Homepage

Web Security Service

Our service provides audition of your web applications by checking for vulnerabilities like SQL Injections, Cross site scripting and other exploitable vulnerabilities. In general, we scan any website or web application that is accessible via a web browser and uses the HTTP/HTTPS protocol. We offer a strong and unique solution for analyzing off-the-shelf and custom web applications including those utilizing JavaScript, AJAX and Web 2.0 web applications.

Cloud Development

Launching new business services, consumer sites and social applications can lead to significant up front costs. With unknown usage volumes, and the need to launch rapidly, businesses need a new technology model that is better suited to the need for quick delivery and incremental spend. Cloud computing offers businesses a new IT model that is pay as you go. With a pay as you go fee model costs are only incurred based on usage, and time to provision new resources is significantly reduced.We find the right cloud computing providers and architecture solutions that address your goals and challenges in addition to your functional requirements, system integration needs, and technology stack preferences.

Cloud Files Protection

Our solution can work with file share cloud services like Google Drive, BoxNet, Dropbox, Microsoft SkyDrive, etc. , it can encrypt files and folders on local hard drive and encrypt email and email databases of mail clients.Solution uses Elliptic curve discrete logarithm with 1024bit key size, that fully exponential. It’s means that without key decryption of the data becomes impossible.Base goal of software is encryption files on the fly, this is possible by encryption of file by parts in different streams, that’s utilize computing power and speed up encryption process.

Cloud Servers Security

Functionality of the solution based on encrypting whole system, not files or folders only, it works through low system kernel operations. Control of encryption for instances provided via Web UI, where user can start, stop or reboot instances, create instances from prepared AMI or convert own running instances to encrypted environment. Web UI have own rules and policy management for the instances activities.