InBase, Inc.              "Systematic Quality" sm

Home Search Contact Us


About Products Services News


Who we are -- InBase, Inc.:   Go To Solutions
InBase, Inc. was founded in 1986 to provide end-to-end secure IT solutions via industry and customer custom solutions, staff augmentation, IT consulting and software development.

Our staff of experienced technology, security and IT experts and managers can deliver:
  • Dedicated, short term and long term, IT consulting and interim management services
  • Custom solutions from due diligence through to systems-network-database strategy, architecture, development and integration
  • Key outsourcing needs such as performance monitoring-tuning, data architecture and data security
  • Staff augmentation in any IT and business area required by the customer

Whether a project demands applications, client-server, database, network, end-to-end security, systems or web expertise, we know that knowledge of a client's industry is every bit as important as in-depth technology expertise.  In the IT world, one-size does not fit all solutions.  We know that timely and cost-effective custom development projects deliver the most successful business results.

IBI offers a high-level of industry focused expertise in the Financial Services, Healthcare, High-tech, Insurance, Telecommunications and Transportation industries.  We specialize in helping our customers respond to current issues such as e-business, information-globalization, networking, security and privacy.

We are committed to building secure IT solutions with services that meet and exceed customer expectations.


Applications   Go To Solutions
How many plates can you keep spinning without letting one drop?

You have experts; you have programmers, but they are working 14 hours a day.

IBI offers application development services to help clients design, develop and maintain their application solutions.  Through our application development services we can help develop a strategy that will align your company�s business goals with its application needs.

The systems architecture team works closely with you to ensure that the application developed is highly reusable.  Our application development group can then execute on the vision and design, turning the strategic blueprint into a reality.  Once the application is developed, we then test it to insure that it exceeds all standards defined at the initiation of the project.  Our areas of application expertise are in e-commerce, Intranet/Internet portals, B2B and Security solutions.

Backup and Recovery   Go To Solutions
Are you Prepared?

What would happen if you lost a day's worth of information?  A week's?  A month�s?  What if you lost ALL of your data? It could put you out of business.

Worse yet, what if you �lost� your information and didn�t know it was taken or manipulated?

Business continuity is vital to business success and survival.  It can no longer remain the concern of the IT department alone.  How do you determine the continuity and recovery requirements of your business?  How do you identify and integrate critical business and IT priorities into a comprehensive continuity program?  Where do you start?

IBI professionals can analyze your infrastructure, and sort through the complexity of various computing hardware, peripherals, communications equipment and operating systems to help you develop a secure backup and recovery strategy that best suits your business needs and budget.

Some of the services offered include:
  • Recoverability assessment
  • Recovery strategy definition
  • Backup and recovery plan development
  • Recovery process and procedures design
  • Local recovery and disaster recovery
  • Ad-hoc (on retainer) recovery assistance
Client-Server   Go To Solutions
Do you need it done quickly?

Client Server applications can be developed quickly.  Who is going to develop those systems and maintain those Client-Server applications?

IBI professionals will help design your n-tiered application considering your response time requirements, network bandwidth, data integrity, concurrency and in-house skill set.  We specialize in:
  • .NET (using C#, VB.NET)
  • Java
  • Visual Basic
  • MS-Access
  • Visual C++
  • PowerBuilder and
  • Uniface

creating robust multi-user applications.

Database   Go To Solutions
Do your developers know what �third normal form" is?

Experts say that the database design is the heart of an application.  It can make or break a system.

IBI has some of the best database specialists in the industry.  We can assist with:
  • Data modeling (logical and physical)
  • Data architecture
  • Database analysis
  • Database administration
  • Data warehousing
  • Performance tuning and
  • Recovery

We specialize in high volume systems that process tens of millions of SQL queries per hour with sub-millisecond response time.

DBMS specialties include:

  • DB2 OS/390
  • DB2 (Unix, Windows, Other)
  • SQL Server
  • Oracle
Network   Go To Solutions
Is your network secure?  Is it reliable?  Is it fast?

Networks are getting more and more complex.  The increased demand for high availability and network security is ever increasing.

IBI will help design and implement an infrastructure that will support heavy duty access with tight security.  We can develop and implement a network topology including:  firewalls, IP sprayers, DMZ, trusted layer, VPN, HTTP and application servers.

We implement:
  • LANs
  • WANs
  • File Servers
  • Internet
  • Intranets and
  • Extranets
Security End-to-End Consulting   Go To Solutions
Did you know that two-thirds of organizations do not have a well-defined security policy and half have no system in place to determine if they are under attack?�

When surveyed by CSO-Online �two-thirds of the IT executives said their company did not have a well-defined company-wide security policy or plan in place� and �half of the companies in the survey have no system in place to determine if the company�s infrastructure is under attack?�*

Estimates are that billions of dollars are lost every year to cybercrime.  An organization�s data and resources are constantly under pressure from attack and misuse.  Also, confidential information needs to be protected for industrial and international espionage as well as accidental disclosure.

By implementing a solution to protect all IT resources, organizations can prevent catastrophic system outages, save money on lost productivity, and prevent legal challenges due to information disclosure.  Email encryption is one method of ensuring that confidential documentation remains confidential.

