall Rules Updated

§05 On-site Response

A technician at your door within the hour.

Not every problem can be solved remotely. When your business hits a critical issue, we don't send an email. We send a person. Dispatched immediately, on-site within 60 minutes anywhere in Cape Town.

Under 60 minutes for critical issues
Hardware troubleshooting and replacement
New employee onboarding and setup
<60
Minutes to on-site
Coverage
Cape Town metro, all areas

§06 The process

From first call
to fully covered.

The entire rollout takes one afternoon. Here's how.

1

Discovery

Brief call to understand your setup, team, and pain points.

2

Audit

We audit every device and identify quick wins and gaps.

3

Deploy

Agents deployed, helpdesk connected, team briefed.

4

Live

Full coverage active. We run as your IT department.

Next step

Which service
fits first?

Most clients start with the full stack. Others pilot with a single service first. We will walk you through what makes sense for your business.

Service / §01

Your helpdesk, on WhatsApp.

No tickets. No portals. No phone queues. Your team asks for help the same way they message a colleague, and most issues are resolved before a human ever gets involved.

§01 How it works

A conversation, not a ticket system.

Your staff save one contact. From there, every question, crash, or request goes through the same thread they already use for everything else.

Watch it work.

A few real scenarios, cycling every few seconds. This is what your team sees when they message the helpdesk. Typing indicators, read receipts, an actual answer.

Instant triage
Our AI reads the request, checks live device telemetry, and knows within seconds whether it can resolve this or needs a human.
Resolution or escalation
Routine issues (password resets, printer problems, software crashes) get handled right there. Complex issues get a human technician within minutes.
Context that carries over
Every conversation is logged against the user and the device. When a technician steps in, they already know what's been tried.
G
Greyline Helpdesk
online
§02 What gets auto-resolved

Roughly 68% of requests never reach a human.

Across our test deployments, the AI handles the majority of everyday IT friction by itself. Here's a sample of what came through one week, and how it was handled.

Auto-resolved 2min 14s
Outlook won't open
User reported crash on launch. AI detected corrupted OST file from device telemetry, walked user through rebuild. Email restored without desk visit.
Auto-resolved 48s
Password reset, Microsoft 365
Identity verified via second-channel check. Password reset link issued. User back in within a minute.
Auto-resolved 3min 52s
Printer offline, reception
Remote diagnostic found stuck print queue. Cleared remotely, spooler restarted. No technician dispatched.
Escalated 11min to human
New hire laptop setup
AI gathered requirements, scheduled technician for Tuesday 09:00. Hardware, software stack, and access provisioning handled end-to-end.
Escalated 4min to human
Suspected phishing email
AI flagged as security-sensitive, escalated immediately. Cybersecurity lead reviewed, quarantined sender domain across the whole tenant.
Auto-resolved 1min 08s
Shared drive missing
Network drive mapping dropped after restart. Remapped remotely, login script updated to prevent recurrence.
0%
Auto-resolved without human involvement
0 min
Median time to first response
24/7
Always available, including weekends and holidays
0
Apps to install. It's just WhatsApp.
§03 Why WhatsApp

Help people where they already are.

There's a reason no-one opens the helpdesk portal. It lives on a URL they forgot, behind a login they can't remember, asking them to classify their issue before they've even described it. WhatsApp is the phone book, the inbox, and the support channel, all in one thread.

"The moment you make people leave the tool they're already in, your adoption rate collapses. WhatsApp is where business actually happens in South Africa. That's where the helpdesk belongs."

The Greyline Principle
§04 Common questions

It's a real AI, trained on IT support workflows and connected to live device telemetry from Greyline Monitor. When it can't confidently resolve something, it escalates to a human technician and the handover is seamless. You'll never be stuck in a chatbot loop.

The AI helpdesk is live 24/7, every day of the year. Human escalation during business hours is immediate. Outside business hours, critical issues still reach an on-call technician. Non-critical escalations queue for the next business day.

Yes. WhatsApp is the default because it's faster for most things, but you'll have a direct line for emergencies, and on-site technicians are dispatchable within 60 minutes across Cape Town metro.

WhatsApp is end-to-end encrypted between the user and our business account. We don't ask for passwords over chat, we use secure verification links. All ticket data is stored in our systems, not WhatsApp's.

It's included in every Greyline plan. No per-ticket fees, no usage caps, no surprise invoices when your team has a bad week.

