Making sense of what’s happening in AI and what it means for agentic IT
Every day there's a new AI model. A new benchmark. A new funding round. A new outage. A new "this changes everything" thread. A new paper that supposedly makes the last paper obsolete.
I build and sell an agentic IT platform for a living. I'm supposed to be on top of this stuff. And honestly, I spend a non-trivial amount of my week just trying to keep up with all the AI news.
So I sat down and wrote this, partly to organize my own thinking, partly because I suspect I'm not the only one feeling this way. If you're a founder, an operator, or an IT leader trying to make real decisions in the middle of all this noise, I hope some of it will be useful.
Here's where I've landed on AI in 2026, and what I think it means for the future of agentic IT.
The age of abundant AI is ending
For most of the last three years, frontier AI felt like an infinite resource. You picked a provider, wired up an API, and assumed the best models would keep getting better, cheaper, and more available.
That era seems to be ending. And I don't think most companies have caught up to what that means.
Demand for frontier AI is outpacing supply, and the constraints are physical: energy costs, infrastructure bottlenecks, the economics of serving billions of inference requests per day.
• In April 2026, OpenAI paused its Stargate UK data centre project, citing energy costs and regulatory uncertainty. That project was meant to deliver 8,000 GPUs in Q1. It delivered none.
• Nearly 50% of planned data center projects in the US for 2026 are facing delays or cancellations.
• GPU rental prices for Nvidia's Blackwell chips have surged 48% in 60 days. • CoreWeave has raised prices 20% and extended minimum contracts from one year to three.
• OpenAI's CFO said on the record that the company is "making some very tough trades at the moment on things we're not pursuing because we don't have enough compute."• Anthropic has shifted Enterprise billing from flat per-seat fees to per-token pricing. The subsidies are ending.
• Anthropic has removed Claude Code from the Pro plans while admitting they’ve also made other small adjustments (e.g. weekly caps, tighter limits at peak), citing “usage has changed a lot and our current plans weren't built for this”.
• Starting June 1, 2026, GitHub is also shifting all GitHub Copilot plans to a usage-based billing model.
When supply is scarce, providers prioritize the customers who pay the most. The investor Tomasz Tunguz recently described five characteristics defining this new era:
1. Relationship-based selling (SOTA models reserved for strategic customers)
2. AI to the highest bidder (prohibitive pricing for everyone else)
3. Available but slow (no performance guarantees)
4. Inflationary commodity pricing (demand compounding against fixed supply)
5. Forced diversification (developers pushed toward smaller models, open source, or on-prem until infrastructure catches up)
The moment that made this all real for me was when, in April 2026, Anthropic released Claude Mythos Preview, which the company describes as a step change over its previous models. In internal testing, it autonomously discovered and exploited zero-day vulnerabilities in every major operating system and web browser, including a 27-year-old bug in OpenBSD. Normally a capability jump like that would kick off a months-long race between labs to ship their own version. Instead, Anthropic did something unusual: it chose not to release the model publicly at all.
Access to Mythos is reserved for a consortium called Project Glasswing. The members: AWS, Apple, Cisco, CrowdStrike, Google, JPMorgan Chase, Microsoft, NVIDIA, Palo Alto Networks, and the Linux Foundation. The US Treasury has publicly requested access and is expected to receive it. Anthropic is giving these partners $100 million in usage credits to find and patch vulnerabilities in critical infrastructure. Everyone else, including the vast majority of companies that have spent the last three years building products on Anthropic's API, does not get Mythos. It's the first time in nearly seven years that a leading AI lab has so publicly withheld a model from general availability.
There are legitimate safety reasons for that decision. I'm not criticizing it, though some will argue this is a PR stunt to reinforce Anthropic’s safety-focused positioning. But as a founder building on top of this infrastructure, I can't ignore what it can signal. If the strongest models move toward a world of consortium access, strategic partnerships, and government briefings, with only hyperscalers and bigger institutions getting a seat at the table, what does that leave startups and mid-sized companies?
If you're building on frontier models right now, this is the reality you're planning against, whether you realize it or not.
AI is more operationally fragile than people admit
The other thing I don't see founders and leaders talking about enough is how unreliable AI systems still are in production.
