Cloud Application Security Assessments
AWS and Azure offer hundreds of services in the cloud. It can be a challenge understanding the security implications of using these services when architecting applications. We help conduct design reviews and code reviews to ensure that your applications are secure and meet industry standards.
Big Data Cluster Configuration Reviews
Big data technologies like Hadoop and its ecosystem are new and evolving at a rapid pace. The best practices for setting up and running a secure cluster are hard to find and implement. We help configure and review deployments to ensure that your data remains secure and protected.
Custom Security Software Development
Security components of applications are critical for protecting users and data. We help integrate and build custom identity management/single sign-on components to meet your needs. We have experience building applications with OpenId Connect, OAuth and Active Directory.