Microsoft Azure Cloud Migration For Idea Management Tool
- Cybersecurity & Privacy - Application Security
- Cybersecurity & Privacy - Cloud Security
- Infrastructure as a Service (IaaS) - Cloud Computing
- Infrastructure as a Service (IaaS) - Cloud Storage Services
- Cloud Planning, Design & Implementation Services
High cost of hosting dedicated servers regardless of usage of the systems and resources
Time required to have application provision for each new instance for end user clients
Time and resources required to manage servers, back up, and IT infrastructure in data center
End user clients requiring storage of data in their own countries
End user clients asking for on-demand scalability of resources on servers
End user clients asking for secured certified data center with required compliances as per their IT security policy
The project included in-depth redesign and reengineering as well as cloud migration to Microsoft Azure. Many end user clients were using the application, and it was important to ensure a seamless transition of data and application.
Application Migration:
Migration of an application from single tenant to multitenant along with infrastructure migration from the Windows server to the Azure cloud platform.
Multitenant and multilayered application architecture with logical boundaries between presentation layer, business layer, and data layer.
Adding administrator interface to add new clients and manage Azure storage and database on the fly.
Migration script was written for Azure storage and Azure database migration for each client to allow easy transition from the traditional Windows server to the Azure cloud platform.
Two seperate environments were created within Azure cloud service for staging and production. Frequent updates and enhancements are applied within staging Azure cloud service and made available for review and quality testing. After approval, those enhancements are moved to production Azure cloud service.
Application Security:
Application security standards and best practices were implemented to ensure security at the application, data, and infrastructure leve, and it was tested with a combination of manual and automated testing tools, such as Burp and NetSparker.