Cloud Readiness, Application Consolidation – End-of-Life and Legacy Applications

Anuj, with his application architecture background (22 years), coupled with cloud architecture (the last 12 years), has helped companies:

  • Create an overall consolidation strategy for your firm, accounting for all your I.T. assets – including your legacy applications.
  • Include a comprehensive migration and security strategy, including network and application security, to ensure complete protection of data and systems on each app tier.
  • Refactoring Existing Apps into Microservices, Containerization strategies and more…
  • Identity Access Management in the Cloud

Identity and Access Management (IAM), Austin, TX

  • Anuj, as an independent IAM cloud consultant in Austin, TX, helped develop a comprehensive IAM strategy – including adaptive, multi-factor authentication and SSO for multiple applications. His architecture included on-prem data center assets such as VPN/RDP farms as well as custom business web apps (SalesForce, ASP.NET/IIS apps). Anuj has worked with a variety of IAM providers included Google Cloud, AWS, Azure AD, Okta and Sailpoint.

Cyber Security Consulting – Web, Cloud and Data

  • Anuj was the technical lead in migrating over 200 on-prem applications to the cloud for an agency in Austin, TX.
  • Attack Vectors. Intrusion Prevention, Common Attacks, Social Engineering Attacks
  • OWASP Seminar Training Top 10 – Cross Site Scripting , Request Forgery, SQL Injection, Character Encoding, Session Hijacking, Authentication, Authorization loopholes
  • Best Practices to Secure your Web Applications –  in the Cloud, On-Premises
  • Web Services Security  and Identity and Access Management
  • Securing SOAP and RESTFul Services using IAM –Identity and Access Management
  • Securing Middleware, EAI and Messaging Systems  – using Identity and Access Management
  • Securing your devops pipeline, including CHEF Servers  – Identity Access Management for Devops
  • Securing your network, hybrid cloud, VPCs, Subnets, Security Groups  – The primary use case for Identity and Access Manaagement
  • IAM in Azure, AWS and Google Cloud IAM – Identity Access Management in the Public Cloud – Compared.

Find out how you can hire Anuj for your Identity and Access Management needs.

Anuj holds professional certifications in Google Cloud, AWS as well as certifications in Docker and App Performance Tools such as New Relic. He specializes in Cloud Security, Data Encryption and Container Technologies.

Initial Consultation

Anuj Varma – who has written posts on Anuj Varma, Hands-On Technology Architect, Clean Air Activist.