Home Who We Are What Others Say How We Work Contact Us
Practice Area
1.1 Cost Reduction & Rationalization
1.2 Architecture, Data & Platform Design
1.3 Rapid Defect Elimination
1.4 Virtual CTO, Architect, or Other Specialists to Augment Team
2.1 Technology Market Assessment, Vision and Roadmap Development
2.2 Business Intelligence and Optimization
2.3 Execution Strategy - In-house, Out-sourcing & Off-shoring
2.4 (M&A) - Pre-deal Due Diligence & Integration Plan
2.5 Globalization
2.6 Governance, Compliance & QA/Risk Management Plan
3.1 Assessment, Requirements & Roadmap Development
3.2 Technology & Vendor Due Diligence
3.3 Business Intelligence and Optimization
3.4 Staff Development and Team Building
3.5 End-to-end Execution - Project Management & Delivery Expertise
4.1 Business Vision Definition
4.2 Technology & Vendor Due Diligence
4.3 Systems Development Life Cycle (SDLC) Process and
4.4 Proprietary Development or 3rd Party Software Integration
4.5 Systems Configuration, Version Control, Build & Release Management
4.6 Monitoring, Alerting & Diagnostics
4.7 Compliance/Regulatory/Audit (SOX, SSAE 16, PCI, HIPAA)
5.1 Decommissioning/Cost Savings Realization
5.2 Quality Assurance Process and Methodology
5.3 Compliance/Regulatory/Audit (SOX, SSAE 16, PCI, HIPAA)
5.4 Software Tools, Infrastructure and Security
5.5 Security, Backup, Disaster Recovery, Redundancy/Failover
6.1 End-to-end Execution - Project Management & Delivery Expertise
6.2 Change Management
6.3 Execution Strategy - In-house, Out-sourcing & Off-shoring
6.4 Technology & Vendor Due Diligence
6.5 Staff Development and Team Building
6.6 Roll-out & Training/Knowledge Transfer
7.1 Product Solutions
Software Tools, Infrastructure and Security

Scorpion has encyclopedic knowledge of available software tools and knows which ones actually work to provide the greatest value. IT Infrastructure management and Security are always a struggle within large corporations.

Our experience can deliver the following:

   • Examine the benefits of virtualizing and consolidating your server       infrastructure to lower administration overhead

   • Segment your network to meet security, compliance or segregation of       duties (SOD) requirements

   • Segment your network to reduce or eliminate single points of failure       so that if one network segment goes down, others continue operating.       This allows for improved diagnostic speed while the issue is localized

   • Document an accurate network map of your organization including       dependencies

   • Coordinate internal and external Intrusion (hacking) testing

   • Implement and configure Firewalls with the appropriate profiles to       allow only authorized traffic and users through

   • Develop a corporate taxonomy to support the inventory and       governance of software tools

Example: Large Banking Institution

A Fortune 100 banking institution needed to segment its network as it had grown too large. This meant that any outage could take days to isolate. Any security breach meant the intruder had access to everything and the auditors were considering the lack of segmentation to be a segregation of dutites exception. The difficulty was that the network and infrastructure had grown organically for decades and was undocumented. No one person currently on staff there really understood the ramifications of segmenting or blocking certain machines from communicating and the cost per hour of downtime was very high for the business.

Scorpion used automated network mapping tools to get a basic understanding of the current layout of the systems. We put listener agents on the key servers that were targeted for isolation. These listeners recorded every unique box (IP address) that communicated with the server over the next 30 days. The results surprised the client with over 100 times the connections they anticipated. Scorpion then measured the bandwidth utilization in order to choose a right-sized firewall.

IP Addresses were reverse engineered, including dynamic IP address (DHCP) logs, to identify valid and invalid users. We built in a fail-safe firewall bypass network switch in case we rapidly needed to circumvent the firewall after deployment. A completely new firewall approach was implemented greatly increasing network separation without causing any unscheduled business downtime.