What is the differentiator between Seasoned Software Development Company from the rest? The answer lies in the things we don’t see, Fireworks’ DevOps : the Development and Operation Standard Operating Procedures that ensure the system’s stability, scalability and security.
Read about how Fireworks mission to be the Best Software Developer in South East Asia.
Load Testing : Fireworks’ projects are mission-critical & robust – that needs to scale up to 100X . We perform stress tests our applications to ensure that it can scale and meet its demand when it really counts.
Application Performance Tracking: We install APMs in our projects to ensure enhanced visibility on all software bottlenecks, down to the code and transaction level.
Automated & Manual Testing: We tests our projects up to 200+ devices, We use a combination of manual automated testing to ensure our projects works perfectly in the real world.
In House Penetration Testing : We hack our own apps so that our security is tight, before we launch our projects.
Project Management & Documentation: Fireworks uses the most professional Projects Management & Documentation Suites such as Jira, Confluence, Jira, Swagger & WIKIs.
Fireworks’ Application Security Stack
Firewall on AWS : Fireworks uses AWS Firewall Manager to create scalable and industry standard Application Security.
Firewall on Cloud: Fireworks uses CloudFlare as Cloud based Firewall that has been proven to be used in mission critical websites such as Newsportals and E-Commerce Apps.
Mobile App Code Security: We use Guardsquare – Mobile app security that encrypts, obfuscates and self protects.
Web Source Code Protection : We have many techniques to protect our source codes such as Minifiers, Obfuscators & Encoders Technique.
Code Quality & Security : Fireworks uses Sonarqube for Continuous Code Quality & Code Security. Thousands of automated Static Code Analysis rules, protecting your app on multiple fronts, and guiding your team.
Fireworks’ Data Security Stack
Encryption and Tokenisation : We use JWT and Signed Tokens to communicate sensitive data. This method has been successfully used in Banking Apps. Signed tokens can verify the integrity of the claims contained within it, while encrypted tokens hide those claims from other parties.
Database Encryption : an encryption algorithm transforms data within a database from a readable state into a ciphertext of unreadable characters. This is crucial because if a system is breached, the data is still only readable for users who have the right encryption keys.
Advanced Encryption Standard : AES is chosen by the U.S. government to protect classified information. AES is implemented in software and hardware throughout the world to encrypt sensitive data.
SSL : Secure Sockets Layer is a security technology that is commonly used to secure server to browser transactions.
You can download a PDF of this article here: