top of page

OUR CLIENTS

Business Meeting

Corecys works across national and international geographies to serve customer needs around Cloud, Blockchain, Artificial Intelligence and Cyber Security. 

We specialize in servicing private and public-sector enterprises wishing to preserve their Core IT Assets and are also aiming to embrace the new technological advancements.

CLIENT STORY //  01

End-user Experience Insight - A Telecommunications Company

The Telco had deployed dedicated tools for monitoring each layer of the architecture, there were separate tools for database, separate for middleware and many others for monitoring the network between core application and client. All these tools worked independently (very well) but just weren’t able to show a 360-degree insight into application performance, availability and usage. In the absence of a single comprehensive monitoring of user-transactions, the performance issues went undetected until they became critical or were found and reported by the frustrated users.

Hence a network-protocol analysis tool was deployed to detect user requests right at start to capture a trail of all responses, processing and presenting details of transaction without any exception. The tool ensured that the hidden anomalies were detected and captured instantaneously to provide the core-application team the required real-time analytics and complete insight into the end-user experience. This resulted in promptly finding the issues which plagued the application performance before they become too large to disrupt operations.

CLIENT STORY //  02

API Integration - A Global FMCG Market Leader

One of the world's largest FMCG manufacturer needed sales information (wrt Products, Customers and Distribution channel) to flow from internal enterprise systems to outside world in an automated & secured fashion to feed-into 3rd party systems for business-strategic services and advanced analytics.

 

Corecys, while maintaining the controlling access and enforcing the usage policies successfully delivered the required integrations utilizing APIs (web application programming interfaces) to facilitate a fully automated and secured integration solution against a business-critical time-line & other operational constraints.

.

CLIENT STORY //  03

 

Privileged Identity Mgt. Design - Australia based Services Company

Australian Services company was looking to build a future road-map for its Information Security landscape guided by the Security Audit. One of the key areas identified was Privileged Identity Management.

 

The customer knew very well that while implementing security policies can be an ongoing exercise, it is important to have the right architecture and design in place. That's where the Architecture, High Level and Low Level design was delivered.

 

CLIENT STORY //  04

 

Productivity Monitoring & End-point Security for a global Services Company

They were running separate streams for Data Leakage Protection and Employee Productivity, since both products ran discretely they found it almost impossible to utilize the analytical reports as there was no cross reference to find the causal-effect relationship to pin-down the real trouble origination. 

The solution ensured that all the aspects, a) Employee Behavior and Productivity is proactively monitored along with productivity patterns which triggers an alarm for the sensitive incidents. b) The Data-Leak Channels are secured to prevent the data leakages and theft via all the outgoing channels and, c) Control on Sensitive Activities via restricting the data access as per the rules defined.

Now, entire show gets managed from a single integrated console, resulting in a comprehensive and proactive analytics.

 

CLIENT STORY //  05

Performance Profiling for a global Company in Hospitality sector

The IT environment ran from the state-of-art data-center with almost every possible provision, yet they faced application outages and slowdown/stalls at odd hours, leading to revenue losses and frustrated customers.

 

The solution was designed around Google Stackdriver for monitoring the various applications (hosted on Google cloud), Google Cloud Metric for Google Compute Engine, Agent Metric for VM instances running the Monitoring and Logging agents. The setup first created custom agent metrics and logs-based metrics leading to the core objective of creating dashboards for monitoring, logging, debugging, error reporting and tracing for the application, leading to precise RCA and resolutions.

Copyright © 2019 Corecys - All Rights Reserved.

bottom of page