|InBase, Inc. was founded in 1986 to provide
end-to-end secure IT solutions via industry and customer custom solutions,
staff augmentation, IT consulting and software development.
Our staff of experienced technology, security and IT experts and managers
- Dedicated, short term and long term, IT consulting and interim
- Custom solutions from due diligence through to
systems-network-database strategy, architecture, development and
- Key outsourcing needs such as performance monitoring-tuning, data
architecture and data security
- Staff augmentation in any IT and business area required by the
Whether a project demands applications,
network, end-to-end security,
systems or web expertise,
we know that knowledge of a client's industry is every bit as important as
in-depth technology expertise. In the IT world, one-size does not fit all
solutions. We know that timely and cost-effective custom development
projects deliver the most successful business results.
IBI offers a high-level of industry focused expertise in the Financial
Services, Healthcare, High-tech, Insurance, Telecommunications and
Transportation industries. We specialize in helping our customers respond to
current issues such as e-business, information-globalization, networking,
security and privacy.
We are committed to building secure IT solutions with services that meet and
exceed customer expectations.
|How many plates can you keep spinning without letting
You have experts; you have programmers, but they are working 14 hours a
IBI offers application development services to help clients design, develop
and maintain their application solutions. Through our application
development services we can help develop a strategy that will align your
company�s business goals with its application needs.
The systems architecture team works closely with you to ensure that the
application developed is highly reusable. Our application development group
can then execute on the vision and design, turning the strategic blueprint
into a reality. Once the application is developed, we then test it to insure
that it exceeds all standards defined at the initiation of the project. Our
areas of application expertise are in e-commerce, Intranet/Internet portals,
B2B and Security solutions.
|Are you Prepared?
What would happen if you lost a day's worth of information? A week's? A
month�s? What if you lost ALL of your data? It could put you out of
Worse yet, what if you �lost� your information and didn�t know it was taken
Business continuity is vital to business success and survival. It can no
longer remain the concern of the IT department alone. How do you determine
the continuity and recovery requirements of your business? How do you
identify and integrate critical business and IT priorities into a
comprehensive continuity program? Where do you start?
IBI professionals can analyze your infrastructure, and sort through the
complexity of various computing hardware, peripherals, communications
equipment and operating systems to help you develop a secure backup and
recovery strategy that best suits your business needs and budget.
Some of the services offered include:
- Recoverability assessment
- Recovery strategy definition
- Backup and recovery plan development
- Recovery process and procedures design
- Local recovery and disaster recovery
- Ad-hoc (on retainer) recovery assistance
|Do you need it done quickly?
Client Server applications can be developed quickly. Who is going to
develop those systems and maintain those Client-Server applications?
IBI professionals will help design your n-tiered application considering
your response time requirements, network bandwidth, data integrity,
concurrency and in-house skill set. We specialize in:
- .NET (using C#, VB.NET)
- Visual Basic
- Visual C++
- PowerBuilder and
creating robust multi-user applications.
|Do your developers know what �third normal form" is?
Experts say that the database design is the heart of an application. It
can make or break a system.
IBI has some of the best database specialists in the industry. We can assist
- Data modeling (logical and physical)
- Data architecture
- Database analysis
- Database administration
- Data warehousing
- Performance tuning and
We specialize in high volume systems that process tens of millions of SQL
queries per hour with sub-millisecond response time.
DBMS specialties include:
- DB2 OS/390
- DB2 (Unix, Windows, Other)
- SQL Server
|Is your network secure? Is it reliable? Is it fast?
Networks are getting more and more complex. The increased demand for high
availability and network security is ever increasing.
IBI will help design and implement an infrastructure that will support heavy
duty access with tight security. We can develop and implement a network
topology including: firewalls, IP sprayers, DMZ, trusted layer, VPN, HTTP
and application servers.
- File Servers
- Intranets and
|Did you know that two-thirds of organizations do not
have a well-defined security policy and half have no system in place to
determine if they are under attack?�
When surveyed by CSO-Online �two-thirds of the IT executives said their
company did not have a well-defined company-wide security policy or plan in
place� and �half of the companies in the survey have no system in place to
determine if the company�s infrastructure is under attack?�*
Estimates are that billions of dollars are lost every year to cybercrime.
