Identity, Access & Endpoint Control at RMI

Remote Medical International (RMI) operates globally across high-risk industries, providing critical staffing, medical, and operational services. With personnel distributed across the UK, US, offshore platforms, and field clinics, their IT environment required rigorous, repeatable security controls.

these businesses trust in benchmarked to stay secure, compliant, and in control

Identity, Access & Endpoint Control at RMI

The Challenge

Inconsistent Access and Shadow IT

RMI’s cybersecurity maturity journey revealed foundational risks in:

  • Inconsistent onboarding/offboarding across regions

  • Shadow IT and unauthorized app use (e.g., Google Drive, Splashtop)

  • Manual MFA setup and poor adoption

  • Limited visibility and enforcement of access rights, license assignments, and device preparation

Onboarding was often driven by email and local discretion, exposing the organization to data leakage, unrevoked access, and noncompliance with frameworks like Cyber Essentials and ISO 27001.

Solution

Standardized Identity, Access, and IT Operations

Benchmarked implemented end-to-end SOPs, MFA controls, and secure device setup protocols, structured into three key areas:

Identity & Access Management (IAM)

  • Developed detailed SOPs for onboarding and offboarding field, office, and contractor staff:

    • Microsoft 365 account creation

    • Role-specific license assignment (F3, Business Premium, Adobe, OneLogin)

    • Device setup with Cynet EDR, Adobe, and endpoint encryption

  • Aligned global procedures across UK, US, and offshore teams

IT Ops Manager’s Opinion

“By bringing structure to something as fundamental as user access and device setup, we closed gaps we didn’t even know we had.”
RMI IT Ops Manager

The Results

Onboarding and offboarding fully standardized across all global teams

MFA compliance achieved for 100% of Microsoft and OneLogin users

Endpoint baseline standardized with EDR, licensed apps, encryption, and patch compliance

Centralized IT helpdesk capturing all incidents and access requests

Supported Cyber Essentials Plus certification with documented policies

Frequently Asked Questions

Got concerns? Let’s address those
Why was RMI struggling with onboarding and offboarding?

Processes were inconsistent across regions, relying on email instructions and local discretion. This led to unrevoked access, misconfigured devices, and shadow IT exposure.

How did Benchmarked improve MFA adoption?

By deploying OneLogin Protect and Microsoft Authenticator, creating SOPs, and delivering hands-on training, 100% of users across all regions adopted MFA, ensuring secure logins for critical apps.

What improvements were made to device setup?

Benchmarked introduced a Windows 11 build standard, offline installation, local admin configuration, Edge-hardening, and EDR installation. All devices are now compliant with patch, encryption, and antivirus policies.

How was IT support standardized?

A centralized ticketing system was implemented (RMI-IT-SOP-002) with SLA-based responses. Automated ticket creation via Acronis ensures onboarding, device issues, and access requests are tracked efficiently.

How did these changes reduce cyber risk?
  • Standardized onboarding/offboarding prevents unrevoked access

  • MFA enforcement blocks unauthorized logins

  • Endpoint hardening and EDR protect devices from malware and unauthorized apps

  • Centralized monitoring provides visibility for compliance and incident response

Can these processes scale globally?

Yes. SOPs, MFA, and endpoint baselines are aligned across UK, US, and offshore teams, providing a repeatable, auditable framework suitable for continued growth and regulatory compliance.

Why choose Benchmarked for operational cybersecurity?

Benchmarked combines practical deployment, user enablement, and governance to implement controls that are secure, scalable, and sustainable — reducing risk while enabling business operations.

Why choose us

At benchmarked, we specialize in connecting; IT data, financial structure, and strategic impact. Our methodology bridges the gap between spreadsheets and executive decisions by:

We don’t just help you “pass the audit.”

We embed ourselves in your operations, implement the changes with you, and guide your team through what matters, what to prioritize, and where the trade-offs lie—so compliance actually improves your security, not just your paperwork.

Diving deep into cost structures, contracts, and utilization

Translating raw IT data into actionable business insights

IT cost optimization isn’t about cutting corners — it’s about making sure every dollar spent serves a purpose.

Case studies.
Hear what others have say.

4.9

All chances are you'll impressed too.

5.0

Many thanks Mat. Really appreciate your team's hard work over the last few months. This has not been an easy task.

Dr. S.Iyabo Tinubu-Karch
CEO Sidra Medicine

4.5

RMI being ISO 27001 and 14001 certified. These certifications are a testament to the hard work, dedication, and collaborative efforts of everyone.

Claire Todd
QHSE Manager, RMI

4.3

Thank you for your outsdanding work without any setbacks.

Devid Palcic
CEO Robotina

Start Your Journey

We’re not just compliance auditors. We’re your IT transformation partner—helping you gain full visibility, reduce risk across people and systems, and turn security from a burden into a business enabler.

from

4.900 eur

Time is money. Save both. Book a Free Strategy Call With Our Experts.
Gap Analysis & Readiness Review
Policy Development & Documentation
Infrastructure Review & Hardening
Staff Training & Awareness
License & Vendor Optimization
Quick Wins (low-effort savings initiatives)
No lock-in. Fixed fee. Zero risk.