1. Amazon spent early 2026 dealing with this firsthand. Its internal coding agent Kiro autonomously deleted a production environment, causing a 13-hour AWS outage. By March, a string of AI-assisted code deployments took down Amazon's retail website for hours, locking millions of shoppers out of checkout and wiping an estimated 6.3 million orders in a single incident.
2. A rogue AI agent at Meta posted internal information that led an engineer to accidentally expose sensitive company and user data to unauthorized colleagues for two hours, classified internally as a "Sev 1." A Meta safety director publicly described how her own agent deleted her entire inbox, despite explicit instructions to confirm before taking any action.
3. /PocketOS, a company that sells software to car rental businesses, went into chaos mode after a rogue AI coding agent deleted the company’s entire production database and its backups.
Put the three together and you get a clearer picture of the operational reality underneath AI in 2026. The tech is transformative but it's also unstable in ways that matter if you're running production systems.
Some companies are already hedging
This is where it gets interesting for me, because some companies aren't waiting to find out how the scarcity and the model provider dependency stories play out. They're getting their hands dirty.
Intercom recently launched Fin Apex 1.0, a customer support model built on an open-weights foundation that the company says outperforms frontier models on its specific task. Their thesis is blunt: pre-training has become a commodity. The real edge is in post-training, fine-tuning models on your own domain data until they beat the generalists at the thing you actually care about.
Cursor, the AI code editor that hit $2 billion in annualized revenue in early 2026, built its Composer model on top of Kimi K2.5, an open-source model from Chinese lab Moonshot AI. That only came out when a developer intercepted Cursor's API traffic. It sparked a broader conversation: the most capable open foundations available today disproportionately come from Chinese labs. DeepSeek, Qwen, Kimi. These are the models companies are quietly building on when they want performance without frontier-lab dependency.
This is arguably the worst-kept secret in Silicon Valley. And it tells me something about where the market is heading: toward a world where application companies own more of their stack, and frontier labs become one input among several, not the input.
Where I think durable value actually gets built
Here's the part I've been thinking about the most, because it's the part that informs how we build Primo.
Hebbia's George Sivulka articulated it better than I could in a recent piece: foundation models, no matter how powerful, will never know how your specific team does its specific work. He calls it "process engineering." Software isn't just code. It's a stored process. It encodes the way a specific team cooperates on a specific problem. The private credit desk at one firm uses different compliance flags than the private equity team at the same firm. Two IT managers at the same company will have entirely different standards for how onboarding should run, how access reviews happen, how tickets get triaged.
Foundation models can't be opinionated about any of that because they're built for every use case on Earth at once. They can't know, and frankly don't need to know, the specific preferences of any particular team.
That's the opening for vertical software because the institutional knowledge encoded inside is what’s valuable.
What most people get wrong is that better foundation models don't erode vertical software. When reasoning models like OpenAI's o-series shipped, everyone predicted legal AI would get crushed but the opposite happened. Vertical legal AI had its best year ever, because stronger models made the orchestration layer more reliable, not less. The orchestration layer is where the trust lives. You can have the most capable model on Earth and still produce garbage outputs if you don't have the scaffolding to constrain, verify, and route that capability through a specific professional workflow.
2025 was the year AI became truly useful for law. 2026 is becoming that year for finance and cybersecurity. I'd argue it's also that year for IT.
What this all means for agentic IT
So here's where I land, after talking to many IT teams and stepping back from all the noise.
How do you build something durable in a world where your underlying models may become gated, expensive, slower, or quietly different from the ones you shipped with?
Below are a few ideas that I often come to and that shape how I think about Primo and IT.
The moat is the process. Your IT team's workflows, your company's compliance posture, your specific onboarding and offboarding flows, etc. None of that lives in a foundation model. It lives in the software that encodes how your team actually operates. That's the layer that gets more valuable as models improve, not less.
Agentic IT is empowerment. I say this a lot, but I mean it more in 2026 than I did a year ago. The compute constraints and the rogue agents examples aren't arguments against AI. They're arguments for keeping humans in the loop where the stakes justify it. The IT teams that win with AI aren't the ones that hand everything over and hope for the best. They're the ones that use AI to handle the routine stuff so they can focus on the work that requires judgment, relationships, and context no model will ever have.
You need an AI-native stack. You cannot place AI agents on an IT stack that doesn’t have the right context, knowledge, and the proper data to work with. The underlying stack that AI communicates with is critical for quality answers and actions. In IT, you need to own the APIs, you need quality workflows, a system of record, and strong integration with HR systems.
