Click stream personalization engine
A media company needs to provide personalized content to their web users.
Several Clouds delivered a scalable, fully Serverless solution to aggregate the clickstream and to provide personalized content.
The team used Amazon Personalize to enable near-real-time recommendations based on user browsing.
Web-scale, protection and global delivery
A marketing company needs highly available web solutions to deliver the company website, news, and blog posts.
The sites need Web Application Firewall (WAF) for bot and bad-actors protection.
Several Clouds delivered a solution based on Amazon CloudFront - CDN to achieve global reliable delivery; AWS WAF for bot protection.
High Availability and Backup strategy for RDS SQL Servers
A UK and DE-based company needs high availability for their multi-tenant MS SQL Servers solution.
Several Clouds were able to help the client achieve the Recovery Time Objective and Recovery Point Objective (RTO/RPO) needed to achieve the backup and disaster recovery targets for the client.
A US-based company is looking for an Observability suite for its multi-cloud and hybrid Kubernetes deployments.
We have assessed the current market leaders with comprehensive quantitive and qualitative analysis. The solution licensing, cost, and operational effort are a few parameters considered.
AWS Well-Architected Reviews
AWS Well-Architected helps cloud architects build secure, high-performing, resilient, and efficient infrastructure for various applications and workloads. Built around six pillars—operational excellence, security, reliability, performance efficiency, cost optimization, and sustainability—AWS Well-Architected provides a consistent approach for customers and partners to evaluate architectures and implement scalable designs.
We have conducted multiple Well-Architected reviews to assist companies in achieving better security, uptime, cost-efficiency, and improved operations.
A US-based company is looking for fully automated CI/CD on AWS and Kubernetes.
We have applied the GitOps model to a company looking for a fully automated, traceable, and secure deployment.
Technolgies in use: ArgoCD, EKS, Terraform, HELM, GitOps, Kubernetes, Docker
Biometric Digital Identity setup
Our client, a trusted provider of Identity and Access Management (IAM) and Identity Biometric solutions needs a secure and scalable cloud environment.
Only Serverless services are used in order to achieve high security, scalability, and faster time to market. Leveraging Serverless technologies helped our client pass audits much faster compared to an on-premises solution.
Full Infrastructure as code is achieved - Terraform is used for implementation and the cloud infrastructure is modeled and deployed in an auditable and repeatable manner.
Building HIPAA Environment on AWS
Our client needs to scale up and ensure HIPAA compliance. Their workload was already running on AWS.
We made a Well-Architected assessment to address the Security, Reliability, Performance Efficiency, Cost Optimization, and Operational Excellence pillars. We used the report as a baseline to initiate the improvement process.
The whole infrastructure is built with Infrastructure as Code (IaC) with Terraform, and the software delivery process is fully automated and transparent.
Additional AWS security services are enabled to ensure continuous compliance.
Become a Master
Our team has built and delivered the most in-depth DevOps program in Bulgaria.
Created in collaboration with leading companies and experts, this 3 month DevOps program helps people learn the key skills needed to become a DevOps Engineer and take their careers to the next level.
The overall program achieves a 93% satisfaction score.
HITRUST on AWS
The client operates in a highly-regulated industry, the solution should be designed as per the HITRUST framework to meet HIPAA law requirements.
The client chooses Several Clouds to expand on their existing solution and to transform their cloud footprint in a way suitable to their needs.
We build automation in every aspect of the Software Development Life Cycle (SDLC) - from planning, building, and testing to releasing, operating, and monitoring.
We have designed and implemented a secure platform for ETL (extract, transform, and load) operations.
The data design matches the regulations and data residency and sovereignty are taken into account.
The practices of confidentiality, integrity, and availability (CIA) are applied to ensure the least privileged access.