Upload
agata-maron
View
634
Download
0
Embed Size (px)
Citation preview
Cybercom PolandGeneral Overviewcybercom.pl
is doing things for the bigger purpose than the sum of tasks
is prototyping solutions instead of theoretical considerations
is transparency, openness and honesty to the customer
Passion Innovation Trust
Our values
POLAND is identified as a country
with the strongest underlying fundamentals to
potentially outsource IT solutions.
From the Center of Europe
STABLE ECONOMY with a dynamically growing IT market
COST ATTRACTIVENESS
Why Poland?
EFFECTIVE COORDINATIONthanks to geographical proximity
CULTURAL SIMILARITIES
FAMOUS Eastern - European school of programming (great IT Universities)
230experts in web and mobile technologies
Member of SPCC – Scandinavian-Polish Chamber of Commerce since 2008
offices in major IT centresmastered technologies
years of experience per average employee
years on the market client countries19
20+ 3
10+ 6
Cybercom Poland strenghts
Our strenghts
Our Swedish roots combined with Polish expertise and technical know-how guarantee optimal results in delivering cutting edge solutions.
While we use Swedish best practices to exceed expectations and provide impeccable quality, we maintain our Polish pricing and geeky attitude.
Accompanying our clients through every project stage from early design to delivery, deployment, and ongoing maintenance.
PROJECT BASED
end to end project management: technical design, delivery and
deployment
RESOURCE BASED
our technical teams collaborate with your
project team
Custom collaboration
designdelivery
deployment
Software House
Security Division
IoT & Automotive
Our assets
Software House
Our assets
• nearshoring instead of outsourcing • collocation and synergy effect
Software House
• open communication and transparency• agile approach and iterations
Our core business in Software House is to deliver superior quality software in a timely manner and continuously improve teams’ velocity using the scrum process.
1
2 3
4
56
ITERATIONS
back-end technologies
frontend technologies data bases mobile
technologies QA
Manual
Automated (selenium, windmill)
Non-SQL
Diverse technical skills
Sprint process
sprint planning
1
sprint planning
business catchup
daily scrum
1 2
sprint planning
business catchup
daily scrum
backlog refinement
1
3
2
sprint planning
business catchup
daily scrum
backlog refinement
sprint review
1
3
2
4
sprint planning
business catchup
daily scrum
backlog refinement
sprint reviewsprint retrospective
1
3
2
45
sprint planning
business catchup
daily scrum
backlog refinement
sprint reviewsprint retrospective
renew your forecast DEVELOPMENT AND
TESTING
1
3
2
45
Tooling
GIT + branching practices description
Continuous integration tools Jira Agile
Confluence Skype For Business / Skype
Slack (communication channels definition)
Yammer Trello Out of the box technology stack
Tooling:
Security Division
Our assets
Security Division
Testing of data security and compliance with international and local laws and policies (PCI-DSS, personal information security regulations etc.):
physical office/infrastructure security testing
dumpster-diving
office security policies review
Data Security & Compliance
IT infrastructure security (WiFi,
access to servers and routers, etc.)
social engineering
Mobile Apps Security
Static and dynamic analysis of mobile applications security, including:
sensitive data transmission (MITM
attack)
local data storage (file formats,
encryption etc.)
user authentication and authorization
methods
tampering with UI or settings
testing against known server-side
web application risks (OWASP)
source-code analysis reverse-engineering deassembly
Black/Grey/White testing of:
Web Applications Security
incorrect handling of temporary files on the user
side (i.e. cookies)
improper storage and transmission of data
ActiveX and Adobe Flash components decompilation
and deobfuscation
brute-forcing and dictionary attacks
captcha security password-reverting functionality security buffer/stack overflows incorrect error handling
code decompiling/deassembly/d
eobfuscation/unpacking
tampering with UI, settings and registry
anti-piracy (user registration, trial version
limitations etc.)localization issues
pentesting against known attacks (SQL injection, command injection, XSS, LCI, RCI, CSRF, directory traversal, MITM and all other from OWASP list)
IoT & Automotive
Our assets
We discover and develop OPPORTUNITIES for you and with you
Increased revenue
Reduced operational expenses
Increased differentiantion
Data discovery and insight
Streamlined customer services
Reduced risk Regulatory compliance
Connected brand strategy
Increased security
IoT Strategies for Diversified Business
DIGITAL TRANSFORMATION PROJECTS
Business advisory
Prototype design
Deployment
What we do in IoT?
1
2
3
Concept preparation
Testing: HW & SW
Support
"They listen to their customers well. Whenever we have a problem, they make an effort to solve it together with us, without being pushy."— Technology Director at CompoSIDE
"They [Cybercom] are reliable, especially when initiating new projects or activities. When we request a specific resource to be delivered at a given time, I can be 100% sure that it will happen."— Manager
"Cybercom has been very good to work with, analyzing and coming up with new suggestions on how we could modernize this system into a more test-friendly system."
Core clients
HRK
EMPIK ECOMMERCE
GCS
SIERPC
BISNODE
E-RECRUITER
COMPOSIDE
HIAB
GIZAGIG
SKANSKA
INTEL
CLEAN MOTION
IMS HEALTH
STRUCTEAM
MODUL SYSTEM
ERICSSON
VOLVO
DORO
VUBIQUITY
TELENOR
ROSSMANN
OUTOTEC
SAS
Agata MarońHead Of Sales Development
Warsaw
agata.agata779
+48 607 676 766
LET’S TALK
cybercom.pl