Clear Strategy For Your Cloud
AVM is focused on delivering Custom Cloud and Enterprise Solutions, through:
- Consulting & Advisory
- Implementations & Hands-On Training
- Managed Services & Support
We believe that the difference between something good and something great is the attention to details.
AVM Consulting is a technology company focused on delivering custom Cloud Solutions for your business.
AVM also regularly conducts independent research to understand emerging technologies and uncover new insights for performance optimization.
We are proud to actively share our learnings and research to the Technology community, at large, through blogging, benchmarking, and publishing.
Years in Cloud Computing
Focus - Quality
While we focus on AWS based solutions we are experienced with multi-cloud architectures
Organized, sophisticated and persistent cyber-threat-actors pose a significant challenge to large, high-value organizations. They are capable of disrupting and destroying cyber infrastructures, denying organizations access to IT services, and stealing sensitive information including intellectual property, trade secrets and customer data. SMB organizations are often challenged by incident response management, in part because incident response procedures may not be established.
Therefore it’s critical for an organization to identify and respond to security incidents and events in a timely manner. Whether a breach is small or large, organizations need to have an incident response policy in place to mitigate the risks of being a victim of the latest cyber-attack.
Edmodo is an educational technology company offering a communication, collaboration, and coaching platform to K-12 schools and teachers. The Edmodo network enables teachers to share content, distribute quizzes, assignments, and manage communication with students, colleagues, and parents. Responding to any security incident is a critical element for Edmodo’s businesses and data security compliance requirement. It’s also essential for Edmodo to identify and respond to security incidents and events in a timely manner. Whether a breach is small or large, Edmodo wanted to have an incident response plan in place to manage the lifecycle (preperation, detection & analysis, containment, eradication & recovery, and post incident activity) of all security Incidents. The faster they detect and respond to security incidents, the less likely it will have a significant impact on their data, customer trust, reputation, and a potential loss in revenue.
We undertook a comprehensive analysis of their existing policies in place, their current team structure, and security incidents happened in the past and their preparedness to handle any future security incidents. We evaluated NIST SP 800-61 & ISO/IEC 27035 standards and based on their existing org structure and specific need, we decided to go ahead with creating security incident response policy based on NIST SP 800-61 standards.
Performing incident response effectively is a complex undertaking, establishing a successful incident response capability requires substantial planning and resources. Continually monitoring for attacks is essential and establishing clear procedures for prioritizing the handling of incidents is critical, as is implementing effective methods of collecting, analysing, and reporting data.
We created a set of practices, processes, and solutions that enabled Edmodo’s Security Incident Response Team (SIRT) in rapidly detecting incidents, minimizing loss and destruction, mitigating the weaknesses that were exploited, and restoring IT services in the shortest possible time.
With incident response policy in place Edmodo’s SIRT team is now able to quickly detect, investigate, address vulnerabilities and issues, and respond to all IT security incidents in an efficient and timely manner. Faster responses helped them reduce the overall impact of incidents, mitigate damages, and ensure that systems and services continue to operate as planned.
Without incident management, an organization may lose valuable data, experience reduced productivity and revenues due to downtime, or be held liable for breach of service level agreements (SLAs). Even when incidents are minor with no lasting harm, IT teams must devote valuable time to investigating and correcting issues.
Artificial intelligence has become a must have strength for almost all organizations to be sustainable in the business. Some enterprises have already embraced it and others are planning to invest and included it in their roadmaps. However still the success rates of these investments are at a low level. This is mainly because the information infrastructure of the organizations is not ready for artificial intelligence projects.
Incite Logix has a well experienced team who can help organizations to be successful in artificial intelligence related implementations. They have gathered intellectual knowledge in this problem domain after successfully completing several projects at different organizations. However it’s a lot of technical and non-technical jargon which is hard for someone to read and understand.
The AVM team joined with the Incite Logix team to find a solution to bridge the gap between the people and the intel that the company had collected. Our primary goal was to present this intel to the users in an understandable manner and self measure their information infrastructure readiness to embrace AI projects.
As a result the two teams came up with the idea to implement a web and a mobile application where the users can register themselves and measure their information infrastructure readiness through a question and answer model which provides a categorized and aggregated score with an action plan to work on.