IBI will analyze the threats and propose preventive solutions.

We can do this by assessing your needs, defining your security policies and procedures, installing secure hardware and software, and design and develop custom solutions for you.

1. Security Consulting
  • Needs Assessment
       Determine scope and requirements based on risk, government regulations (e.g. HIPAA), trends, business objectives and budget.  IBI will create a report that reviews and recommends the best security architecture.
  • Policies and Procedures
       IBI will work with your organization to implement policies and procedures that help ensure the integrity and confidentiality of your data.  We will morph your existing policies with the best of breed methodologies.
  • Network Topology Mapping
       You need a good visual overview of your network to identify potential access points and security holes.  IBI will help develop a comprehensive Network Topology identifying WANs, LANs, Trusted Layer, DMZ, Firewalls, IP Sprayers, Gateways, etc.
  • Installation and Configuration
       The defaults that come with most hardware and software tools do not match most companies� requirements.  They are often left vulnerable even to the novice hacker.  IBI will install products and help configure them to provide crucial security.  We document parameter usage, and correlate the settings to your business requirements.
  • Custom Development
       Security goes way beyond firewalls and virus protection.  Many companies need to implement custom solutions that provide a more efficient and secure solution than out-of-the-box products furnish.  Such companies also desire a competitive advantage. IBI can design and implement custom security solutions such as:
    • PIN/password management
    • Distributed active directory management
    • Application roles and control
    • DBMS Grant control
    • Intrusion monitoring
    • Single sign-on

2. Risk Assessment

  • Security Audits
       IBI will perform an unbiased, comprehensive engineering review of your current network security systems to ensure compliance with prevailing security policies.  We can also help perform:
    • Intrusion detection
    • Firewall configuration and review
    • Vulnerability analysis and
    • Penetration testing

    as part of the audit.
    The results of this audit will remain confidential, so that policies, procedures and systems can be implemented before a hack makes the headlines!

  • Intrusion Detection
       Most CIOs when asked whether they know if their computing systems have ever been hacked, reply �I DON�T KNOW.�  This is an unsettling thought, especially knowing that up to 73% of all companies have been hacked in one form or another.
    Using state-of-the-art hardware and software monitors, IBI will show clients the number of attempted hacks and provide details of their source.  Most companies are surprised how many unauthorized attempts there are to gain access to their computing systems every day.
  • Firewall Configuration Review
       The cornerstone of an organization�s network security is a firewall.  This is a device which sits on the perimeter of a network protecting the internal resources of the network from outside attacks and regulating what traffic flows in and out of the network.

    IBI can support a number of different firewall technologies.  These include products from vendors such as Check Point�, Cisco Systems, NetScreen, and others.
  • Vulnerability Analysis
       Security does not stop at just firewalls since many threats also come from within an organization.

IBI will evaluate the risk to your network and propose the best policies to detect and prevent security breaches.  This may involve an intrusion detection solution or other similar measures.

  • Penetration Testing
       Using state-of-the-art tools and methods IBI will attempt to penetrate your computer systems.  Once penetrated, our professionals will confidentially document how the penetration was accomplished and recommend solutions to prevent future unauthorized penetrations.

3. Security Products
IBI can evaluate the need, and provide an independent review of products that can be incorporated into your IT Security plan.  IBI will then help you implement and configure these solutions which can include some or all of the following:

  • Authentication
  • Firewalls
  • Virtual Private Networks (VPN)
  • Secure Remote Access
  • Encryption
  • Digital signatures
  • Virus protection
  • Content filtering

In addition, we can develop customized solutions to assist in the administration and operation of these products.

4. Troubleshooting
If you are in the midst of a crisis such as a denial of service (DOS) attack, suspected security breach or administrative lock-out, our IBI experts can come in and help you identify and resolve these problems in a timely and cost effective fashion.

Web Development   Go To Solutions
Is your business �web enabled?�  Are more and more of your applications migrating to the Internet or to an Intranet application?

It is likely that your competitor�s business is on the web, or it will be soon.  Most businesses are making their legacy and new applications browser based.  It saves money and it saves time.

IBI can design and develop your web site with every feature that you need!  A strategically focused Web Site that closely integrates with your current marketing programs and anticipates future trends in a constantly changing industry will give your business a competitive advantage.  Creating an exceptional web site may look as though it is an easy and straight forward process, yet it involves the work of a team of professionals and specialists.  Internet Services will bring structure, efficiency and elegance to your corporate information.

At IBI we will develop a web site for each customer that is unique in style and functionality.  We take a thorough approach in design and development of our sites.  The end result is a web site which is not only attractive and professional, but also accurate and user-friendly.

Skills Include:
  • User Interface design
  • NET(C#, VB.NET, C++)
  • Java
  • Visual Basic
  • Data Access(ADO, ADO.NET, RDO, DAO)
  • Distributed Application(Web Services, Remoting)
  • Enterprise Services(DTC distributed transaction managed by COM+)
  • Websphere
  • Graphics


Send mail to with questions or comments about this web site.
Copyright � 2005 InBase, Inc.