The short version, for anyone who skipped to the end
AI is real. Agentic IT is real. But the infrastructure underneath both is more fragile, more political, and more economically strained than the marketing suggests.
The companies that will win the next few years aren't the ones with the best AI demo. They're the ones that understand their moat isn't the model, it's the process knowledge they encode into the layer on top of it. They're the ones that build agentic systems as extensions of their IT teams and can do more with the same resources.
AI doesn't need you to believe in it uncritically. It just needs you to use it well.
If you're overwhelmed by the pace of all this, you're not alone. I am too. But the signal underneath the noise is clearer than it looks. I hope this helped uncover it a little.
Recommended articles
How to Create an Efficient IT Onboarding Process for New Employees
Starting a new job is equal parts exciting and nerve-wracking. No matter how many interviews and coffee chats a new team member did during the hiring process, they’re stepping into the unknown.
As a hiring manager or HR leader, your goal is to harness this energy and make them feel comfortable and fit in.
But very few experiences will burst their bubble like feeling forgotten about. Showing up for their first few days with no computer, no login, and nobody to help is immediately alienating. And it puts pressure on their new colleagues to help out.
Only 12% of employees believe their company does a good job of onboarding team members. And in our modern, digital-first work environments, this starts with IT.
This article explores the value of well-designed, efficient IT onboarding for new employees. And we also look at the keys to doing this well, without wasting time and effort.
What is IT onboarding?
IT onboarding is the process of getting new employees up and running with company information systems. These include computers, phones, and tablets, as well as user profiles, cybersecurity policies, and network access.
A fully onboarded employee:
• Has their own devices, including remote workers
• Can log in and use them safely
• Has access to the wi-fi network
• Can use communication channels like email, Slack, Microsoft Teams, and Zoom
• Knows where to look for more information should they need it
IT onboarding is arguably the very first thing a new employee needs to succeed. Before they can fully understand the company’s mission and cultural values, or even get to know their new team mates, they need IT access.
Typical challenges when onboarding new employees
For such a fundamental part of the hiring process, IT onboarding remains difficult. In fact, it may be harder today than in previous eras.
The cliché cubicle setup was simple. Everyone needed the same computer and phone on their desk, the same network access, with relatively few exceptions.
Today you have remote employees using a wide range of both hardware and software. A salesperson may need vastly different IT equipment from an engineer.
IT onboarding is challenging and often falls short for the following reasons:
• It’s time consuming: The average onboarding process involves around 50 administrative steps. IT setup alone can easily account for 20 or more of those, and will quickly become a bottleneck if your processes are inefficient.
• It’s increasingly personalized: Employees love to select their own hardware, and some have specific technical requirements. You may also have different nationalities, which means different keyboards and operating languages.
All of this means a one-size-fits-all IT setup won’t work.
• There are lots of moving parts: Between the devices themselves and the software setup required, you can have more than 10 IT vendors per employee. Which also means different timeframes—hardware orders may take days or weeks, while creating a user profile might only take a moment.
• Some technical skills are required: Corporate systems may not be as technical as they used to be, but HR and office managers may not feel well equipped to manage IT hardware. If you don’t have a dedicated IT expert on staff, you either need to lean on other skilled employees for support or bring in outside help to resolve issues. Both of which add time and complexity.
• Onboarding is cross-functional. Every employee needs onboarding, but it’s not always clear who should lead. The hiring manager, an HR person, the IT person, or someone else? This inbetween status can mean onboarding isn’t given the attention it deserves, and new employees are overlooked.
Whether you have a robust onboarding process or not, it’s a good time to look closely at your IT rollout. Ensure new employees get the smooth welcome they deserve.
8 IT onboarding best practices
A good employee onboarding process is the best way to overcome the common issues above. Here’s what should be in yours.
1. Prepare your pre-onboarding routine
Even if each onboarding may have its specificities, you want a repeatable, consistent approach for every new employee. Ideally, you’ll have a checklist to work through as soon as a work contract is signed.
This starts with hardware. Ensure all laptops, monitors, phones, and extras are delivered and ready to use before the person starts. That also means installing the necessary hardware and creating user permissions.