Get started

See it with your team.

We onboard your company, add your staff, and show you what a helpdesk that actually gets used looks like.

Service / §02 / Proprietary platform

We built our own monitoring platform.

Off-the-shelf RMM tools are bloated, expensive, and designed for someone else's business. Greyline Monitor is purpose-built for how we work, and for what you actually need to see.

§01 Live fleet view

The view your IT team should have had ten years ago.

Every device your business runs on, in one pane. Live health, live alerts, live action. Updating now.

Fleet Overview
greyline-monitor.internal
live
Devices online
23/24
Active alerts
2
Patches pending
4
MBP-Sarah-M1
CPU 12% / RAM 58%
PC-Accounts-04
CPU 84% / RAM 91%
PC-Reception
CPU 6% / RAM 42%
SRV-Backup
CPU 18% / RAM 33%
MBP-Design-02
CPU 22% / RAM 64%
§02 What it sees

Everything that matters. Nothing that doesn't.

We deliberately don't collect keystrokes, screen recordings, or browsing history. Monitoring is for system health, not for spying on your staff.

Hardware health
CPU temperature and load, memory pressure, disk health (SMART attributes, failure prediction), battery cycles and degradation, network interface status.
Operating system state
Patch level, pending updates, uptime, running services, crash reports, disk usage and growth rate, boot times.
Security posture
Endpoint protection status, firewall configuration, disk encryption state, USB device events, unauthorised admin elevation attempts.
Application performance
Which business-critical apps are installed, their versions, crash frequency, and whether they're launching slower than baseline.
Network behaviour
Connection quality to key services (Microsoft 365, your VoIP provider, your line-of-business app), DNS health, VPN status for remote users.
Backup verification
Whether backups are actually running, actually completing, and actually restorable. We test restores, not just success logs.
§03 Why we built it ourselves

Because nothing off the shelf actually fit.

Integrated, not bolted on

Monitor data flows directly into the AI Helpdesk. When a user says "my laptop is slow", we already see the 98% disk usage. No context-switching, no re-investigating.

Proportionate

Commercial RMM platforms are priced for enterprise. For a 15-person team, we'd be paying for 200 agents of capability and charging you for it. So we didn't.

Extensible

When you ask for something unusual (a custom check, a specific alert rule, a bespoke integration) we can build it. Try getting that from a vendor portal.

Monitoring your devices should not mean surveilling your people. Greyline Monitor tracks the machine, not the human at the keyboard. No screenshots. No keystrokes. No browsing history. Ever.

Our privacy posture, in one paragraph
§04 Deployment

Live across your fleet in under three hours.

01
Agent rollout

Lightweight agent (under 40MB, under 1% CPU at rest) deployed across Windows and macOS via remote install or self-serve link. Signed, sandboxed, no restart needed.

02
Inventory and baseline

First 24 hours: every device reports in, we build your hardware and software inventory, and establish performance baselines per machine.

03
Alert tuning

Week one is alert tuning. We calibrate thresholds to your environment so you're not getting paged about the accountant's spreadsheet at 3am.

04
Dashboard handover

You get read-only access to your own dashboard. See every device, every alert, every action we've taken on your behalf. Full visibility, zero vendor lock-in.

Get started

See your fleet like we see it.

Full deployment in under three hours. If you don't feel 10 times more informed about your IT estate after a month, we part ways politely.

Service / §03 / Diagnostics with consent

Your software. Our eyes on it. Your call on the fix.

Most IT providers don't touch custom or in-house software. We do. An AI watches your internal tools, catches issues before your users do, and proposes a fix. You approve, defer, or escalate. No surprise edits, no scope creep.

§01 The three-step model

Monitor. Diagnose. You approve.

01
Monitor

We instrument your in-house tools with scoped, read-only telemetry. Error rates, response times, failed jobs, memory leaks, queue depths. Whatever your stack exposes, we watch.

02
Diagnose

When something drifts, our AI correlates it across logs, metrics, and recent changes. You get a plain-language diagnosis: here's what's happening, here's likely why, here's what we'd do about it.

03
You decide

Three buttons: Approve Fix, Defer, or Escalate to our team. Nothing gets touched in production without your explicit sign-off. This is the whole point.

§02 The approval workflow

Why we don't just fix things.

