cybercom poland overview: why poland is great for outsourcing it services

Post on 03-Mar-2017

635 Views

Category:

Technology

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Cybercom PolandGeneral Overviewcybercom.pl

is doing things for the bigger purpose than the sum of tasks

is prototyping solutions instead of theoretical considerations

is transparency, openness and honesty to the customer

Passion Innovation Trust

Our values

POLAND is identified as a country

with the strongest underlying fundamentals to

potentially outsource IT solutions.

From the Center of Europe

STABLE ECONOMY with a dynamically growing IT market

COST ATTRACTIVENESS

Why Poland?

EFFECTIVE COORDINATIONthanks to geographical proximity

CULTURAL SIMILARITIES

FAMOUS Eastern - European school of programming (great IT Universities)

230experts in web and mobile technologies

Member of SPCC – Scandinavian-Polish Chamber of Commerce since 2008

offices in major IT centresmastered technologies

years of experience per average employee

years on the market client countries19

20+ 3

10+ 6

Cybercom Poland strenghts

Our strenghts

Our Swedish roots combined with Polish expertise and technical know-how guarantee optimal results in delivering cutting edge solutions.

While we use Swedish best practices to exceed expectations and provide impeccable quality, we maintain our Polish pricing and geeky attitude.

Accompanying our clients through every project stage from early design to delivery, deployment, and ongoing maintenance.

PROJECT BASED

end to end project management: technical design, delivery and

deployment

RESOURCE BASED

our technical teams collaborate with your

project team

Custom collaboration

designdelivery

deployment

Software House

Security Division

IoT & Automotive

Our assets

Software House

Our assets

• nearshoring instead of outsourcing • collocation and synergy effect

Software House

• open communication and transparency• agile approach and iterations

Our core business in Software House is to deliver superior quality software in a timely manner and continuously improve teams’ velocity using the scrum process.

1

2 3

4

56

ITERATIONS

back-end technologies

frontend technologies data bases mobile

technologies QA

Manual

Automated (selenium, windmill)

Non-SQL

Diverse technical skills

Sprint process

sprint planning

1

sprint planning

business catchup

daily scrum

1 2

sprint planning

business catchup

daily scrum

backlog refinement

1

3

2

sprint planning

business catchup

daily scrum

backlog refinement

sprint review

1

3

2

4

sprint planning

business catchup

daily scrum

backlog refinement

sprint reviewsprint retrospective

1

3

2

45

sprint planning

business catchup

daily scrum

backlog refinement

sprint reviewsprint retrospective

renew your forecast DEVELOPMENT AND

TESTING

1

3

2

45

Tooling

GIT + branching practices description

Continuous integration tools Jira Agile

Confluence Skype For Business / Skype

Slack (communication channels definition)

Yammer Trello Out of the box technology stack

Tooling:

Security Division

Our assets

Security Division

Testing of data security and compliance with international and local laws and policies (PCI-DSS, personal information security regulations etc.):

physical office/infrastructure security testing

dumpster-diving

office security policies review

Data Security & Compliance

IT infrastructure security (WiFi,

access to servers and routers, etc.)

social engineering

Mobile Apps Security

Static and dynamic analysis of mobile applications security, including:

sensitive data transmission (MITM

attack)

local data storage (file formats,

encryption etc.)

user authentication and authorization

methods

tampering with UI or settings

testing against known server-side

web application risks (OWASP)

source-code analysis reverse-engineering deassembly

Black/Grey/White testing of:

Web Applications Security

incorrect handling of temporary files on the user

side (i.e. cookies)

improper storage and transmission of data

ActiveX and Adobe Flash components decompilation

and deobfuscation

brute-forcing and dictionary attacks

captcha security password-reverting functionality security buffer/stack overflows incorrect error handling

code decompiling/deassembly/d

eobfuscation/unpacking

tampering with UI, settings and registry

anti-piracy (user registration, trial version

limitations etc.)localization issues

pentesting against known attacks (SQL injection, command injection, XSS, LCI, RCI, CSRF, directory traversal, MITM and all other from OWASP list)

IoT & Automotive

Our assets

We discover and develop OPPORTUNITIES for you and with you

Increased revenue

Reduced operational expenses

Increased differentiantion

Data discovery and insight

Streamlined customer services

Reduced risk Regulatory compliance

Connected brand strategy

Increased security

IoT Strategies for Diversified Business

DIGITAL TRANSFORMATION PROJECTS

Business advisory

Prototype design

Deployment

What we do in IoT?

1

2

3

Concept preparation

Testing: HW & SW

Support

"They listen to their customers well. Whenever we have a problem, they make an effort to solve it together with us, without being pushy."— Technology Director at CompoSIDE

"They [Cybercom] are reliable, especially when initiating new projects or activities. When we request a specific resource to be delivered at a given time, I can be 100% sure that it will happen."— Manager

"Cybercom has been very good to work with, analyzing and coming up with new suggestions on how we could modernize this system into a more test-friendly system."

Core clients

HRK

EMPIK ECOMMERCE

GCS

SIERPC

BISNODE

E-RECRUITER

COMPOSIDE

HIAB

GIZAGIG

SKANSKA

INTEL

CLEAN MOTION

IMS HEALTH

STRUCTEAM

MODUL SYSTEM

ERICSSON

VOLVO

DORO

VUBIQUITY

TELENOR

ROSSMANN

OUTOTEC

SAS

Agata MarońHead Of Sales Development

Warsaw

agata.maron@cybercom.com

agata.agata779

+48 607 676 766

LET’S TALK

cybercom.pl

top related