There’s a lot more work here than many admins anticipate. You have to order from several providers (such as Apple for the computer, Amazon for the hub and screen), and track to make sure everything arrives where and as intended.
You then have to configure these items by hand. Or ask your brand new employee to self-set up, which is not a great onboarding experience.
Your best option is to use a service like Primo with zero-touch deployment. Primo pre-configures devices to your specifications, so they arrive with new employees ready to use:

2. Provide secure access and credentials early
Start dates can shift and onboarding can throw up surprises, so it pays to prepare in advance. You can easily set up employee accounts and even share their email access ahead of time, so they’re ready to log in right away.
Send the new hire their login credentials for email and other key software prior to their start date. They don’t actually need to do anything with it, but it’s good to know it’s ready for them.
That includes security tools like password managers, and security protocols like two-factor authentication (2FA). Again, they don’t need to connect before day one, but they should have everything they need to get started right away.
Finally, ensure newcomers have access to all key business software: Google Suite or Microsoft Office, Notion or Asana, Slack, and more.
An IT operations system like Primo can also really help here. Primo lets you create new user profiles in just a few clicks, and automatically adds users to the tools they need in their specific role. The tools required can be job-dependent and vary hugely between users, so a one-size-fits-all software setup won’t work.
Done well, you don’t have to manually visit each individual platform. And you never forget anything important.

3. Document policies and create useful onboarding guides
Most young companies don’t have clearly-stated onboarding policies. This leaves it up to individual managers and admins to welcome employees on a case-by-case basis. That may work when you have the time to dedicate real attention to onboarding.
But as soon as your attention is elsewhere—or if you’re hiring very quickly—newcomers can be left behind. And more broadly, you want a consistent experience for all new employees. So a documented process and policy is best.
Include step-by-step guides for common tasks. Even better, prepare a 4-week onboarding template that any manager can quickly update and tailor to their roles.
That can start with IT. Provide easy-to-follow documentation, videos, or tutorials explaining how to use essential systems like email, project management tools, and key software.
Even if a new employee has used Notion, Slack, or Jira before, they may not use them your way.
4. Emphasize cybersecurity training
With the amount of digital connectivity and data access every company has today, security training is increasingly important. New hires need to know the importance of protecting customer data and avoiding scams.
Cybersecurity awareness and training should be one of the first steps in onboarding—as soon as possible after the employee has access to your systems. In fact, IT onboarding is now a core component of becoming compliant in many schemes. You must prove that employees know how to be safe and responsible with company data.
Train new employees on data protection policies, phishing risks, secure file sharing, and acceptable use of company systems.
Just as crucially, emphasize the cultural value you place on security (if indeed it is a value). Don’t assume that team members come from vigilant, security-conscious companies. Many will need to develop good habits, and it’s best to start immediately.
5. Use mobile device management systems
IT management involves so many different processes, hardware, and software. Teams are increasingly distributed, and your devices are traveling all over cities and countries every day.
This makes onboarding (and ongoing maintenance) really difficult. And it can be a major security risk.
Good mobile management brings all of your devices together into one system of record, accessible and manageable from anywhere in the world. You can access, lock, and wipe any device, no matter where it is. You can also create accounts, change passwords, and update software.
This software lets you confidently hand out devices on day one, including to remote employees. If they have any issues logging in or finding things, you can take control and help out.
This is obviously important for companies with remote staff. But even if your whole team is mostly on-site, in-office, modern employees have laptops and phones they take home with them. A centralized tool to track—and if necessary, access—these devices is paramount.
6. Automate key steps in the process
Even in small companies, employee onboarding is a major task. For fast-growing companies, it’s a major hurdle to scaling. And preparing the IT hardware and environment is often to blame for holdups.
Unless you automate. You shouldn’t have to manage onboarding on a 1:1 basis for each new employee. Good tools can manage the more manual, repetitive aspects.
Key steps to automate include:
• Ordering devices and having them delivered
• Pre-configuring the software and user profiles for these devices
• Creating accounts on all key tools, specific to each user’s role and responsibilities
• Guiding users to the right IT trainings for them
To do this, you need the right system.
7. Get feedback and ensure everything’s working
If possible, it pays to check in with new employees after a few days or weeks to make sure that everything’s working as they need. That could be a scheduled Slack message from the IT team, or a 10-minute Zoom call to show them a few advanced tips and tricks.