Because your internal software is your business logic, and nobody should be silently changing business logic. A memory leak in your client portal isn't just a bug, it's a change window, a rollback plan, and a stakeholder call.

So the default is: we surface it, we explain it, we propose the fix, and you press the button. Every action is logged, every change is reversible, every decision is yours.

Approve fix Defer Escalate
Diagnostic alert
client-portal.prod
awaiting approval
Memory leak in invoice generation
Node process RSS growing linearly since the v2.4 deploy. Correlated with the new PDF export path. Suggested fix: revert pdf.renderBatch to the pooled variant. Est. impact: 2min restart. Risk: low.
Approve fix Defer 24h Escalate
§03 What we can watch

If it emits a log, we can see it.

We deliberately support a broad surface area, because "IT" and "software" stopped being different categories years ago.

In-house applications
Custom portals, internal dashboards, bespoke line-of-business tools. Node, .NET, Python, PHP, Ruby, Go. If it exposes logs, metrics, or health endpoints, we plug in.
SaaS integrations
Zapier flows, Make scenarios, Power Automate jobs, custom webhooks, inter-app syncs. The glue that breaks silently and costs you days before anyone notices.
Databases and storage
Query performance, connection pool health, slow-query detection, disk pressure, replication lag, backup integrity.
APIs and integrations
Third-party API failure rates, rate-limit exhaustion, authentication drift, schema changes that quietly break your integrations.
Scheduled jobs
Cron jobs, scheduled tasks, nightly reports. The silent killers. If a job fails silently at 2am, you find out at 9am from an angry customer. We catch it at 2:01am.
Custom scripts and automations
That PowerShell script Brian wrote in 2021, the Python util keeping your inventory in sync, the shell script that backs up the client archive. We wrap it in observability.
§04 Access & privacy

We don't need your codebase.

Scoped credentials

Read-only telemetry endpoints. Logs, metrics, health checks. No source code access, no database writes, no deployment permissions unless you explicitly grant them for a specific fix.

Data stays in your environment

Telemetry is processed in your cloud or on-prem, whichever applies. We extract alerts and diagnostics, not raw data. Your customers' data never traverses our systems.

Full audit trail

Every alert, every proposed fix, every approval decision, logged. Exportable. Yours. If your regulator or auditor wants to know what changed and when, they can see it themselves.

§05 Real scenarios

Examples of what we'd catch.

Caught before user impact 14 min lead time
Memory leak, invoicing service
RSS growth pattern detected 14 minutes before OOM. Proposed revert of recent deploy. Client approved. Service restarted before any invoices failed.
Caught after user impact 3 min from first error
Slow query regression
Checkout query latency jumped 600ms after a new index-less filter shipped. Client approved adding the index, mean response time dropped back inside SLA the same hour.
Caught before user impact 2 hrs lead time
Xero sync job failing silently
Nightly Zapier flow had been failing for six runs. Zapier's built-in alerts were misconfigured. We caught the pattern, alerted, client re-authenticated. Two hours of finance-team headache avoided.
Escalated to client dev team Immediate
API auth drift, third-party CRM
Vendor rotated auth tokens without notice. Full chain of symptoms identified in minutes, escalated to client's dev lead with a proposed config change ready to deploy.

Get started

Have us look at your weirdest internal tool.

Point us at the thing that always breaks at 3am. We'll have telemetry on it within a week, and you'll know what's actually going wrong.

Service / §04 / Defence in depth

Layered protection. Quietly running.

South Africa consistently ranks among the most targeted countries in the world for cybercrime. Most SMBs learn this the hard way, once. We build the layers that mean you don't have to.

§01 The landscape

You are already a target.

South Africa consistently appears in global reports as one of the top five most attacked countries for ransomware, business email compromise, and phishing. The attackers aren't looking at your annual revenue. They're looking at whether you'll pay. SMBs pay. That's the economics.

0%
of SMBs that suffer a major breach close within 6 months (industry-reported range)
0 in 0
South African businesses report a cyber incident annually
0%
of incidents begin with a single phishing email
§02 The stack

Six layers, one posture.

Single-product security isn't security. Defence works when an attacker has to defeat five mechanisms to get through one, and when the sixth catches them anyway.

