IoT Consulting, Audits, Sprints, Retainers

Turn Edge-to-Cloud Uncertainty Into Evidence, Fixes, and Ongoing Proof

Combotto helps engineering-led teams audit the gateway, MQTT, ingest, identity, and observability path under the most pressure right now. Start with a focused audit to get a decisive picture of risk, use the findings to drive a hardening sprint, and keep the path under review with repeatable delta checks.

Proof-led engagement path

AuditHardening SprintRetainer Review
  • Start with the smallest scope that can produce a real decision.
  • Work directly with Thomas Bonderup from scoping through remediation path.
  • Reuse the same evidence chain to prove fixes and catch drift later.

Send the asset or message path, the pressure behind the request, and the timing window. You will get a reply with likely scope and the next practical step.

Based in Denmark • Remote-friendly • English & Danish

Specialist IoT Audit Consulting

Thomas Bonderup

Senior IoT Consultant

Find the path under pressure, turn it into evidence, and decide what to fix next.

Thomas Bonderup

I help engineering-led teams get a clear, evidence-backed view of the edge-to-cloud path creating risk right now — especially where gateways, MQTT infrastructure, identity, TLS posture, buffering, and observability need to hold up under launch deadlines, security reviews, incident follow-up, or fleet scale-up.

Best fit

Launch, security review, incident follow-up, fleet scale-up

Starting scope

1-3 assets or one path under pressure

What you get

Evidence, findings, prioritized backlog

Engagement path

Audit -> Hardening Sprint -> Retainer Review

What keeps the work sharp

  • You work directly with the same person from scoping through evidence review and next-step recommendation.
  • Technical evidence instead of presentation-only consulting or another broad discovery cycle.
  • Clear findings, owners, verification steps, and a practical next move for leadership and engineering.
AuditMQTTGatewaysObservabilityEdge-to-cloud

Independent IoT audit consulting based in Denmark, working remotely with teams across edge-to-cloud systems.

Engagement path

How engagements usually start

Combotto starts with one edge-to-cloud path under pressure. The audit creates a shared baseline for leadership and engineering. From there, the team either hardens the path in a sprint, keeps it under review in a retainer, or runs the backlog internally.

Why teams bring me in

Fast audit clarity when launch pressure or customer scrutiny arrives before the architecture story is fully defensible.

System-level review across gateway, broker, ingest, identity, TLS, buffering, and telemetry paths.

Evidence-backed findings with owners, verification steps, and a clear next move for leadership and engineering.

AuditBaseline first
SprintHarden what matters
RetainerKeep drift visible
Fixed scopeAbout 1 week
Audit

Fast clarity

A focused review of the selected edge-to-cloud path so your team can see where security, reliability, and telemetry risk is concentrated first.

  • Review the gateway, broker, ingest, identity, and observability path under pressure.
  • Get evidence-backed findings your team can use immediately.
  • Receive a prioritized remediation backlog with verification guidance.
  • Leave with a baseline you can act on internally or carry into a Sprint.
View IoT audit details

Best first step when the architecture story needs proof

Implementation2-3 weeks
Sprint

Targeted hardening

A focused hardening pass on the issues most likely to hurt uptime, customer trust, or future scale.

  • Fix the highest-impact issues first across identity, TLS, buffering, durability, or monitoring.
  • Rerun the same checks to show before-and-after proof.
  • Keep scope tight so the sprint ends materially stronger than it started.
  • Leave engineering with clearer guardrails and a cleaner next priority set.
AdvisoryOngoing
Retainer

Drift control

An evidence-backed review cadence for teams that want visibility after the audit and first hardening pass.

  • Run release-based or monthly delta reviews on what improved, regressed, or still needs attention.
  • Keep leadership updated without turning this into a heavy managed service.
  • Reprioritize when customer pressure, architecture, or operating reality changes.
  • Use disciplined review cadence instead of vague advisory time.

References / Client Case Studies

Flagship gateway case study plus supporting references

Start with the Rust gateway hardening case, then review the wider proof library for more examples of how Combotto turns system pressure into evidence, backlog, and a practical next move.

View all references →
Field proof of three STM32 room-health devices publishing live temperature and humidity through Rust IoT Gateway into Combotto Monitor, with fleet screenshots, board-level sensor context, and a planned SCD41 CO2 extension.

