Designing Technology for People

Cloud Services

Scalability & Agility

AWS Cloud Development Kit (CDK)

The AWS Cloud Development Kit (AWS CDK) is an open source software development framework to define your cloud application resources using familiar programming languages. AWS CDK provisions your resources in a safe, repeatable manner through AWS CloudFormation. For customers who prefer Terraform, cdk tf provides the CDK constructs for defining Terraform HCL state files in TypeScript and Python.

Terraform - Infrastructure-as-Code Design and Deployment

Keep humans away from your data, and your environment more secure, by implementing Infrastructure-as-Code. Make frequent, small and reversible changes. Configure, deploy, un-deploy and shut down infrastructure. Enable traceability and help annotate your documentation.


Cloud Architecture Design

We will design a system for you that matches your maturity level and optimizes for cost. We'll provide you with various options, including Serverless, that take advantage of AWS' unique research and development efforts to integrate services.

Cloud Migration

We offer a methodical migration process, including application portfolio discovery, application analysis, design, migration, integration, validation, operation, and optimization.

Cloud Security Design and Automation

We're able to design and implement AWS data protection mechanisms and AWS data encryption mechanisms. We're able to leverage AWS security services and features of services to provide a secure production environment. And, we're able to make tradeoff decisions with regard to cost, security, and deployment complexity given a set of application requirements.

Cloud Cost Control Strategies

We explain how to set up a master paying account so that you have access to all of the billing of isolated accounts, how to set up a tagging strategy for resources for a particular cost center, and how to set up billing alarms. Most importantly, we recommend services and products based upon your budget and resource limitations.

Penetration Testing

We evaluate the security of your cloud environment or IT infrastructure by identifying vulnerabilities and then attempt to exploit weaknesses. We identify issues, their potential impact, steps to reduce risks, and mitigation techniques.

Forensic and Log Analysis/SIEM & SOC Design

We help analyze logs and conduct forensic analysis to determine the point of entry into the network, how lateral movement may have occurred, and how and what data could have been exfiltrated. We work with your team to develop a Security Information and Event Management Solution. Or, we help you design a Security Operations Center.

Get in touch

Lets talk about how you can become more agile in the Cloud