That’s also important for companies without dedicated IT support. Their onboarding manager or HR rep will doubtless schedule catch ups in the first few weeks. Make a specific point to check that they’re happy with their devices and aren’t getting lost in the company intranet or communication tools.
New employees are typically shy, and don’t want to admit when systems are confusing. But it’s perfectly normal to be confused, and a quick catch up should iron out any issues they’re having.
8. Streamline your IT onboarding process
Good onboarding can absolutely be the difference between companies with long-serving, happy teams, and those with high employee turnover. A negative onboarding experience is shown to cause employees to look for new opportunities in the near future.
And it doesn’t take a huge amount to deliver a good experience. While some companies offer extensive welcome packages and onboarding retreats, the most important is to make employees feel valued.
Show them that you’re excited to have them and have prepared for this moment. At the very least, that means having devices and accounts configured and ready to go.
And the best way to do this consistently is with good automation. For example, Primo helps companies manage IT onboarding in just minutes, without any team members specifically focused on this task. Devices are delivered anywhere pre-configured, and it only takes the IT or HR person responsible a few clicks. Which means every onboarding can be both easily personalized, and efficiently systematized.

That’s the beauty of automated solutions, they work every time and save countless hours.
Zero-touch deployment (ZTD) is automated device provisioning that requires no manual IT setup once the device is powered on. Hardware is registered to an OEM portal at purchase. On first power-on, the device checks in with that portal, gets routed to your MDM, and downloads the configuration profiles, apps and security policies tied to that user’s role.
Three prerequisites, the same on every OS:
- An authorized reseller that can pre-register the device to the relevant OEM portal
- The OEM portal itself: Apple Business Manager, Microsoft Autopilot, or Android Enterprise zero-touch
- An MDM/UEM platform wired into the portal
The OEM programs are free from Apple, Microsoft and Google. The MDM, procurement integration and rollout work are not. This article covers how the three OS programs work, what the out-of-box experience looks like, and how to roll zero-touch out on a 1–3 person IT team.

Zero-touch vs traditional manual deployment
The old way:
- Procure the device
- Receive it at the office (or the IT lead’s home)
- Image the OS
- Install management agents
- Configure policies and apps by hand
- Ship to the employee
- Walk the employee through plugging it in
- Manually enroll into the MDM during a video call
The zero-touch way:
- HR creates the new hire in the HRIS
- The device, ordered through a zero-touch-eligible channel, ships sealed directly to the employee and configures itself on first power-on
Eight steps to two. Even if your “old way” only takes 90 minutes per device, multiply that by 30 hires per quarter and you’ve burned a full work-week on a process that should have been automated.
The other win is consistency: every device gets the same baseline, regardless of who was on call when it shipped.
What zero-touch deployment looks like on each OS
Apple-only writers describe ADE in detail. Windows-only writers cover Autopilot. The reality for 2026 SMBs is mixed-OS fleets. You need all three to fit one workflow.
Apple: Apple Business Manager and Automated Device Enrollment (ADE)
Apple Business Manager (ABM) is the OEM portal for any organization buying Apple devices. For ABM to pre-register a device automatically, the hardware has to be purchased through Apple Business or an authorized Apple reseller enrolled in the program. Retail-channel devices are not auto-linked to ABM. They can be enrolled manually, but they don’t ride the zero-touch flow out of the box.
Automated Device Enrollment (ADE) is the mechanism inside ABM that routes a device to your MDM on first power-on. The device sees the ABM record, learns which MDM to talk to, and enrolls automatically. ADE is the current name for the program formerly known as the Device Enrollment Program (DEP). If a vendor’s docs still reference “DEP”, treat that as a freshness signal worth noting.
For BYOD or personally-owned devices, Apple offers Account-Driven User Enrollment, which is a separate flow keyed off Apple ID rather than serial number. Most company-owned deployments use ADE.
Windows: Microsoft Autopilot
The Windows zero-touch story has three moving parts that often get conflated:
- Microsoft Entra ID is the identity provider (formerly Azure AD)
- Microsoft Intune is Microsoft’s MDM
- Windows Autopilot is the zero-touch deployment service that ties hardware to Entra ID and routes the device to an MDM
Autopilot can route to Intune by default, or to a third-party MDM through partner integration. Hardware is registered through OEMs (Dell, Lenovo, HP, Microsoft Surface) using the device’s hardware hash. The hash can be uploaded manually for devices already in your possession, or pre-loaded by the reseller for new orders.
