- AWS Design and Implementation Over 5 years collective
experience implementing on
Amazon Web Services
- Cloud Security Design and Implementation Over 8 years collective
experience securing hypervisors
and their associated virtual
networks, including KVM, VBox,
VMWare and Xen
- Database Design and Implementation Over 15 years collective
experience designing and
implementing Open Source and
Enterprise DBs, including MySQL
Oracle and PostGres
- Help Desk Design, Implementation and ManagementOver 5 years collective
experience designing and
implementing Help Desk software
and support structures, and
over 10 managing them
- Firewall Design and ImplementationOver 20 years collective
experience designing and
implementing Firewalls from Ascend
to ZoneAlarm, and many,
many (BlackBox, Checkpoint ...
Yggdrasil) points between,
including their services, from
IPS to VPNs
- IAAS, PAAS, OAAS and SAASMost aspects of an
Information Services/Technology
environment may be delivered
purely as a Service: we
have decades of experience
doing so
- Network ArchitectureOver 25 years collective
experience designing secure, high
performance networks with dozens
of vendors' products, not
merely, but certainly including
the IP protocol
- Network and Service MonitoringNot only do we have
more than 15 years collective
experience monitoring services and
networks with Open Source
and enterprise products, we
can create custom ones when
appropriate/necessary
- Penetration TestingOur extensive experience with
all layers of the protocol stack
has allowed us to effectively
and accurately identify penetration
vectors in environments as
diverse as Wall Street
and China
- Perl, PHP and CGI DevelopmentOver 6 years collective
experience developing PHP
applications, over 20 in
Perl and CGI
- Virtualization Design and ImplementationOver 6 years collective
experience with Xen, 7 with
VBox, 9 with KVM and
10 with VMWare
- VoIP Design and ImplementationAs this was iPhoNetics'
initial offering, we nowhave so much experience
with so many solutions
for IP telephony, it
is difficult to estimate
- Vulnerability Assessment and MitigationOver 20 years collective
experience identifying vectors by
which systems, both human
and electronic, might be
compromised, and advising on
how these exposures can be
controlled and/or minimized