Services

Reverse Engineering

Have you inherited a black box system? It is not that uncommon. People move on taking their knowledge. Sometimes documentation turns out to be inadequate or non-existent. Often these systems will just keep performing their task without incident. But this is of course undesirable from a business continuity perspective. These systems can become blockers for other projects or when migrating infrastructure. We have successfully reverse engineered numerous black box systems to provide documentation, migrate or replace them completely.

Security Operations

Security operations are the practices and procedures to prevent, detect and respond to security threats and incidents. It comprises of three building blocks; People, processes, and technology for managing and enhancing an organization’s security posture. We have extensive experience managing security technologies, teams and policy frameworks and can assist determining your current security posture or source and manage a suitable partner for penetration testing and vulnerability assessments. Think of us as your on-call CISO.

Monitoring

If it isn’t monitored it doesn’t exist. Monitoring and alerting are core operational components in almost any infrastructure. Finding the right balance between which data to collect and what to alert on is often a challenging and ongoing task. Workloads, traffic patterns, data and software evolve which can affect performance and availability. This can be even more challenging in an elastic environment where machines or containers are created and deleted automatically based on demand.

Linux

We have over 20 years of commercial experience managing Linux systems in production environments. Our aim is to provide pragmatic solutions with a strong focus on security, scalability and maintainability. We primarily work with Amazon Linux, Arch Linux, CentOS, Debian, RedHat, Ubuntu and derivatives but also have experience with OpenBSD and Solaris. Our Linux services include: Design Deploy Maintain Security hardening Security auditing Trouble shooting Performance tuning.

Infrastructure

We design, build and support architectures in data centres, on premise environments, public clouds and hybrid infrastructures. We have built VoIP and mobile telecommunications solutions, critical internet infrastructure and highly available, self-healing, SaaS platforms. Modern infrastructures often cross boundaries between physical and virtual environments. One of the advantages is that it allows to strategically choose the optimal location for individual components. It also introduces additional design options for redundancies, backups and recovery.

Cloud Migration

A journey to the cloud has to be structured in order to be successful. Cloud services must be evaluated to take advantage of their capabilities and a roadmap should be designed, going from current to future state without interrupting business activities. The following are common cloud migration strategy considerations. Rehost (“lift and shift”) Also known as the forklift migration this strategy allows for a quick move to the cloud. Systems are converted to run in the cloud environment with as little change as possible.

Private Cloud

While public cloud providers like AWS offer an unparalleled amount of services and options there are often good reasons for in-house infrastructure as well. And there are quite a few open source options available that will deliver a very robust and feature rich private cloud. Each of those vary in complexity and the best option varies per organization. We would recommend to also include the following 4 products in your evaluation of available options: