We have helped our customers for DevOps development, infrastructure and data centre support, operational management for private, public cloud and custom built high performing clouds. infrastructure migrations for scaling and cost saving.
Scaling the application layers and tiers including and planning web servers, gateways, reverse proxies, database servers and replications and creating added resilience in hardware and software layers.
On security fronts operating systems updates and upgrades including implanting server hardening procedures, NIDS and HIDS monitoring, alert monitoring and attack controls. Implementing firewalls and traffic routing and rerouting form security and protection perspectives. Also following different security programs like OWASP and OSSTMM.
Setting up disaster recovery for different levels and speeds that including backups and fast passed DR sites and hot virtual machine level backups and recovery procedures.
please click on the title below to see more details.
DevOps setup and configuration management
We help our customers automate test, deployment processes, and configuration management and bring development and operations teams together sharing the responsibility through DevOps techniques and speed up your product rollout process, few or our expertise in include Puppet, Chef and Ansible, Jenkin, VSTS,
HockeyApp, and Cordova, xUnit, Junit, Selenium, Jasmine, and Mocha. we can work out variations on open Unix stack and Microsoft platforms according to your needs as well.
Operations and operational support
The remote employees and professionals are helping manage the Infrastructure/Datacentre and cloud operations to our customers in Windows, Unix (Solaris, HP Unix, AIX) And Linux (Redhat, Centos, Debian, Ubuntu, suSE ) within managed and un-managed and purpose-built cloud and cloud applications involving in entire complex support and operational lifecycle.
Security including HIDS, NIDS, OWASP and server hardening
The team has certified ethical hackers and cyber security experts ( CISM, CEH, CIPM, CISSP) experts for securing the infrastructure, testing the applications and infrastructures, cookie and parameter filtering. VPN setups and secure tunnelling. Host-based intrusion detection system (HIDS), network-based intrusion detection system (NIDS) and tools like SNORT and SQUID.
Following and adapting OWASP program and Open Source Security Testing Methodology Manual (OSSTMM) and penetration testing like ISSAF and PEST and HTTP/HTTPS request filtering against cookies and parameters injections.
Our technical experts do have deep insight into SSL vulnerabilities preventions like Heartbleed too.
Scaling and resilience and performance tuning
Database scaling: replications and master-master and master-slave setups for the range of database engines including MySQL, MongoDB, Oracle, MySQL and PostgreSQL. Slow & Culprit queries detection and optimizations.
Load balancing: with Ngnix, HA-Proxy and Apache2 load-balancer including IP load-balancing. Cookie Sharing and load-balancing schemes.
Replications: File replications, Application level replications, Operating systems replications and Hot backups at operating system level.
Block & shared storage setup, management and troubleshooting
We have provided and built solutions around GlustFS, Cheph, NAS, NFS, iSCSI, BTRFS setup, support, troubleshooting and tailoring these technologies to the applications IOPS needs within infrastructures. our teams are also well versed with other storage technologies like SAN.
Virtualization and containerization
We are helping our customers with Virtualizations and Containerizations to meet their technology needs and on-demand scaling ambitions.
Virtualization: with VMWare, EXI, XEN, KVM and Microsoft Hyper-V
Containers: like Dockers and Kubernetes
Disaster recovery and backup management
Extensive experience in setting up disaster recovery procedures for the different level of disasters recovery requirements from partial to complete failure of servers, infrastructure or a complete datacentre.
Setting up backup procedures including hot and cold backups covering databases, files and virtual machines.
Providing help with testing the backups and disaster recovery procedures on regular basis.
Network configurations of switches, routers and firewalls.
Our expertise and experts include CISCO, Juniper, Huawei, HP, Microsoft and Sophos stack and their certified engineers.
We helped configure IPtables, EBtables firewalls including Sophos and AES, VPNs and different kind of gateways.
IP PABX, IP PBX, VOIP, SMS gateways setups and maintenance
Our professionals are helping our customers with creating phone gateways and server infrastructure for handling calls, Text and Video communications, call Recordings and SIP Interfacing and help with phone diallers and auto-diallers and servers with Asterisk,Kannel and CISO solutions.
Single Signon SSO setups for both Identity and Service Providers (IDP & SPs)
Implementing IDP and SPS with SAML authentication using Shibboleth, Microsoft Single Sign-on Services SSO like ADFS and CAS servers
Mail servers and bulk email relay setups and support
We have expertise in setting up mails servers and bulk email relay servers for Transactional Emails for SaaS products where using third party relay services like MailChimp, DotMailer, SendGrid, MailGun and Mandrill cannot be used for policy, efficiency or reliability reasons.
In short, we know how to route email directly to an inbox where others fail to do that.
The monitoring system, ongoing monitoring, daily checks and escalations.
Sever infrastructure, products and online platforms and cloud offerings needs consisting monitoring of system from application functional, to every application component & building blocks to database servers and operating systems level. Monitoring itself needs human monitoring and regular and daily checks performing positive and negative checks on the end to end functionality and overall it requires extreme responsibility and vigilance.
Our engineers have been helping set up the automated monitoring and monitoring dashboards and have been helping to keep an eye on these dashboards to assurance the smooth and continued operations and spot problems before they happen and do something in advance. if the problem does happen, they do need identifying and escalating and we have been helping in these areas.
Zabbix and Nagios are the tools we practically implemented.
Proxies , reverse proxies and web accelerators
We have implemented and maintained proxies, transparent proxies and reverse proxies for outbound and inbound network traffic both over secure and unsecured tunnels, enhancing the security and privacy of the web users and improving the performance of and optimizing the bandwidth usage for the business customers , network operators and for web applications. This was achieved mixing the network hardware solutions enhanced by squid, ha proxy and varnish.
Irongate House, 20-30 Dukes Place London EC3A 7LP
2 + 5 = ? Please prove that you are human by solving the equation *