01 / Endpoint protection
Next-gen antivirus and EDR on every device. Behavioural detection, not just signature matching. Ransomware gets killed at the process level, not after the file's encrypted.
02 / Email security
Advanced phishing and impersonation detection, sandboxed attachment analysis, URL rewriting and click-time protection, DMARC and SPF enforcement on your sending domain.
03 / Backup integrity
Immutable, off-site, tested weekly. We restore actual files in a sandbox and verify the backup works. Industry data shows roughly 1 in 3 attempted restores fails in a real incident. Ours don't.
04 / Network & firewall
Perimeter firewall configuration, segmented networks for guest and IoT traffic, VPN for remote users, DNS filtering to block known-bad destinations before a device even connects.
05 / Patch management
Most breaches exploit vulnerabilities with patches available. We deploy patches on a tight cadence (critical within 72 hours, standard within two weeks) and verify success across every device.
06 / User training
Your staff are the largest attack surface and also your best detection layer. Short, quarterly, scenario-based training. Simulated phishing (we send them the fake ones so the real ones don't work).
§03 If something gets through

Incident response, rehearsed.

Every prevention posture eventually fails against a good enough attacker. What matters next is how fast you detect, contain, and recover.

T + 0
Detection
Anomaly surfaces in endpoint or email telemetry. Automatic alert to our on-call team. You're notified immediately, not after we've "assessed" it.
T + 15 min
Containment
Affected device isolated from the network at the firewall level. Affected user's credentials suspended. Spread risk neutralised before triage even begins.
T + 1 hr
Triage & scope
Full forensic read: what happened, when, what data is involved, who needs to know. You get a plain-English briefing, not a vendor report.
T + 4 hr
Recovery
Clean restore from verified backups, credentials rotated, device re-imaged, new detections written into the stack. Business operations restored.
T + 1 week
Post-incident review
Written review: root cause, what worked, what didn't, what changes to the stack. POPIA notification guidance if applicable. We learn from this one so it doesn't happen again.
§04 POPIA & compliance

Compliance, built in.

POPIA is not a compliance checkbox, it's a business risk. We configure your environment for reasonable information-security obligations from day one: encrypted storage, access logging, breach-notification readiness, and documentation you can hand to a regulator.

The goal isn't to be bulletproof. Nobody's bulletproof. The goal is to be harder than the next business, fast to recover when something lands, and boring to an attacker looking for a quick payout.

Our security philosophy

Get started

Find out where you're actually exposed.

We run a no-cost baseline assessment as part of onboarding. You'll see exactly where the gaps are, and what it takes to close them. No fear-selling, just the reality.

Service / §05 / Cape Town metro

A technician at your door within the hour.

Not everything can be fixed remotely. When it can't, the difference between a 60-minute response and a 24-hour one is the difference between a bad morning and a lost day.

§01 A real response

From call to fixed, inside an hour.

An anonymised example from one of our test deployments. Router dead at a client in Observatory, a Tuesday morning.

09:14
Issue reported
Office manager messages the WhatsApp helpdesk: "internet is down, nobody can work".
09:15
AI triages
Helpdesk checks Greyline Monitor telemetry. Router unreachable, switches fine. Tries remote reboot via smart plug, no response. Classifies as hardware failure, requires on-site.
09:18
Technician dispatched
Nearest technician (8km away) dispatched with a spare router already pre-configured for the client's network. Office manager gets an ETA in their chat.
09:52
On-site & resolved
Faulty unit swapped. Connectivity restored. Old router couriered to warranty RMA. Total downtime: 38 minutes.
§02 Coverage area

Cape Town metro, end to end.

We cover the entire metropolitan area with under-60-minute response for critical issues. That includes the CBD, Century City, Southern Suburbs, Northern Suburbs, and the Atlantic Seaboard. Further out (Stellenbosch, Somerset West, Paarl) adds drive time but same-day is still the default.

CBD & City Bowl
Century City & Milnerton
Southern Suburbs
Northern Suburbs
Atlantic Seaboard
Winelands (same-day)
Cape Town metro
§03 What we handle on-site

If it has cables, we turn up.

