Home
Belac is an IT systems consultancy dedicated to small and medium businesses wanting to innovate, grow and lead in an environment that requires connecting closely with partners, suppliers and customers through shared business processes and transactions.
Services
All work takes into consideration, the business context and the skills available.
- Application Integration. Work towards making integration as painless as possible
- Review existing assets, systems, processes and structure to identify areas that can be improved and provide plans to remediate the identified opportunities
- Development of point integrations
- Optimisation of existing integrations
- Develop assets to manage and monitor integrations
- Develop Integration Tests
- Infrastructure. Simplify, Observe, Scale, Reduce Cost
- A list of possible interventions describing the benefits of implementation, the level of difficulty needed, expected time period, the organizational changes required any caveats related to the change
- Assistance with the implementation
- Application Architecture. Building deep feature rich applications
- Identity. Central to every process
- Security. A Business orientated perspective
- Identity
- Single SignOn
- Authentication and authorization
- Network Architecture
- Logging
- Software Supply Chain
- Honeypots
- Segregation of responsibilities
- Low Code Applications. Tactical Applications Quickly
Extensive experience building, monitoring and managing integration assets for distributed transactional processes.
We assist with simple to complex integration requirements. We offer:
Overtime the most businesses experience the scale of their infrastructure growing as assets tools are added The complexity, cost and required skills continually grows leading to increasing costs per transaction.
Infrastructure technologies have improved but there can be a reluctance to upgrade the core infrastructure which could otherwise overtime, lead to lower costs, most capability and a radical simplification of the infrastructure.
We can review existing infrastructure architecture against the business context, systems context, cost, scalability, reliability, security and identity. The business context includes the available skills within the business.
The review will provide you with:
All applications require identity, security, observability and control of the software supply chain. The context of the application will determine an appropriate architecture. It is easy for technical teams to fall into the trap of wanting to adopt whatever is newest. Reviewing the requirement in terms of the context acts as a safeguard against that inclination.
If the application has a high transactional load, lots of background services, real time integration with other applications then factors like horizontal scaling, database replicas, message brokers, load balancers, API Gateways become critical factors.
There are a variety of approaches to solving these various problems. We review your application architecture against the business context and infrastructure architecture to produce recommendations and a plan to implement the required changes.
Identity is centre of any businesses information technology. Identity is vital to internal users, business partner users and customers. More than user identities; application, service and system identity is just as important. No operation should occur within a system that is not linked to an authenticated identity
We review your businesses existing approach to identity and identify gaps and opportunities for improvement. We will provide a plan with a roadmap to infuse identity into every aspect of your system.
There are numerous security orientated businesses that can provide you with code scanning, penetration tests, automated penetration tests, etc.
If your business is a smaller business without vast resources available to dedicate on specialist businesses we can provide you with a holistic review of your current security posture. It will include:
This is done in the context of your business and will assist you in moving to a more secure systems security posture.
We use Laravel Nova and Laravel Filament to quickly scaffold database driven applications that integration with your identity provider and are role and permission based. Applications are built in days. They are especially useful for short term tactical needs or when you need to trial an application before integrating it into your business.
Tangent
A hub for defining, connecting, coordinating, observing and monitoring task orientated messages and business event subscribers. Built for distribution via webhooks but many targets will be supported.
Uses partition based ordering to guarantee consistency.