On first boot, the device authenticates against Entra ID and applies role-based configuration during the out-of-box experience (OOBE).
Android: Android Enterprise zero-touch enrollment
Android zero-touch enrollment is Google’s equivalent program. Devices purchased through a zero-touch reseller are linked to your organization’s zero-touch account at the moment of purchase.
When the device is powered on, it downloads the configured Device Policy Controller (DPC) from your MDM, applies the work profile or fully managed configuration, and is ready for the user. Works across major Android OEMs (Samsung, Google Pixel, Motorola, Sony, and others certified for Android Enterprise).
Cross-platform comparison

If you’re running a mixed fleet, the platform question becomes: does your MDM speak to all three of these portals from one console?
Primo states support for Apple Business Manager and Windows Autopilot on its procurement page. Android zero-touch is supported at the OS layer (Primo manages Android devices) but pre-registration of Android hardware to the zero-touch portal isn’t a publicly-claimed part of the procurement workflow as of writing. For Android-heavy fleets, confirm coverage during your demo.
The end-user out-of-box experience (OOBE)
Done well, this is what the new hire actually sees:
- Sealed box arrives at the new hire’s address, two to three days before start date
- On Day One, they unbox, plug in, power on, connect to Wi-Fi
- The device asks them to sign in with their work credentials
- They authenticate through your IdP (with MFA)
- They wait while policies, apps and configurations install — this often takes 15–30 minutes, depending on the apps in the role profile, network speed and policy payload
- They land on a ready-to-use desktop with email, chat, calendar and role-based apps already signed in
No download links. No “install this then install that”. No screen-share with IT to fix the SSO loop. If the new hire is offline during this window, the device waits patiently. The flow resumes the moment they connect to Wi-Fi.
HR-triggered zero-touch onboarding in practice
Zero-touch on the device is one half. The trigger upstream is the other half.
- HR creates the new hire in an HRIS such as BambooHR, HiBob, Factorial, Eurécia, Deel, Dayforce, Charlie, ADP or Gusto
- The HRIS event fires into your remote device management platform
- The platform places the hardware order with the reseller, including pre-registration to the OEM portal where supported
- The device ships to the new hire’s address
- The platform provisions the IdP account and role-based SaaS access in parallel
- On Day One, the employee powers on, authenticates through the IdP, and lands on a fully configured machine
Primo states this directly: “HR triggers it. Primo executes it.” and the procurement workflow runs returns and wipes from the same HR events. So the same trigger that fires onboarding also fires offboarding, and parity stays intact.
For the full operational playbook around steps 1, 5 and the Day One experience, see the IT onboarding checklist for lean IT teams.
The procurement layer most zero-touch guides ignore
This is the part that gets glossed over in vendor docs, and the part that quietly breaks zero-touch in practice.
For ADE, Autopilot or Android zero-touch to work, the hardware has to be ordered through a reseller that supports OEM pre-registration. Retail or consumer-channel devices generally aren’t auto-linked to your OEM portal. You’d have to enroll them manually after the fact, which costs most of the zero-touch benefit.

What goes wrong without procurement integration:
- IT manually uploads hardware hashes for Windows devices after they arrive
- IT manually adds serials to ABM after delivery (and hopes the device hasn’t already been set up)
- International orders get stuck in customs because the reseller doesn’t ship to the destination country
- Devices arrive with the wrong OS image, language or region
Primo’s procurement workflow handles this end-to-end: sourcing through authorized resellers (“partners with manufacturers and authorized repair centers”), shipping to 60+ countries in around 5 business days, configuring apps and security before the device leaves the warehouse, and triggering returns automatically from your HR workflows.
A zero-touch deployment rollout plan for SMB IT teams
If you’re going from manual to zero-touch this quarter, here’s the rollout sequence that won’t break your live onboarding flow.
- Standardize role-to-device-profile mapping. Designer → MacBook Pro M-series with design tools. Sales Rep → MacBook Air or comparable Windows laptop with the sales stack. Define this once.
- Connect the HRIS. Pipe the new-hire event from your HR system into your RDM platform.