Hardware failures
Routers, switches, access points, servers, workstations, printers. Same-day replacement where we stock the part, next-day max on anything else.
Network & cabling
Structured cabling runs, patch-panel work, Wi-Fi surveys and AP placement, VLAN configuration, VoIP setup, switch upgrades.
New hire onboarding
Fully set-up laptop delivered on day one. Accounts created, apps installed, access granted, encryption enabled, endpoint protection active. Takes you zero minutes.
Office moves
Moving premises is where IT usually collapses. We plan the cutover, pre-stage equipment, run cabling in the new space, and coordinate ISP transitions so the business restarts on Monday, not Friday-three-weeks-later.
Meeting room tech
Screens, cameras, mic arrays, booking systems. Setup, cable management, the works. We ship rooms where Zoom actually starts on time.
Emergency recovery
Ransomware response, hardware disaster recovery, full-site failures. Same protocol, faster escalation, more bodies on the ground.
§04 When remote isn't enough

The bar for dispatch is low.

If remote troubleshooting will take more than 15 minutes of a user's time, we'd rather send someone. Your team's billable hour is more valuable than our driving time.

"The break-fix tech drives out, charges R950, leaves, bills again next week for the recurring issue. We drive out on retainer, fix the cause, and don't need a second visit. Showing up is part of the monthly, not a line-item."

How we think about dispatch

Get started

Know who's coming next time.

No more scrambling for the number of that freelance guy. Retained on-site is the default for every Greyline client.

About Greyline

Built by people who believe IT should be invisible.

The best IT is the IT you never have to think about. Your email just works. Your laptop just boots. The printer, somehow, prints. That's the standard we're building toward, and the reason we started.

§01 Our story

The South African SMB has two choices when something breaks. Option one: the freelance tech, great until they go on holiday, great until they're double-booked, great until the problem is outside their specialty. Option two: the enterprise MSP, great at signing three-year contracts and issuing tickets and not, it turns out, at actually answering the phone.

We looked at that landscape and saw a third option waiting to exist. One that used AI not as a gimmick but as the first line of response. One that built its own tools instead of reselling other people's. One that treated showing up on-site as part of the monthly, not a premium line-item.

That third option is Greyline. We started because small and medium businesses in South Africa deserve the kind of IT partnership that usually gets reserved for the corporates. Same standard of care, same rigour, proportionate to the size of the business. No enterprise theatre, no freelance chaos.

We're based in Cape Town. We're building the helpdesk, the monitoring platform, the diagnostics layer ourselves, in-house, because nothing off the shelf actually fit what we needed. Every week, the product gets sharper. Every client we add, we learn something, and the platform improves for everyone.

The best managed IT is the IT you never notice. Nobody thanks the electrician for keeping the lights on. They just get on with their day. That's the standard.

The Greyline Principle
§02 What we believe

Three values. Non-negotiable.

01

Proactive, not reactive

The mediocre IT provider waits for the phone to ring. We watch for the problem to start, and we're already dealing with it before your team notices. Every recurring incident is a failure of monitoring, not a fact of life.

02

Radical simplicity

Enterprise IT loves complexity because it justifies the bill. We'd rather solve the problem with one line of config than three dashboards and a workflow. If you need a manual to use it, we designed it wrong.

03

Skin in the game

Monthly retainer, month-to-month. If we stop earning it, you leave. No three-year contracts, no exit penalties. The only thing holding us accountable to you is the quality of the work. That's the point.

§03 Who we are

A small team, deliberately.

You will know the people handling your account by first name. That's not a perk of being early, it's the operating model.

M

Matt

Founder & CEO

Runs technical direction and strategy. Writes most of the platform. Does the thinking nobody else gets to do yet. Believes wealth built young is worth more than wealth built late.

J

Jarred

Sales & Client Relations

Your first point of contact. Scopes the deployment, runs the onboarding, stays on your account. Doesn't hand you off to a "customer success representative" six weeks in, because there isn't one.

C

Christina

Marketing & Design

Everything you see, read, or click on from Greyline has her fingerprints on it. Responsible for the fact that this page doesn't look like every other MSP site in the country.

§04 How we work with you

The first 90 days, mapped.

01
Discovery

One 90-minute call. We understand your environment, your pain points, your sacred cows. No questionnaire, no "technology audit form", just a proper conversation.

02
Onboarding

A single 2 to 3 hour session to deploy monitoring, add users to the helpdesk, and baseline your security posture. We work around your business, not the other way round.

03
Go live

Day one, the helpdesk is open. Your team saves the WhatsApp number and starts using it. Monitoring runs in the background. Everything that was broken before, quietly starts getting fixed.

