Keyhole Software’s expert software consultants played a crucial role in enhancing a sophisticated security scanning system for mobile applications, aiming to boost performance and stability for seamless developer interactions. The system, designed for both Android and iPhone apps, conducted synchronous and asynchronous security scanning through distributed Node.js services orchestrated by a Java Spring backend. The project involved intricate integrations with …
Improving Performance Of Java/Spring Mobile Security Application
Client: Leading mobile security company that publishes mobile app and device security software that is recognized by IDC, Gartner, Deloitte Fast 500, and TAG Cyber and based in Chicago. Project Overview Keyhole Software Consultants embedded as key software development team members enhancing a complex system that performed security scanning for mobile applications. The overall project goal was to improve performance …
IT Strategy: Streamlined Release Pipeline with Kubernetes
A solo Senior Keyhole Consultant was brought on to assist the client in updating and streamlining their suite of Kubernetes applications. Overall, the client’s goal was to update their current processes and flows to make releasing their applications to Kubernetes easier and more efficient.
Cybersecurity Reporting Microservice Application with Java
Client Snapshot: The client is a cybersecurity-as-a-service company offering a proprietary security platform with best-in-class automated compliance software and concierge consulting. Project Overview A team of Keyhole Consultants developed an automated aggregator and generator for a Cybersecurity client’s security assessment reports. These reports were the culmination of several days’ worth of an analyst’s evaluation efforts, requiring hours of manually reviewing, …
Application Rewrite: Proprietary, No-Code Design Tool
Keyhole consultants assisted the client with a proprietary designer platform for end users. This tool enables a non-programmer to create a form-based web application without using code—simply by dragging UI elements onto a form page. The form contains pages that have UI elements, each element with associated properties that are interactive at design time. Each element has behaviors that impart program logic to the form. The tool user interacts with those artifacts by dragging and dropping elements, drawing behavior or workflow connections, modifying properties, and then saving the form, as XML, to a server. A web-based player interprets the form XML to serve it to an end-user as a web application.