- Configure the OEM portals you need. ABM if you’re on Apple. Autopilot if you have Windows. Android zero-touch if mobile is in scope. Most teams don’t need all three on day one.
- Define MDM configuration profiles per role. Encryption, password policy, app baseline, restrictions, idle-lock. Test one role end-to-end before duplicating.
- Pilot with one department. A team of 5–10 hires per quarter is ideal. Watch what breaks.
- Extend to all hires. Once the pilot runs for a month without IT intervention, roll out the same flow to everyone.
- Set up the reverse workflow for offboarding. Same RDM, same HRIS trigger, mirror actions: remote wipe, return label, SaaS access revocation.
Timelines vary by team and platform. For a 1–3 person IT team with a single primary OS, a few weeks of focused work is realistic; multi-OS rollouts with custom configuration profiles take longer. Anything that needs a multi-quarter rollout suggests the platform is too heavy for the team running it.
Can you do zero-touch deployment without Intune?
Yes — and for most SMBs, it’s the more practical path.
Microsoft Autopilot is the zero-touch deployment service. Intune is Microsoft’s MDM. The two are often bundled in Microsoft’s documentation, but Autopilot supports partner MDM integration, meaning third-party MDMs can receive devices from Autopilot in the same OOBE flow.
The trade-offs:
- With Intune: tightest integration, single Microsoft admin surface, full feature parity with Microsoft’s roadmap. Strong fit if your stack is already Microsoft-led (Entra ID, Microsoft 365, Defender).
- With a partner MDM: single console across macOS, Windows, Linux, iOS and Android, lighter to deploy, often a better fit for mixed-OS SMB fleets where Microsoft isn’t already the centre of gravity.
Autopilot itself depends on Microsoft Entra ID plus an MDM service to receive the device. A platform like Primo enrolls in that MDM-service role: your Windows devices ride the Autopilot flow into Primo’s console, where they’re managed alongside Mac, Linux, iOS and Android. Confirm exact Entra/Autopilot licensing requirements with Microsoft for your stack. They vary by edition.
Zero-touch offboarding and access cleanup
Zero-touch shouldn’t end at first login. The same automation should run in reverse on exit.
When the HRIS marks the employee as terminated, the RDM platform should:
- Trigger a remote wipe (full or selective depending on ownership)
- Generate a return label and email it to the employee
- Revoke IdP access (which cascades through every SSO-connected app)
- Deactivate accounts on apps not behind SSO
- Mark the asset for reassignment or retirement in inventory
Same workflow, same trigger, opposite direction. Primo states this directly: “Revoked automatically on their last day to prevent security breach.” and “Returns, wipes, and reassignments triggered automatically by your HR workflows.”
A device wipe alone isn’t offboarding — identity cleanup is the other half. Pick a platform where both live in the same console.
Frequently asked questions
What is zero-touch deployment?
Zero-touch deployment is an automated method for provisioning devices without manual IT setup. When a new device is powered on and connected to the internet, it identifies itself to the organization’s MDM platform via an OEM portal (Apple Business Manager, Windows Autopilot, or Android Enterprise), then automatically downloads configurations, apps and security policies.
How does zero-touch deployment work?
The device’s hardware identifier (serial number or hardware hash) is registered with the OEM portal at purchase through an authorized reseller. When the employee powers on the device, it checks in with the OEM portal, which routes it to the organization’s MDM. The MDM applies role-based configuration profiles automatically.
What is the difference between zero-touch deployment and zero-touch enrollment?
Zero-touch enrollment is the enrollment step. The device automatically joins the MDM. Zero-touch deployment is the full workflow, which also includes pushing apps, security policies, and identity configuration so the device is ready to use. Enrollment is one piece of deployment.
What is Apple Automated Device Enrollment (ADE)?
Automated Device Enrollment is Apple’s mechanism for zero-touch deployment of Macs, iPhones, iPads and Apple TVs. Devices bought through Apple Business or an authorized Apple reseller enrolled in the program are automatically linked to the organization’s Apple Business Manager account and routed to the configured MDM on first power-on. ADE replaced the legacy Device Enrollment Program (DEP).
What is Windows Autopilot?
Windows Autopilot is Microsoft’s zero-touch deployment service for Windows devices. It registers devices with Microsoft Entra ID and routes them to Intune or a partner MDM, then applies role-based configuration on first boot. Devices can be sourced through OEMs that pre-register hardware hashes, or hashes can be uploaded manually.
