




![]() |
![]() |
![]() |
![]() |
![]() |
Our expertise is custom development of complex backend systems on .NET platform:
All services and servers we create are based on our own platform for rapid 24/7 backend development with rich means of:
We support clustering technologies:
We have deep knowledge and great experience in implementing and integrating software in the following major ares:
Our company was founded in 2004 and maintains Microsoft Certified partner status with Software Development Competency.
The software we developed for our customers is deployed and used on 3 continents of the world for mission critical projects.
Our most valuable clients are companies from USA, Europe, Africa and Russia.
![]() |
![]() |
![]() |
![]() |
![]() |
Development of server components of the token and digital certificates lifecycle management system for use in a corporate environment.
Highlights
The challenge
The customer had a need to automate the accounting and maintenance of tokens (and X.509 certificates on these tokens), which are in use by employees, in order to reduce costs and reduce employee downtime. Moreover, the number of simultaneously served users can reach 100,000.
The solution
The contractor implemented server components of the corporate application platform which became a basement for automatic tokens and certificates accounting and life cycle management system (to whom it belongs, who issued it and when it was revoked, etc.), with reference to users and the organization hierarchy and with the possibility of automatic certificates issuance for these tokens through various types of CAs. The system is fault tolerant and supports horizontal scaling. The system is very flexible - it is expanded by plugins and connectors due to the large number of expansion points.
The results
The customer got a solution that saves a lot of time and resources on the maintenance of tokens and certificates, as well as build new corporate applications that are seamlessly integrated with each other.
An ordinary user of the organization has no downtime due to waiting for certificate renewals, there is no need to track the life of certificates on tokens and manually compose applications for certificate renewals, and make calls to IS administrators. The profile mechanism ensures uniformity of certificate issuance policies applied to users.
![]() |
![]() |
![]() |
![]() |
![]() |
Highlights
The challenge
The customer required a specialized software suite for incident management and internal investigations in a corporate environment. The system has to be designed to process and analyze information on violations of corporate ethics, fraud, facts of theft, and was supposed to inform participants throughout the entire cycle of internal investigation, provide analytics on incidents and completed investigations.
The system's capabilities were supposed to include managing the progress of the investigation, storing accompanying documents, notifying the user by E-mail and SMS about major events based on the role-based security model, creating custom reports that can be viewed both online and sent out according to a preset schedule. The system was supposed to carry out full-text semantic search in documents.
The solution
The contractor studied in detail the customer's non-trivial business processes, defined the rules for state transitions of system entities and the relationship between processes. An optimal solution was proposed and agreed with the customer, which exactly met his expectations.
The contractor, anticipating the use of the complex in various fields of activity and for different customers, has designed a solution in accordance with the requirements, which can be deployed and used as a service by the customer's external client.
A flexible role model was designed with the possibility of subsequent expansion with new access rights to parts of the system. The notification system can be easily extended with a new types.
The product consists of several main modules:
The results
Despite the short timeframe, contractor has developed the software system that fully satisfied the customer's requirements and solved the assigned tasks.
The product successfully passed bench tests in the customer's infrastructure and was deployed in the product environment. At the moment, the complex is being actively used and modernized.
By introducing the software package, the customer automated the process of registering messages from subscribers, their processing and passing through various authorities, thereby reducing the cost of document circulation and increasing the speed of decision-making on incoming requests.
The product turned out to be highly customizable and extensible.
![]() |
![]() |
![]() |
![]() |
![]() |
Highlights
The challenge
The customer needed to develop a video monitoring system for use in solving automated biometric access control tasks.
On the one hand, as an automated video monitoring system, it had to be able to work with IP cameras, track people on their video streams in real time, and identify them by database. On the other hand, it had to have two external integration loops: one for using the existing biometric database, the other for communicating with the access control system, transmitting events to it.
In addition to this, there were requirements for collecting a historical audit, providing it to both users on the web portal and external integration systems via the API.
Moreover, the system was supposed to be distributed (including geo), scalable and multi-tenant.
The solution
The contractor, taking into account the uncertainties of requirements for various parameters, as well as seeing the possibilities for generalizing the solution, designed the most flexible system, without relying on its application directly only in the field of access control.
The system consists of several modules divided into 2 groups:
Integrations with existing systems (providers of events, event consumers, consumers of historical data) are maximally generalized, and do not know anything about the specifics of the application (access control systems, or anything else).
The results
The system was successfully implemented at the end customer and allowed to execute ACS scenarios in a contactless mode in a pandemic 2020.
![]() |
![]() |
![]() |
![]() |
![]() |
Development of a high-performance IoT server designed to control and monitor security sensors geographically distributed over country region
Highlights
The challenge
The customer required a specialized high load productive software complex for controlling and receiving / processing signals from security sensors for the technological support of thousands of objects.
The software complex was supposed to serve the devices that are in operation, both for ordinary individuals and in large industrial facilities.
The software complex had to receive information in a timely manner and send signals to control panels, as well as allow remote control of devices, including reconfiguration and flashing.
The results
The development turned out to be a lightweight and high-performance software package that exceeded customer expectations. The reserve of processor time reached 50 percent with the maximum number of simultaneously connected devices.
The product has successfully passed bench tests in the infrastructure of the customer with a flow of up to 500,000,000 requests per day.
A high load server maintains simultaneous connections with all 50,000 or more devices, performs real-time continuous monitoring of their availability and status using a secure protocol, transmits pick-up signals to private security panels, and provides specialists with remote control of devices, including programming their settings and firmware updates.
![]() |
![]() |
![]() |
![]() |
![]() |
Summary or Highlights
The challenge
The customer had a need for a high-performance automated fingerprint identification system (AFIS), designed for tens of millions of fingerprints, designed for 24/7 fault-tolerant operation.
The main target audience for the customer's product is the use in projects of the Civil ID scale class from a large corporation to the level of a federal state system.
AFIS was supposed to integrate into a system of any scale as a ready back-end using its interfaces.
There were also requirements for scalability, fault tolerance and high reliability.
The results
The development and evolution of the product has resulted in a flexible, reliable and simple system that has successfully proven its viability in high-loaded integrations around the world, from industry-specific security systems to systems that process the data of millions of voters at the level of the whole country as part of state elections.
The product has been successfully integrated into federal systems in three continents of the world. Performed trillions of search operations without a single failure.
Using this product, the customer entered a new business segment, having the opportunity to participate in a more marginal class of projects.
Product deployment takes place in minutes, product maintenance is also very simple, and therefore the product has a significantly lower TCO than competing products and solutions.