Complying Security Standards and Processes
If a company decides to go international, its working process and data security should comply with international standards. Here is how we helped one of our clients to meet all the necessary requirements.see
Preventing data breach through leaked accounts
Leaked private account of your employees can result in a data breach and your corporate security,/ breach. We can protect you from this side.see
Reporting Systems Review & Evaluation
This is a working copy of a review of reporting systems existed in 2012 targeted to assist to management to choose a proper software.
The case study is provided "as is" and should not be treated as a comprehensive reference.
Test Automation Frameworks Review
An excerpts of a research that was created for one of our clients when they needed to choose a tool for automating their tests.see
Migrating Datacenter to Rackspace
One of our clients, a large multinational company, decided to move production server infrastructure from a datacenter, which had been maintained by another large multinational company, to a cloud hosting, Rackspace.see
DDoS Attack Protection
This is how well–prepered professionsl network administrator could beat DDoS attacker.see