7 min read ·

STM32 Room Temperature and Humidity Monitoring Case Study: B-L475E-IOT01A2 Demo with Rust IoT Gateway

Fleet Monitoring Field Proof

Field proof of three STM32 room-health devices publishing live temperature and humidity through Rust IoT Gateway into Combotto Monitor, with fleet screenshots, board-level sensor context, and a planned SCD41 CO2 extension.

stm32room monitoringhumidity monitoring

Shows the system under pressure, the evidence surfaced, and how Combotto turned that into a practical next move.

Review case study
How a before-hardening audit exposed four gateway and ingest findings, a focused sprint fixed them, and the after-hardening check created a clear reference point for ongoing review.

8 min read ·

Rust IoT Gateway Hardening Case Study: From Plaintext Ingest to Verified TLS

Audit -> Sprint -> Retainer Case Study

How a before-hardening audit exposed four gateway and ingest findings, a focused sprint fixed them, and the after-hardening check created a clear reference point for ongoing review.

rustiot gatewaytls

Shows the system under pressure, the evidence surfaced, and how Combotto turned that into a practical next move.

Review case study
A comprehensive reliability and security audit of Combotto's secure edge IoT Gateway, identifying strengths, architectural bottlenecks, and a 90-day roadmap toward production-grade resilience.

Combotto contributes to optimizing secure edge IoT gateway

Security & Reliability Audit

A comprehensive reliability and security audit of Combotto's secure edge IoT Gateway, identifying strengths, architectural bottlenecks, and a 90-day roadmap toward production-grade resilience.

iotrustgateway

Shows the system under pressure, the evidence surfaced, and how Combotto turned that into a practical next move.

Review case study

Flagship gateway path

Audit, sprint, and retainer on the same gateway path

This proof comes from Combotto's own reference Rust IoT gateway: the full Audit -> Sprint -> Retainer case is documented in the flagship gateway case study, with supporting context in the Raspberry Pi 5 migration note, the 24/7 gateway operations write-up, and the audit engine article that makes repeat runs and delta reviews possible.

On that same Raspberry Pi gateway path, the audit turned a vague gateway concern into a concrete finding set, the sprint fixed the highest-impact issues and proved the fixes held, and the retainer turned the hardened state into a reusable reference point.

1. Audit

Turn one pressured path into a concrete finding set the team can act on.

2. Sprint

Fix the highest-impact issues on the same path and prove the rerun held.

3. Retainer

Keep later releases anchored to the hardened state with a reusable comparison point.

1. AuditAudit

The audit turned a vague gateway concern into a concrete finding set.

Leadership could immediately see that the path was exposed. Engineering could see which controls were failing, why they mattered, and what to fix first.

Why it matters

The posture was visibly exposed, the failing controls were easy to identify, and the next remediation steps were already tied to evidence.

  • The exposed posture is obvious in seconds.
  • Failing controls and next actions sit in the same artifact.
  • The report reads like a client deliverable, not a generic dashboard.
2. SprintSprint

The sprint fixed the highest-impact issues and proved the fixes held.

After the hardening work, the same path was checked again. The posture moved from exposed to healthy, the findings cleared, and the proof stayed tied to the same system slice.

Why it matters

The improvement stayed visible on the exact audit surface that triggered the work instead of drifting into a softer, wider scope.

  • The same asset and audit surface now show materially better control outcomes.
  • The comparison stays honest because the rerun is deterministic.
  • Healthy checks plus ingest behavior verify that the hardening actually changed runtime posture.
3. RetainerRetainer

The retainer turned the hardened state into a reusable reference point.

The comparison report shows what improved, confirms there were no regressions, and gives the team a durable reference point for release reviews or monthly check-ins.

Why it matters

Future releases can be checked against a known-good state instead of relying on memory, reassurance, or guesswork.

  • Four improved controls and zero regressions are instantly legible.
  • Later releases can be checked against the hardened state using the same report shape.
  • Leadership gets compact progress proof while engineering gets concrete drift signals.

Field Notes / Expertise Proof

Writing that makes Combotto’s audit judgment inspectable

Articles on gateway, MQTT, identity, and telemetry risk patterns that often become the starting point for an audit conversation.

If one of these pressure patterns already matches your system, prefer direct guidance on your current setup: Start the audit conversation.

View all blog posts →

Start with the system slice that needs an audit

Send the asset or message path, the pressure behind the request, and the timing window. You’ll get a same-day reply with likely audit scope and the next practical step.

Fastest direct route: +45 22 39 34 91 or tb@combotto.io.

Best format: 1. system slice, 2. what is creating pressure now, 3. what decision you need to make, 4. when you need that decision.

Typical response: same business day. Prefer a call? You can book one after I reply.
Combotto.io - IoT Infrastructure | Security | Reliability Engineering