Maestro Business Opportunities

Where are the opportunities for Maestro? The greatest opportunities are in Small-to-Medium Enterprises (SMEs).

Small to Medium Enterprises (SMEs)

A small-to-medium enterprise (or SME) typically has less than 250 users, occupies a common physical office, and has an entry-to-mid-tier ERP system for managing operations and financial reporting. It may have a well-defined IT infrastructure, often from a single vendor (e.g., Microsoft DNS/DHCP/domain controller, an Exchange mail server, a SharePoint knowledge server, MS-SQL database Server, etc.), or an ad hoc structure with peer-peer networking providing shared access to resources such as shared data and printers. 

However, a SME often doesn’t have formal processes for document vaulting, non-conformance and issue management, change management/version control, and product data management. Also the ERP system may be perceived primarily as a financial system since it often is controlled by the Finance department, and is not available to engineering staff or provide traceability for serialized raw material or finished goods. Although SME’s may be certified to a QMS  (e.g. ISO 9001), operationally they are often dependent on people-driven document-oriented processes. If electronic documents are used, they are often stored either where they cannot be accessed by all users, or in an uncontrolled network share. 

An SME can also be distributed, where employees do not share a common physical office. In this case, it will typically not have formal resources for sharing information, and will rely on email or ad hoc cloud storage (e.g. Dropbox, OneDrive or iCloud).


Maestro can be used to consolidate existing systems, regardless of whether the SME is centralized or distributed. It can be hosted on a user workstation, on a dedicated server on the local network, or with a cloud hosting provider. Internal hosting may be preferred for its perceived security advantages, but hybrid and cloud architectures can be just as secure – if not more so, since the same security policies will apply regardless of whether the user is connected through the internal network or the internet.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.