Can you do zero-touch deployment without Intune?
Autopilot itself requires Microsoft Entra ID and an MDM service to route the device to. Intune is Microsoft’s MDM, but Autopilot also supports partner MDM integration, meaning a third-party MDM enrolled in the Autopilot partner programme can play that role for mixed-OS SMB fleets that don’t want a separate Microsoft-only console. Confirm exact Entra and Autopilot licensing requirements with Microsoft.
What is Android Enterprise zero-touch enrollment?
Android zero-touch enrollment is Google’s program for automatic Android device deployment. Devices purchased from a zero-touch reseller are pre-registered to the organization’s account. On first boot, the device downloads the configured device policy controller (DPC) from the MDM and applies all required policies.
Is zero-touch deployment only for large enterprises?
No. Apple Business Manager, Windows Autopilot and Android Enterprise zero-touch are free programs from the OEMs — the cost is the MDM platform and the procurement workflow that pre-registers hardware. The main prerequisite is buying hardware through an authorized reseller that supports zero-touch registration.

Primo now has an MCP server.
A device gets flagged. You need to know who it's assigned to, when it was last active, whether there's an open ticket on it, and what access that employee currently has.
You open Primo. You look up the device. You check the employee profile. You cross-reference the ticket queue. You piece it together.
That's four steps for a question that should take one.
Here's the same thing with Primo's MCP server connected to your AI assistant: you type "what's going on with this device?" and get back the device details, the assigned employee, their onboarding status, and any related tickets. One prompt. Full context. No tab-switching.
That's what we shipped.
MCP: Model Context Protocol
MCP (Model Context Protocol) is an open standard that lets AI assistants like Claude, ChatGPT, or Cursor connect directly to external tools. Instead of answering from training data, your AI queries your actual systems in real time.
With Primo's MCP server, that means your AI assistant can talk directly to your IT fleet. Devices, employees, accessories, tickets: all accessible from the AI tools you already have open.
Why it hits differently with Primo
Most IT tools that support MCP give you access to records. Primo gives you access to a connected data model.
Because Primo ties devices, employee lifecycle, SaaS access, and ticketing into one operational system, a single prompt can cross all of those layers at once. When you ask about a device, it comes back linked to an identity. When you ask about an employee, you get their full IT footprint: what they have, what they can access, what's pending.
That's the difference between querying isolated records and querying a unified IT operations platform.
It also means you can get a compliance-ready view of your entire fleet in one prompt. Preparing for an ISO 27001 audit and need to know which devices aren't enrolled or which employees still have active access after offboarding? That's a question your AI can now answer across your whole fleet, not just device by device.
A few things you can do from a single prompt today:
• Pull a device's full IT history (enrollment date, successive assignments) alongside the employee it's assigned to ;
• List all open tickets filtered by status, priority, or assignee ;
• Check which employees joined this month and whether their devices are provisioned ;
• Spot accessories that are unassigned or overdue for return ;
• Search across your entire fleet without opening a single filter.
And when you're ready to move beyond read-only, write access lets you create tickets, add comments, update status and assignee, and perform device actions like locking or wiping directly from your AI client.
What your AI can do in Primo

One note on device actions: locking and wiping are irreversible. Write mode is there for teams who want speed, but it's worth confirming before you act.
Getting connected
Authentication runs through OAuth. No API key to generate or manage, you sign in with your existing Primo account and you're done.
The server URL is https://api.getprimo.com/mcp. By default it runs in read-only mode. To enable write access, use https://api.getprimo.com/mcp?readOnly=false.
Setup is the same across clients: go to the MCP Servers section in your settings, add the URL, and complete the OAuth flow. Full instructions for Claude, ChatGPT, and Cursor are in the Primo help center.
A good place to start
Read-only prompts are the fastest way to build trust in the workflow before moving into writes. Try these:
"Show me all devices that haven't been active in the last 30 days."
"What open tickets are currently unassigned?"
"List employees who joined this month and check whether their devices have been provisioned."
Once that feels natural, write access opens up the rest.
The MCP server is live now. Get started at https://api.getprimo.com/mcp, or head to the help center if you want step-by-step setup instructions for your AI client.