top of page

Active Cloud and Cybersecurity Technologies

Services

We specialize in the following IT services. We have been engaged in providing IT services since 2005. Information technology is our passion and we aim to excel in the following areas. In the course of our delivery, we are engaged with a Microsoft partner, Alif IT consulting, who have a pool of experienced engineers and project managers to deliver quality IT services within the prescribed budget.

Heading 2

Heading 2

Deployment of AWS cloud platform

Brainstorming Session

We have helped deploy and configure critical mortgage processing applications in AWS platform. These applications were interconnected and sharing data among themselves and ensuring integrity of data. We ensured load balancing is fully deployed and all applications are fully linked through the official web-portal. Cloud security was heavily configured in to ensure data privacy and regulatory compliance. The company's disaster recovery processes were fully tested to ensure business continuity. Our efforts were primarily concentrated in logging and monitoring, identity and access management,  infrastructure security, data protections and incident management.

Deployment of Microsoft Azure platform

Office Meeting

​

As part of digital transformation, we have helped deploy Microsoft Azure in banks.

We helped test APIs to ensure security with vendor applications that the bank utilizes in processing its loan and savings transactions. We tested daily, weekly and monthly automated backups. As part of data integrity, we ensured that all vendor applications have secure authentications. We instituted automated patch management. We Monitored vendor application interfaces and logs to ensure maximum processing efficiency is maintained. In this deployment, we ensured system integration testing (SIT) and user access testing (UAT) is appropriately conducted in all high risk areas.

 

Deployment of Google Cloud Platform (GCP) platform.

Team Working in Glass Partitioned Office

As part of digital transformation, we helped deploy data warehouse in GCP and connected all applications internally and externally as data input. This enabled financial institutions to generate customized reports to monitor business and financial operations and help ensure timely reporting on the regulatory banking compliance. We helped ensure all data inputs from external vendor applications are secure and properly authenticated data input before data transformation. As pert of the integrity of data management, we helped build to ensure that loan stock pricing and other critical data elements are consistent across all platform. Regular security perimeter penetration testing was performed to identify all security vulnerabilities.

Deployment of Microsoft Dynamics 365

Marketing team meeting
  • As CPAs and technology experts we are experienced in deploying Microsoft Dynamics 365.

  • We will make sure that all the modules are configured seamlessly and data conversion happens appropriately.

  • Our team of configuration management will thoroughly test all configurations through our system integration testing (SIT).

  • Our user acceptance testing (UAT) team will develop all scenarios and a robust test plan to execute all business cycles.

  • We will support your team and guide them functionally and technically through conducting business and accounting operations.

  • Our team will assist you in ensuring that all patches and upgrades are installed timely to ensure security is maintained at all times.

  • Robust processes will be established to ensure that regular and timely backups are automated.

  • Security infrastructure will be deployed to ensure that data privacy and data security controls are efficiently working to protect the confidentiality of your data.

  • As needed we can also bring in CPAs to help you get started initially so that your transition to this new technology is seamless.

Oracle e-business suite

Meeting
  • We have successfully implemented several Oracle e-business suite of applications that included AP, AR, GL, inventory module, purchase order, Consolidation module and the Fixed Asset module.

  • We have supported client for many years there after both technically and accounting support to help them support their daily operational issues and heled them pass their financial audits. 

  • We also installed the Application Desktop Integrator (API) and helped convert over their daily and monthly financial statement generations and helped them integrate their budgeting so that they can develop and robust financial planning process and have a healthy discussion relating to variance analysis.

  • We also automated their fixes asset module and tied them to their general ledger. This helped client transfer over their monthly changes to the fixed assets to the general ledger module.

  • We helped configure all these modules from the backend so they can function as needed.

​

​

Cybersecurity and pentestng

Group of Engineers
  • We have helped clients design and implement Data loss Prevention (DLP) prevention and a comprehensive process for developed metrics for management reporting.

  • Developed a comprehensive process for logical security where we have developed a detailed process to help clients build User Access Reviews (UARs) and instituted processes to establish segregation of duties results and an assessment process for least access privileges.

  • Reviewed and deployed application scans using dynamic application security testing (DAST), Static application security testing (SAST), and software composition analysis (SCA) to evaluate security and code quality.

  • Reviewed and deployed security patching processes both within the cloud and vendor applications.Reviewed the cybersecurity governance process using the FFIEC cybersecurity framework. 

  • Evaluated the Expel tool for the security operation center (SOC) managed service provider, ServiceNow (SNOW) and Splunk monitoring tools and the process for incident management. 

  • Reviewed the cybersecurity assessment tool (CAT) and assessment results to provide a measure of the cybersecurity preparedness over time.

  • Reviewed results of Nexpose for perimeter scans and Rapid7 for internal scan in Azure and Crowdstrike for GCP scans.

  • Conducted penetration testing to identify security vulnerabilities.

bottom of page