We at AVM always work with industry leading cutting edge technologies and decided to design this solution using serverless technologies offered by Amazon Web Services. Following the client-server architecture pattern we developed the frontend as a single page application using ReactJS and deployed in AWS using the CloudFront and S3 buckets. This approach gave us the opportunity to serve the application worldwide with reduced latency. Backend application has been built on top of serverless framework using NodeJS, and has been deployed on AWS using API Gateway and Lambda functions and DynamoDB as the persistent store. We used Amazon Cognito for identity management and it simplified most of implementation efforts and gave a solid layer of security. Next the mobile applications were developed using the Flutter framework and that gave us the opportunity to implement for both IOS and Android platforms parallelly reducing a lot of development efforts. Finally, no solution can be successful without proper monitoring and telemetry. We used Amazon CloudWatch logging with alarms configured where necessary to keep the team informed of any failures. And the application usage monitoring was achieved through Amazon Pinpoint and Google Analytics.
In this way, the complete solution has been developed and deployed and a 100% serverless application with very small running cost footprint.
In early 2017, Match.com had become the largest online dating platform reporting over 35 Million users, with the only competitor eHarmony far from catching up with only 17.5 Million. The advent of this new romantic age that leveraged online technologies in the quest for love, brought with it a whole new category of challenges for the platform operators. The number of requests to their servers were no longer in the thousands but in the Trillions. Yet these new types of challenges facing Match, were perfectly suited to be addressed by leveraging the scale and performance benefits of cloud solutions and integrating these with traditional day-to-day IT operations.
One of the first challenges faced by the company was to modernize any remaining monolithic architecture for increased performance and agility. Previously within their software system, functionally distinguishable aspects of their applications, such as data I/O, processing, error handling and user interfaces, were interwoven rather than being isolated into separate architectural components. Other bottlenecks and issues included the elastic demand capabilities of their web servers, and the high capital expenses of provisioning new resources for the on premise data centers.
In order to facilitate performance improvements and greater agility we conceptualized and implemented a full service end-to-end cloud migration and adoption strategy based around the cloud services offered by Google (GCP) and Oracle (OCI). First, we helped them re-architect their existing infrastructure and applications into a suite of independently deployable, modular microservices. As such each application runs a unique process and communicates through a well-defined, lightweight mechanism. With the help of Docker Containers we helped them migrate these from their on premise locations to the Google Cloud Platform (GCP). Initially, our team used the ExtraHop platform for a continuous auto-discovery of application dependencies and to identify and map architectural requirements necessary to run these applications on GCP. This allowed us to configure and provision Match’s new cloud-based VM environment in a way that would optimally serve the needs of their applications.
Furthermore, we used HashiCorp’s cloud configuration and orchestration tool Terraform to spin up a highly elastic farm of Apache Web Servers in the Google Cloud, to meet the unpredictable and volatile number of requests coming from the online dating platform. This enabled Match to scale flexibly to meet demands and provided significant cost-savings by scaling down when demands were low and stable. Finally, after this initial cloud solution, Match.com commissioned us to help them migrate their database as well. Subsequently we migrated their Oracle DB from on premise to the Oracle Cloud AZ in Phoenix. This is done with the aim of maintaining and improving performance further through the utilization of Oracle’s Baremetal infrastructure. Simultaneously, we are facilitating significant Oracle licensing cost savings through the provision of dynamically scalable instances (elastic CPU scalability) and automation.
When H&R Block came to us they were facing various challenges. Whilst already largely virtualized, their infrastructure and IT systems contained applications with many legacy features and the performance of many applications was suboptimal. Especially one of the consumer group services tended to underperform and required elastic scalability to service fluctuating numbers of consumers. Finally, as a financial services company, comprehensive and complete data security throughout their cloud solution was of critical importance and one of the main priorities for H&R Block.
To improve performance of the internal API Gateway and consumer group service, we migrated it to AWS using Terraform for the infrastructure as a code. However, the migration required a lot of planning and analysis, as there were complex multi-dependencies that had to be discovered and mapped out, and many legacy features that needed to be removed.
Furthermore, as this consumer group service dealt with financial data and customers’ private information, overall data security within the cloud solution was of paramount importance. Therefore, it was necessary to ensure our solution design guaranteed in transit and at rest data encryption of the highest standards.
We tackled this challenge by establishing permissions which followed the AWS Security principle of least-privilege. This allowed us to minimize the blast radius and drive the Recovery Point Objective (RPO) and Recovery Time Objective (RTO) to down under an hour.