FAQ
Frequently Asked Questions
Is the initial discussion genuinely free of charge?
Yes. The 60-minute initial discussion is entirely complimentary. There is no obligation to proceed and no sales pressure at this stage. The purpose is to understand your challenge and determine whether — and how — DX Strategy can add value.
What company sizes do you typically serve?
We primarily serve mid-to-large enterprises (300+ employees), including global Fortune 500 companies, major financial institutions, and national public-sector organisations. We also engage with high-growth companies where the transformation scope is substantive. Please reach out regardless of size — the initial discussion will clarify fit.
What is the typical project investment range?
Project fees vary by scope, duration, and complexity. As a reference: a strategic assessment (2–4 weeks) typically starts from USD 200K; an enterprise DX strategy programme (2–3 months) from USD 800K; and full implementation engagements are scoped separately. We will provide an indicative range during the initial discussion.
Is remote engagement possible?
Yes. We operate effectively in fully remote, hybrid, and on-site models. Our Dubai and Tokyo teams are experienced in running cross-border programmes across time zones. For significant engagements, we also arrange in-person leadership sessions at critical milestones.
We are currently evaluating multiple firms. Is it appropriate to consult you in parallel?
Absolutely. The initial discussion is specifically designed to give you material for a rigorous comparison — including our perspective on scope, assumptions, team structure, and fee rationale. We welcome competitive evaluation and can structure our input to make that comparison straightforward.
How is confidential information protected?
The initial discussion takes place under a mutual confidentiality expectation. Where sensitive commercial or technical information needs to be shared, we execute a formal mutual NDA before proceeding. All project information is handled under a Need-to-Know protocol, and we maintain ISMS-equivalent information security practices including access controls and audit logging.