Google Cloud launches, New York event and B2B projects
In newsletter: Two case studies, MrBenny award and OPTI community.
See March BriefSecurity is a constantly-evolving goal which requires continous adaptation
● All the technologies used need to be catalogued, together with their inter-dependencies: programming languages, server services, software versions. OPTI can create a technology manual for your business.
● In case of official security releases, upgrades should be planned as soon as possible: both hardware and software, solving the dependencies so functioning is not affected.
● In case of urgent security bugs, pro-active preventive steps may be taken: access reduction, access filtering, working on a data snapshot.
● When security updates conflict with normal functioning, refactoring and code updates need to be implemented.
The case for code refactoring
● In a fast-changing technology landscape, organizations depend on multi-year-old software using technologies which may become deprecated.
● OPTI specializes in working with legacy code. We identify vulnerable portions of the legacy technology so minimal replacements ensure security. Or we refactor the code to the latest versions, re-writing the software to make it secure.
● For example, we managed upgrades from PHP version 4 or 5 to 8, Python 2 to Python 3 and so on. We can also rewrite server-side PHP code to Javascript for NodeJS.
Security is cheap
● Is faster and easier to integrate with new technologies
● Decreases maintenance cost since official security updates can be managed in-house, until close to deprecation.
● Decreases manhour cost, since junior software developers are available for hot new technologies, while legacy versions are mastered by senior developers.
Code refactoring
Legacy version upgrade (ex: PHP 5 to 8)
Migrating to NodeJS
Automatic code updates
Quick system restore
Technology manuals
To ensure the security of software developed in an organization, the final step after coding and testing is the security audit. First, the remaining vulnerabilities following the coding process are checked, including avoiding known vulnerabilities in the language or libraries used. Secondly, the software may be subjected to a stress test to gain unauthorized access.
We independently review software products and processes and their compliance with initial specifications, globally accepted technical standards, and legal requirements. We check which parts of the application are no longer used and represent an inherent deprecation risk.
The results of the audit include both identified risks and recommendations.
Code review
Vulnerabilty report
Unit testing implementation
Tech stack inspection
Code speed recommendations
Stress testings
Allow or deny users access to various parts of the application
Controlled access is a security technique for determining who can view or use various resources. The aim is to minimize the security risk posed by unauthorized access to confidential information.
We have successfully implemented RBAC (Role-based access control) permission systems in various organizations and systems. It restricts access to resources based on individuals or groups with very clear business functions (eg administrator, level 1 engineer, management). The role-based security model includes a complex structure of assignments, authorizations and permissions, built specifically to regulate users' access to the system.
RBAC systems
Multi-role CMS
Domain-specific access
● Cookie management with mandatory marketing-external distinction.
● Registration, re-registration, updating of data with double confirmation
● Deletion of data with double confirmation on request
● Deletion at automatic intervals, depending on legal requirements and the minimum time required in business processes.
● Access to your own data - secure downloads
● Data transfer between companies according to the agreement of the holder
● Secure data archiving and archive restoration.
Data cataloguing
Manual of procedures
Scheduled data review
Preferential data access
Data archive & restoration
Data breach detection
Configure and manage Amazon AWS, Google Cloud Hosting, Microsoft Azure and the OPTI cloud infrastructure.
Google Cloud (partner-level), Amazon Web Services, Azure



Zapier, Salesforce, HubSpot, Azure, Google API





Google Analytics, Piwik, Semrush



MySQL, MariaDB, PostgreSQL, SQL Server, Oracle





Google BigQuery, MongoDB, Redis, Cassandra, Firebase, Hadoop






We conduct a complete assessment of your infrastructure and applications to identify vulnerabilities, security risks, and non-compliance points with standards like ISO 27001 or NIS2.
Based on the audit, we create a prioritized action plan. We design a secure and efficient architecture, including backup strategies, disaster recovery, and the implementation of a CI/CD pipeline to automate deployments.
We configure firewalls (WAF), monitoring systems, access policies (IAM), and data encryption. We implement DevOps tools (e.g., Docker, Terraform) to create a reproducible and secure Infrastructure as Code (IaC).
We proactively monitor the infrastructure 24/7 to quickly detect and respond to any security or performance incidents. We establish clear alerts and runbooks for rapid issue resolution.
We train your team on security best practices. We generate periodic security and compliance reports to demonstrate adherence to standards and to guide future decisions.
We provide full support for the development and deployment process, including version control (CI/CD), server management and monitoring, and infrastructure automation with tools like Terraform and Docker.
Yes, we specialize in working with legacy code. We identify vulnerabilities and can refactor the code, for example, by upgrading from PHP 5 to version 8 or migrating to NodeJS.
Yes, our security and consulting services are aligned with ISO 27001 standards and help with implementing legal requirements like GDPR and the NIS2 directive.
Infrastructure: Google Cloud, Amazon AWS, Microsoft Azure, Linux, Apache, Nginx, Varnish, Tomcat. DevOps & CI/CD: Jenkins, GitLab, Terraform, Ansible, Docker, SonarQube, Datadog. Standards: ISO 9001, ISO 27001, NIS2, GDPR.