An organization�s data and resources are constantly under pressure from
attack and misuse. Also, confidential information needs to be protected for
industrial and international espionage as well as accidental disclosure.
By implementing a solution to protect all IT resources, organizations can
prevent catastrophic system outages, save money on lost productivity, and
prevent legal challenges due to information disclosure. Email encryption is
one method of ensuring that confidential documentation remains confidential.
IBI will analyze the threats and propose preventive solutions.
We can do this by assessing your needs, defining your security policies and
procedures, installing secure hardware and software, and design and develop
custom solutions for you.
1. Security Consulting
- Needs Assessment
Determine scope and requirements based on risk, government regulations
(e.g. HIPAA), trends, business objectives and budget. IBI will create a
report that reviews and recommends the best security architecture.
- Policies and Procedures
IBI will work with your organization to implement policies and
procedures that help ensure the integrity and confidentiality of your
data. We will morph your existing policies with the best of breed
- Network Topology Mapping
You need a good visual overview of your network to identify potential
access points and security holes. IBI will help develop a comprehensive
Network Topology identifying WANs, LANs, Trusted Layer, DMZ, Firewalls, IP
Sprayers, Gateways, etc.
- Installation and Configuration
The defaults that come with most hardware and software tools do not
match most companies� requirements. They are often left vulnerable even to
the novice hacker. IBI will install products and help configure them to
provide crucial security. We document parameter usage, and correlate the
settings to your business requirements.
- Custom Development
Security goes way beyond firewalls and virus protection. Many companies
need to implement custom solutions that provide a more efficient and
secure solution than out-of-the-box products furnish. Such companies also
desire a competitive advantage. IBI can design and implement custom
security solutions such as:
- PIN/password management
- Distributed active directory management
- Application roles and control
- DBMS Grant control
- Intrusion monitoring
- Single sign-on
2. Risk Assessment
IBI will evaluate the risk to your network and propose the best policies
to detect and prevent security breaches. This may involve an intrusion
detection solution or other similar measures.
- Penetration Testing
Using state-of-the-art tools and methods IBI will attempt to penetrate
your computer systems. Once penetrated, our professionals will
confidentially document how the penetration was accomplished and recommend
solutions to prevent future unauthorized penetrations.
3. Security Products
IBI can evaluate the need, and provide an independent review of products
that can be incorporated into your IT Security plan. IBI will then help you
implement and configure these solutions which can include some or all of the
- Virtual Private Networks (VPN)
- Secure Remote Access
- Digital signatures
- Virus protection
- Content filtering
In addition, we can develop customized solutions to assist in the
administration and operation of these products.
If you are in the midst of a crisis such as a denial of service (DOS)
attack, suspected security breach or administrative lock-out, our IBI
experts can come in and help you identify and resolve these problems in a
timely and cost effective fashion.
|Is your business �web enabled?� Are more and more of
your applications migrating to the Internet or to an Intranet application?
It is likely that your competitor�s business is on the web, or it will be
soon. Most businesses are making their legacy and new applications browser
based. It saves money and it saves time.
IBI can design and develop your web site with every feature that you need! A
strategically focused Web Site that closely integrates with your current
marketing programs and anticipates future trends in a constantly changing
industry will give your business a competitive advantage. Creating an
exceptional web site may look as though it is an easy and straight forward
process, yet it involves the work of a team of professionals and
specialists. Internet Services will bring structure, efficiency and elegance
to your corporate information.
At IBI we will develop a web site for each customer that is unique in style
and functionality. We take a thorough approach in design and development of
our sites. The end result is a web site which is not only attractive and
professional, but also accurate and user-friendly.
- User Interface design
- NET(C#, VB.NET, C++)
- Visual Basic
- ASP, ASP.NET
- Data Access(ADO, ADO.NET, RDO, DAO)
- Distributed Application(Web Services, Remoting)
- Enterprise Services(DTC distributed transaction managed by COM+)