04
Partnership

Monthly reviews, quarterly strategy calls. We flag what's ageing, what's exposed, what needs budgeting for. You focus on running the business, we focus on the technology layer making it possible.

§05 Where we are

Cape Town, unapologetically.

We believe in working where we live. Greyline is built in Cape Town, for Cape Town businesses, by people who know the context. No offshore helpdesk, no call centre in another time zone. The person helping your team is someone who understands what load-shedding does to a UPS and why your ISP is probably going to route you through Johannesburg during the next outage.

100%
Local team, based in Cape Town
SA
Infrastructure, data residency, and support
0
Offshored roles. Ever.

Come work with us

Put us up against what you have.

Run us alongside your current setup. If we're not visibly better, you walk away with no hard feelings and no long-term contract to unwind.

Get in touch

Let's talk about your IT.

Tell us a little about your business. A real person will get back to you within one working day, usually the same morning. No call-centre forms, no automated replies.

Send us a note.

We'll respond within one working day. No auto-replies. No pitching you at 3am.

Thanks, that's through.

We'll reply within one working day from admin@greylinegroup.co.za. Keep an eye on that inbox.

Direct lines

WhatsApp
Location
Cape Town, South Africa
Response time
Within 1 working day

How we engage

Month-to-month, no lock-ins.

Flat monthly retainer, priced per user. Three-month initial term, month-to-month thereafter. If we stop earning it, you leave.

Full platform access
Dedicated onboarding
Predictable monthly cost
No exit penalties
§01 What happens next

From form submit to first fix.

01
We reply

Within one working day, a real person emails you back. Usually Jarred. No generic confirmation, no "thanks for your interest", a proper reply engaging with what you wrote.

02
Short call

30 to 45 minutes. We understand your environment. You understand how we work. By the end, you know whether this is a fit.

03
Onboarding

If it's a fit, we schedule a 2 to 3 hour onboarding session. The rollout runs in parallel with whatever you have now. No risk of your business going dark.

04
Partnership

Monthly retainer from there. Three-month initial term, month-to-month thereafter. We don't chase, we don't guilt-trip, we don't lock you in.

§02 Frequently asked

Questions people ask before they hire us.

Getting started

Short call to scope, then a 2 to 3 hour onboarding session once we agree on fit. From there, flat monthly retainer, month-to-month after a three-month initial term. No long contracts, no exit penalties, no surprise invoices.

A single 2 to 3 hour session, scheduled around your team. We deploy monitoring agents, set up helpdesk access, baseline security posture, and hand over. Most clients are up and running same-week.

Five users. Below that, we're probably overkill and you'd be better served by a freelance tech. Above that, the economics work for both sides.

Per-user, per-month, ZAR. Three tiers (Essential, Business, Premium) depending on which services you want active. We quote off your specific team size and stack, usually on the first call. No surprise add-ons, no per-ticket charges.

The service

Yes, and most of our clients never need another channel. You save one contact, the whole team uses it, and the AI handles roughly 68% of requests directly. Human technicians step in for the rest, same thread.

Yes. Technician dispatch within 60 minutes for critical issues across Cape Town metro. Same-day for anything further out (Winelands, West Coast). On-site is included in the monthly, not a line-item charge.

We work with what you have. Greyline Monitor supports Windows and macOS. The helpdesk handles anything IT-adjacent. For cybersecurity and backup, we'll recommend stack upgrades where yours genuinely falls short, but we're not in the business of rip-and-replace.

Yes, that's what the Private Software Monitoring service is for. AI-powered diagnostics on your internal tools with a client-controlled approval workflow. We watch, diagnose, propose a fix, and you press the button.

Practical details

Three-month initial term, then month-to-month. No long lock-ins, no exit penalties. If we stop earning it, you leave.

Primary data stays in your own environment (Microsoft 365, Google Workspace, your servers). Our monitoring telemetry and ticket metadata is stored in South Africa. No offshoring of sensitive business data.

Professional services, finance and accounting, legal, property, retail and e-commerce, manufacturing, healthcare. Really anywhere an SMB runs on email, file storage, endpoint devices, and line-of-business software.

The remote services (helpdesk, monitoring, cybersecurity, software monitoring) are location-independent. On-site response is currently Cape Town metro only, with same-day coverage extending to the Winelands. We'll expand as the team grows.

Still reading?

Stop reading. Send the form.

We're already wondering what you'd write. A real conversation, a proper reply.